|
Table Of Contents
Related Features and Technologies
Changes to Cisco MGC Software Architecture
Supported Standards, MIBs, and RFCs
Alarm Troubleshooting Procedures
Signaling Channel Troubleshooting Procedures
Obtaining Technical Assistance
DPNSS Feature Transparency
Document Release History
Feature History
This document describes the (DPNSS) Feature Transparency Feature. This feature is described in the following sections:
• Supported Standards, MIBs, and RFCs
• Obtaining Technical Assistance
• Glossary
Feature Overview
This feature enables support on the Cisco PGW 2200 of feature transparancy for DPNSS.
This feature provides the following:
•IUA interface can be used with Cisco access servers that support DPNSS signaling
Restrictions
The types of Cisco access servers supported by this feature is limited. The Cisco access servers that can be used for this feature are listed below.
•Cisco 2600
•Cisco AS 3600
•Cisco AS 3660
Related Features and Technologies
The following features and technologies are related to this feature:
•Support for DPNSS Feature (for the Cisco access servers)
•Support for the IUA with SCTP Feature (for the Cisco PGW 2200 and Cisco access servers)
Changes to Cisco MGC Software Architecture
This section describes the changes to Cisco MGC software architecture to support this feature.
Input/Output Subsystem
The Input/Output (I/O) subsystem consists of the I/O channel controllers (IOCC) and the I/O channel manager (IOCM), which manages them.
•The IOCM manages all IOCCs and keeps the hardware resource states of the hardware controlled by the IOCCs.
•The IOCCs provide
–A protocol-specific, message-based interface that allows nodes and platforms external to the Cisco MGC to communicate with the Cisco MGC.
–An interface that allows buffering of messages to the call engine's event dispatcher queue.
•The Cisco MGC I/O subsystem includes the following IOCCs:
–Signaling System 7 (SS7)—Contains MTP3 used for backhauling SS7 signaling to the
Cisco MGC from a Cisco SLT.–ISDN Level 3—Provides backhauling of ISDN (standard variants) to the Cisco MGC from a media gateway.
–Q.931+—A stateless IOCC, for a Cisco-proprietary protocol (RLM), which is a special version of ISDN that enables forwardhauling of Q931+ signaling to a media gateway used with a Cisco PGW 2200 configured for signaling environments.
–Media Gateway Control Protocol (MGCP)—Enables communication to media gateways and trunking gateways for setting up bearer channel connections used in Cisco PGW 2200 configured for call control environments.
–Extended ISDN User Part (E-ISUP)—Cisco-proprietary internal interface that enables the transport of endpoint and media gateway specific information between two (or more) Cisco MGCs. This protocol uses an enhanced ISUP base to support all ANSI and ITU ISUP messaging and elements, as well as additional fields to support transport of service information (such as local number portability (LNP), 800 numbers, and so on).
–Session Initiation Protocol (SIP)—Enables the Cisco MGC to receive and send SIP messages using the User Datagram Protocol (UDP).
–Transport Adapter Layer Interface (TALI)—Enables communication between the Cisco MGC and the Tekelec IP7 Secure Gateway signaling gateway. One TALI IOCC can communicate with up to two Tekelec IP7 Secure Gateways.
–IUA—Added in Release 9.4, this IOCC enables backhauling of ISDN Q.921 User messages over IP using SCTP. This IOCC is used between a Cisco PGW 2200 and media gateways.
–Message Transfer Part Level 3 (MTP3) User Adaptation (M3UA)—Added in Release 9.4, this IOCC enables the transport of any SS7 MTP Level 3 User signaling (for example, ISUP and TUP messages) over IP using SCTP. This IOCC is used between a Cisco PGW 2200 and Cisco ITP.
–Signaling Control Connection Part (SCCP) User Adaptation (SUA)—Added in Release 9.4, this IOCC enables the transport of any SCCP user signaling (for example, TCAP messages) over IP using SCTP. This IOCC is used between a Cisco PGW 2200 and Cisco ITP.
–(DPNSS)—Added in Release 9.4, this IOCC enables the tranparent transport of DPNSS data over IP. This IOCC is used between media gateways that support DPNSS.
Related Documentation
This document contains information that is related strictly to this feature. The documents that contain additional information related to the Cisco Media Gateway Controller (MGC) are listed below:
•Cisco MGC Hardware Installation Guide
•Regulatory Compliance and Safety Information for the Cisco Media Gateway Controller
•Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide
•Release Notes for Cisco Media Gateway Controller Software Release 9.4(1)
•Cisco Media Gateway Controller Software Release 9 Provisioning Guide
•Cisco Media Gateway Controller Software Release 9 Dial Plan Guide
•Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
•Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide
•Cisco Media Gateway Controller Software Release 9 Messages Reference Guide
•Cisco Media Gateway Controller Software Release 9 Billing Interface Guide
•Cisco Media Gateway Controller Software Release 9 Management Information Base Guide
Supported Standards, MIBs, and RFCs
This section identifies the new or modified standards, MIBs, or RFCs that are supported by this feature.
Standards
•DPNSS
•IUA
•SCTP
MIBs
New MIBs are available for this feature. There is a new MIB for each new measurement. You can find a list of the new measurements in the "Measurements" section. For more information on the MIBs used in the Cisco MGC software, refer to the Cisco Media Gateway Controller Release 9 Management Information Base Guide.RFCs
•SCTP - RFC-2960
•IUA - RFC-3057
Prerequisites
You must have Cisco Media Gateway Controller (MGC) software Release 9.4(1). Prerequisites for this release can be found in the Release Notes for the Cisco Media Gateway Controller Software Release 9.4(1).
Configuration Tasks
This sections contains the steps necessary for configuration of the Cisco MGC software to support this feature. For information on installing and configuring the Cisco MGC software on your system, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide, coming back to this section once you encounter the *.IP_NextHop1 parameter in the XECfgParm.dat file.
Note You only need to configure the *.IP_NextHop parameters when the Cisc o MGC hosts are on different subnets. If your hosts are on the same subnet, do not perform the procedure below.
Caution Configuration of the Cisco MGC software requires that the system software be shut down. In a simplex system, calls cannot be processed during system shut down. In a continuous service system, your system loses the ability to maintain calls during a critical event while the system software on one of the PGW hosts is shut down.
Caution The other XECfgParm.dat parameters associated with this feature should not be modified.
To configure the next hop IP addresses, perform the following steps:
Step 1 If you have not already done so, open the /opt/CiscoMGC/etc/XECfgParm.dat file on the active and standby Cisco PGW hosts using a text editor, such as vi.
Step 2 If you have not already done so, ensure that the pom.dataSync parameter is set to false on the active and standby Cisco PGW hosts.
Step 3 Search for the *.IP_NextHop1 parameter and enter the IP address of your first next hop destination on the active and standby Cisco PGW hosts.
Note The IP address should be expressed in decimal dot notation (for example, 10.25.81.5).
Step 4 Repeat Step 3 for every next hop destination (*.IP_NextHop2, *.IP_NextHop3, etc.) you want to identify on the active and standby Cisco PGW hosts. Up to eight next hop IP addresses can be specified.
Step 5 Return to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide and continue from where you left off. You will need to go to the "Adding DPNSS Connections" section in this document later if you intend to use an IUA interface for data backhaul between your Cisco PGW 2200 and your associated Cisco access server(s).
Troubleshooting Tips
If the next hop IP addresses you have entered are incorrect, perform the following steps. For more information on troubleshooting the rest of the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
To ensure proper functioning of this feature, you must enter next hop IP addresses in the XECfgParm.dat file. These IP addresses are used when the next hop router IP addresses on the Cisco PGW hosts do not match. To enter next hop IP addresses, perform the following steps:
Caution The other XECfgParm.dat parameters associated with this feature should not be modified.
Step 1 Log in to the standby Cisco MGC as root and change directories to the etc subdirectory by entering the following UNIX command:
cd /opt/CiscoMGC/etc
Step 2 Open the XECfgParm.dat using a text editor, such as vi.
Step 3 Search for the *.IP_NextHop1 parameter and enter the IP address of your first next hop destination.
Note The IP address should be expressed in decimal dot notation (for example, 10.25.81.5).
Step 4 Repeat Step 3 for every next hop destination (*.IP_NextHop2, *.IP_NextHop3, etc.) you want to identify. Up to eight next hop IP addresses can be specified.
Step 5 Save your changes and close the text editor.
Step 6 Manually stop the Cisco MGC software on the standby Cisco MGC by entering the following UNIX command:
/etc/init.d/CiscoMGC stop
Step 7 Once the software shutdown is complete, manually start the Cisco MGC software on the standby Cisco MGC by entering the following command:
/etc/init.d/CiscoMGC start
Step 8 Log in to the active Cisco MGC, start an MML session, and enter the following command:
sw-over::confirm
Site alarms are automatically set until the OOS Cisco PGW host is returned to an IS state.
Step 9 Repeat steps 2 through 8 for the newly standby Cisco PGW host.
Provisioning Tasks
The following sections describe the provisioning tasks related to this feature:
Planning for Provisioning
This section lists the data that you must gather to successfully provision this feature. For more information on planning the provisioning for the rest of the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Collecting External Node Data
The external node component type represents another node with which the MGC communicates. You must be ready to enter the following data:
•MML name
•Component description
•The type of the external node
•ISDN Signaling Type
The parameters for EXTNODE are defined in Table 11.
Collecting DPNSS Path Data
This component represents an DPNSS signaling service to a particular Cisco access server. Refer to the "Restrictions" section for more information on the Cisco access servers that require the use of a DPNSS signaling service. You must be ready to enter the following data:
•Unique ID of this component and component name used in MML commands
•Component description
•MML name of the associated external node
•Customer group ID
•Identify this path as either A side, B side, or neither
•Signaling Port Number (physical port on the Cisco access server)
•Signaling Port Slot (physical slot on the Cisco access server)
The DPNSS signaling service component structure is shown in Table 12.
Collecting IP Route Data (optional)
The IP route represents a static IP route. IP routes are only required for this feature when the Cisco PGW hosts are not on the same subnet as the Cisco access servers. If your system requires IP routes, you must be ready to enter the following data:
•IP route name
•Component description
•Destination hostname or IP address
•Subnet mask of Destination (optional)
•Next hop router IP address
•Local IP address
•Priority
The IP route component information can be listed in Table 13.
Collecting SCTP Association Data
The SCTP association represents the connection between the Cisco MGC and a Cisco access server. You must be ready to enter the following data:
•MML Name of the SCTP association
•Description of this component
•Signaling Type
•MML Name of the SGP
•First local address
•Second local address (optional)
•Local SCTP port number (optional)
•The highest priority destination address
•The lowest priority destination address (optional)
•Destination SCTP port number. (optional)
•External Node's MML name
•MML Name of first IPROUTE (optional)
•MML Name of second IPROUTE (optional)
•Number of bytes to advertise for the local receive window. (optional)
•Maximum number of times to retransmit SCTP INIT message (optional)
•Maximum initial timer retransmission value (optional)
•Maximum number of retransmissions over all destination address before the association is declared failed (optional)
•Maximum time after a datagram is received before a SCPT SACK is sent (optional)
•Maximum time SCTP waits for other outgoing datagrams for bundling (optional)
•Minimum value allowed for the retransmission timer (optional)
•Maximum value allowed for the retransmission timer (optional)
•Time between heartbeats. The heartbeat is this value plus the current retransmission timeout value (optional).
•Internet Protocol Precedence. This value is placed in the IP PRECEDENCE portion of the Type Of Service field for outgoing SCTP datagrams (optional)
•Differential Service Code Point. This value is placed in the DSCP portion of the Type Of Service field for outgoing SCTP datagrams (optional)
•Maximum number of retransmissions to either PEERADDR1 or PEERADDR2 before it is declared failed (optional)
The SCTP association component structure is shown in Table 14.
Provisioning Procedures
Provision the transport path for DPNSS data between the Cisco PGW 2200 and the external Cisco access server nodes. Communication between the Cisco PGW 2200 and the Cisco access servers is provisioned to provide a reliable communication path between the two platforms.
This provisioning is performed when an external node is modified to use an SCTP-based protocol or when a new external node is added to the Cisco PGW 2200. This section covers the following provisioning topics:
Provisioning Basics
The procedures in this section describe how to start a provisioning session and how to save and activate the changes you have made.
• Starting a Provisioning Session
• Saving and Activating your Provisioning Changes
• Ending a Provisioning Session Without Activating your Changes
• Retrieving Provisioning Data
For more detailed information about provisioning your Cisco PGW 2200, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Starting a Provisioning Session
You may need to start a provisioning session as part of your system operations. To do this, log into the active Cisco MGC, start an MML session, and enter the following command:
prov-sta::srcver="curr_ver",dstver="mod_ver"
Where:
•curr_ver—The name of the current configuration version. In place of the name of the current configuration version, you can also enter:
–new—A new default session configuration; no existing source configuration is available.
–active—Selects the active configuration as the source for configuration changes.
Note If you do not know the name of your current configuration session, you can use the procedure in the "Retrieving Data on the Current Provisioning Session" section.
•mod_ver—A new configuration version name that contains your provisioning changes.
For example, to use a configuration version called ver1 as the basis for a version to be called ver2, you would enter the following command:
prov-sta::srcver="ver1",dstver="ver2"
Once a provisioning session is underway, you may use the prov-add, prov-ed, or prov-dlt MML commands to add, modify, and delete components on your system. This document describes how to add, modify, and delete M3UA and SUA components. For more information on provisioning other components on your Cisco PGW 2200, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
There are two ways to close your provisioning session: saving and activating your provisioning changes, as described in the "Saving and Activating your Provisioning Changes" section or ending your provisioning session without saving and activating your changes, as described in the "Ending a Provisioning Session Without Activating your Changes" section.
Saving and Activating your Provisioning Changes
When you have completed making provisioning changes in your session, you must enter a command to save and activate your changes. There are two different provisioning MML commands that do this: prov-cpy and prov-dply.
Caution Using the prov-cpy and prov-dply MML commands can severely impact your system's call processing performance, depending on the extent of your provisioning changes. We recommend that these commands be issued during a maintenance window when traffic is minimal.
The prov-cpy MML command is used to save and activate your changes on the active Cisco MGC. This command is typically used to save and activate changes on a Cisco MGC in a simplex configuration. However, you can use the prov-cpy MML command on Cisco MGCs in high-availability or continuous-service configurations, to save and activate your changes on the active Cisco MGC. If you choose to do this, you should enter the prov-sync MML command immediately afterwards, to have your changes saved and activated on the standby Cisco MGC.
Note When you enter the prov-cpy command, your provisioning session is also automatically ended. If you want to make additional provisioning changes, you must start a new provisioning session as described in the "Starting a Provisioning Session" section.
Caution Using the prov-sync MML command can severely impact your system's call processing performance. We recommend that this command be issued during a maintenance window when traffic is minimal.
Note When the prov-sync MML command is used to synchronize the provisioning settings on the standby MGC host with current settings on the active MGC host, the system does not indicate when the synchronization process has failed.
The prov-dply MML command is used to save and activate your changes on the active and standby
Cisco MGCs. This command is typically used to save and activate changes on Cisco MGCs in high-availability or continuous-service configurations. This command should not be used on a Cisco MGC in a simplex configuration.
Note When you enter the prov-dply command, your provisioning session is also automatically ended, unless an error occurs during execution. If you want to make additional provisioning changes, you must start a new provisioning session as described in the "Starting a Provisioning Session" section.
Ending a Provisioning Session Without Activating your Changes
You may find that you want to end a provisioning session without saving and activating the changes you have entered during your session. If this is the case, you can enter the prov-stp MML command. This command ends your current provisioning session and your changes are not entered.
Retrieving Provisioning Data
You can use the prov-rtrv MML command to retrieve information about your current provisioning settings. The ways in which you can use this command to retrieve provisioning data are described in the following sections:
• Retrieving Data for an Individual Component
• Retrieving Data for Select Components
• Retrieving Data for All Components of a Particular Type
• Retrieving Data on the Current Provisioning Session
• Retrieving Data on Supported Signaling Protocols
Retrieving Data for an Individual Component
You can retrieve provisioning data on any individual component on your system. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:component:name=MML_name
Where:
•component—The MML component type associated with the desired component. You can find a complete list of MML component types in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
•MML_name—The MML name for the desired component. You can determine the MML names for the various components using the prov-rtrv:all MML command.
For example, to view the provisioning data for an IUA signaling service called iua1, you would enter the following command:
prov-rtrv:sigsvcprop:name="iua1"
The system returns a response similar to the following:
<<get system response>>
Retrieving Data for Select Components
You can retrieve data on select the components provisioned on your system. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:all
Note This command returns data on all signaling components, except for signaling service and linkset properties.
The system returns a response similar to the following:
<< get system response >>
Retrieving Data for All Components of a Particular Type
You can retrieve provisioning data on all components of a particular type on your system. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:component:"all"
Where: component is the MML component type associated with the desired component group. You can find a complete list of MML component types in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Note Components that are used to retrieve signaling or routing properties (that is sigsvcprop, lnksetprop, and trnkgrpprop) cannot use this command. The properties for only one signaling or routing component can be listed per command instance. Please use the following format:
prov-rtrv:propComp:name="compName" | name="ss7famName"
Where:
propComp—MML component name appropriate to the property type you want to retrieve, as listed below:
sigsvcprop—Provides maintenance access to the properties of signaling services.
trnkgrpprop—Provides maintenance access to the properties of trunk groups
lnksetprop—Provides maintenance access to the properties of linksets.
compName - MML name of a previously provisioned signaling service or trunk group.
ss7famName - MML name of the SS7 family associated with the desired linkset.For example, to view the provisioning data for all signaling services, you would enter the following command:
prov-rtrv:naspath:"all"
The system returns a response similar to the following:
<< get system response >>
Retrieving Data on the Current Provisioning Session
You can retrieve provisioning data on the current provisioning session. To do this, log in to the active Cisco MGC, start an MML session, and enter the following command:
prov-rtrv:session
The system returns a response similar to the following:
MGC-02 - Media Gateway Controller 2003-01-13 13:39:19
M RTRV
"session=jtest:session"
/*
Session ID = mml1
SRCVER = active
DSTVER = jtest
*/
Retrieving Data on Supported Signaling Protocols
You can retrieve protocol data for the current provisioning session. To do this, log in to the active
Cisco MGC, start an MML session, and enter the following command:prov-rtrv:variants
The system returns a response similar to the following:
<< get system response >>
Adding DPNSS Connections
This section contains the procedures that you must perform to add DPNSS connections to your Cisco PGW 2200 provisioning data. When provisioning the components that enable the Cisco PGW 2200 to support DPNSS, perform the procedures in the following order.
• Adding Cisco Access Server External Nodes
• Adding DPNSS Signaling Services
Adding Cisco Access Server External Nodes
To add Cisco access server external nodes, perform the following steps:
Step 1 Start a provisioning session as described in the "Starting a Provisioning Session" section.
Step 2 Enter the following command to add a Cisco access server external node:
prov-add:extnode:name="name", desc="description", type="as", isdnsigtype="iua"
Where:
•name—The name you want to give to the component. The name can be as many as 20 characters long and can contain numbers, letters, and the dash (-) symbol. The name should begin with a letter.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
•as—The MML name for the type of Cisco access server. Valid values can be found in the "External Node Types" section.
For example, to add a Cisco access server external node named va-3600-36, you would enter the following command:
prov-add:extnode:name="va-3600-36", desc="3600", type="AS3600", isdnsigtype="iua"
Step 3 Repeat Step 2 for each Cisco access server external node you want to add to your provisioning data.
Step 4 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Otherwise, proceed to the "Adding IP Routes (optional)" section if your Cisco PGW 2200 is on a different subnet from the associated access server, or proceed to the "Adding SCTP Associations" section if they are on the same subnet.
Adding IP Routes (optional)
IP routes are required for your provisioning data if your Cisco PGW hosts are not on the same subnet as the Cisco access servers. To add IP routes, perform the following steps:
Step 1 If you do not already have an active provisioning session, start one as described in the "Starting a Provisioning Session" section.
Step 2 Enter the following command to add an IP route:
prov-add:iproute:name="name", desc="description", netmask="mask", nexthop="nhop", ipaddr="addr", dest="destination"
Where:
•name—The name you want to give to the component. The name can be as many as 20 characters long and can contain numbers, letters, and the dash (-) symbol. The name should begin with a letter.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
•mask—Subnet mask of the destination (optional). The value should be expressed as an IP Address in decimal dot notation (default is 255.255.255.255).
•nhop—Next hop router hostname, IP address, or one of the following property names defined in the XECfgParm.dat file:
–IP_NextHop
–IP_NextHop2
–IP_NextHop3
–IP_NextHop4
–IP_NextHop5
–IP_NextHop6
–IP_NextHop7
–IP_NextHop8
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
IP Address should be in decimal dot notation and the hostname must be less than or equal to 32 characters.
•addr—Local IP address. IP Address should be one of the following property names defined in the XECfgParm.dat file:
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
•destination—Destination hostname or IP address. IP Address should be in decimal dot notation and the hostname must be less than or equal to 32 characters.
For example, to add an IP route named iprte1, you would enter the following command:
prov-add:IPROUTE:NAME="iprte1", DESC="IP Route 1", dest="10.82.80.0", ipaddr="IP_Addr1", netmask="255.255.255.0", nexthop="10.82.82.1"
Step 3 Repeat Step 2 for each IP route you want to add to your provisioning data.
Step 4 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Otherwise, proceed to the "Adding SCTP Associations" section.
Adding SCTP Associations
To add SCTP associations, perform the following steps:
Step 1 If you do not already have an active provisioning session, start one as described in the "Starting a Provisioning Session" section.
Step 2 Enter the following command to add an SCTP association:
prov-add:association:name="name", desc="description", type="IUA", ipaddr1="addr1", ipaddr2="addr2", peeraddr1="paddr1", peeraddr2="paddr2", extnode="gway", iproute1="iprte1", iproute2="iprte2"
Where:
•name—The name you want to give to the component. The name can be as many as 20 characters long and can contain numbers, letters, and the dash (-) symbol. The name should begin with a letter.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
•addr1—First local IP address, as defined by the following XECfgParm.dat parameters:
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
•addr2—Second local IP address, as defined by the following XECfgParm.dat parameters:
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
–N/A (default value)
•paddr1—Highest priority destination address, expressed in dot notation.
•paddr2—Lowest priority destination address, expressed in dot notation. This parameter is optional. The default value for this parameter is 0.0.0.0.
•gway—MML name of a previously entered Cisco access server external node.
•iprte1—MML name of a previously entered IP route (optional).
•iprte2—MML name of a previously entered IP route (optional).
For example, to add an SCTP association named nasassoc1, you would enter the following command:
prov-add:ASSOCIATION:NAME="dpnssassoc1",DESC="DPNSS Association 1", TYPE="IUA", IPADDR1="IP_Addr1", IPADDR2="IP_Addr2", PEERADDR1="10.82.80.187", PEERADDR2="10.82.81.164", extnode="va-3600-37, IPROUTE1="iprte1", IPROUTE2="iprte2"
Note The parameters listed above are those required to create an SCTP association for an IUA interface. For a complete list of parameters for this component, refer to the "SCTP Association" section.
Step 3 Repeat Step 2 for each SCTP association you want to add to your provisioning data.
Step 4 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Otherwise, proceed to the "Adding DPNSS Signaling Services" section.
Adding DPNSS Signaling Services
To add DPNSS signaling services, perform the following steps:
Step 1 If you do not already have an active provisioning session, start one as described in the "Starting a Provisioning Session" section.
Step 2 Enter the following command to add a DPNSS signaling service:
prov-add:dpnsspath:name="name", desc="description", extnode="mgw", abflag="side", sigport=portnum, sigslot=slotnum
Where:
•name—The name you want to give to the component. The name can be as many as 20 characters long and can contain numbers, letters, and the dash (-) symbol. The name should begin with a letter.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
•mgw—MML name of a previously defined external node. Valid types are:
–C2600
–AS3600
–AS3660
•side—DPNSS side for this signaling service (optional). Value values are A (for A side), B (for B side), and N (for not applicable) (N)
•portnum—Number for physical port on the access server (optional). Valid values: 0-167 (0).
•slotnum—Number for physical slot on the access server (optional). Valid values: 0-63 (0).
For example, to add a DPNSS signaling service named dpnsvc1, you would enter the following command:
prov-add:naspath:NAME="dpnsvc1",DESC="IUA DPNSS path", extnode="va-3660-20", abflag="a", sigport=45, sigslot=10
Step 3 Repeat Step 2 for each DPNSS signaling service you want to add to your provisioning data.
Step 4 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Modifying DPNSS Components
The following sections contain the procedures for modifying the various IUA connections in your Cisco PGW 2200 provisioning data:
• Modifying Cisco Access Server External Nodes
• Modifying DPNSS Signaling Services
Modifying Cisco Access Server External Nodes
Desc is the only parameter that can be modified for an existing Cisco access server external node. To edit the description of a Cisco access server external node, perform the following steps:
Step 1 Start a provisioning session as described in the "Starting a Provisioning Session" section.
Step 2 Enter the following command to edit a Cisco access server external node:
prov-ed:extnode:name="name", desc="description"
Where:
•name—MML name of the Cisco access server external node to be modified.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
For example, to modify an Cisco access server external node named va-3600-37, you would enter the following command:
prov-ed:extnode:name="va-3600-37", desc="3600 supporting DPNSS"
Step 3 Repeat the above steps for each Cisco access server external node you want to modify in your provisioning data.
Step 4 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Modifying DPNSS Signaling Services
You can modify the description, DPNSS side identification, signaling port number, and signaling slot number in a DPNSS signaling service. To modify DPNSS signaling services, perform the following steps:
Step 1 Shut down the D-channel(s) on the associated access server(s). Refer to the documentation for the access server for more information on shutting down D-channels.
Step 2 Set the DPNSS signaling services to be modified to the Out-of-Service (OOS) state by entering the following MML command:
set-dest:sig_srv:OOS
Where sig_srv is the MML name of the DPNSS signaling services to be modified.
Step 3 Repeat Step 2 for each of the DPNSS signaling services to be modified.
Step 4 Start a provisioning session as described in the "Starting a Provisioning Session" section.
Step 5 Enter the following command to modify an DPNSS signaling service:
prov-ed:dpnsspath:name="name", desc="description", abflag="side", sigport=portnum, sigslot=slotnum
Where:
•name—MML name of the component to be modified.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
•mgw—MML name of a previously defined external node. Valid types are:
–C2600
–AS3600
–AS3660
•side—DPNSS side for this signaling service (optional). Value values are A (for A side), B (for B side), and N (for not applicable) (N)
•portnum—Number for physical port on the access server (optional). Valid values: 0-167 (0).
•slotnum—Number for physical slot on the access server (optional). Valid values: 0-63 (0).
For example, to modify the DPNSS side identification on a DPNSS signaling service named dpnsvc1, you would enter the following command:
prov-ed:dpnsspath:NAME="dpnsvc1", abflag="n"
Step 6 Repeat Step 5 for each DPNSS signaling service you want to modify in your provisioning data.
Step 7 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Step 8 Set the modified DPNSS signaling services to the In-Service (IS) state by entering the following MML command for each signaling service:
set-dest:sig_srv:IS
Where sig_srv is the MML name of the modified DPNSS signaling service.
Step 9 Restore the D-channel(s) on the associated access server(s). Refer to the documentation for the media gateway for more information on shutting down D-channels.
Modifying IP Routes
The only IP route parameter that cannot be modified is the name. To modify IP routes, perform the following steps:
Step 1 Set the IP route to be modified to the OOS state as described in the "Setting the Service State of an IP Route" section.
Step 2 Repeat Step 1 for each IP route to be modified.
Step 3 Start a provisioning session as described in the "Starting a Provisioning Session" section.
Step 4 Enter the following command to modify an IP route:
prov-ed:iproute:name="name", desc="description", netmask="mask", nexthop="nhop", ipaddr="addr", dest="destination"
Where:
•name—MML name of the IP route to be modified.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
•mask—Subnet mask of the destination (optional). The value should be expressed as an IP Address in decimal dot notation (default is 255.255.255.255).
•nhop—Next hop router hostname, IP address, or one of the following property names defined in the XECfgParm.dat file:
–IP_NextHop
–IP_NextHop2
–IP_NextHop3
–IP_NextHop4
–IP_NextHop5
–IP_NextHop6
–IP_NextHop7
–IP_NextHop8
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
IP Address should be in decimal dot notation and the hostname must be less than or equal to 32 characters.
•addr—Local IP address. IP Address should be one of the following property names defined in the XECfgParm.dat file:
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
•destination—Destination hostname or IP address. IP Address should be in decimal dot notation and the hostname must be less than or equal to 32 characters.
For example, to modify the destination and local IP address in an IP route named iparte1, you would enter the following command:
prov-ed:IPROUTE:NAME="iprte1", dest="10.82.80.1", ipaddr="IP_Addr2"
Step 5 Repeat the Step 4 for each IP route you want to modify in your provisioning data.
Step 6 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Step 7 Set the IP route to be modified to the IS state as described in the "Setting the Service State of an IP Route" section.
Modifying SCTP Associations
Only the name, type, and extnode parameters cannot be modified for an SCTP association. To modify SCTP associations, perform the following steps:
Step 1 Set the SCTP association to be modified to the OOS state as described in the "Setting the Service State of an Association" section.
Step 2 Repeat Step 1 for each SCTP association to be modified.
Step 3 Start a provisioning session as described in the "Starting a Provisioning Session" section.
Step 4 Enter the following command to modify an SCTP association:
prov-ed:association:name="name", desc="description", ipaddr1="addr1", ipaddr2="addr2", peeraddr1="paddr1", peeraddr2="paddr2", iproute1="iprte1", iproute2="iprte2"
Where:
•name—MML name of the SCTP association to be modified.
•description—The long name assigned that can be as many as 128 alphanumeric characters in length.
•addr1—First local IP address, as defined by the following XECfgParm.dat parameters:
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
•addr2—Second local IP address, as defined by the following XECfgParm.dat parameters:
–IP_Addr1
–IP_Addr2
–IP_Addr3
–IP_Addr4
–N/A (default value)
•paddr1—Highest priority destination address, expressed in dot notation.
•paddr2—Lowest priority destination address, expressed in dot notation. This parameter is optional. The default value for this parameter is 0.0.0.0.
•iprte1—MML name of a previously entered IP route (optional).
•iprte2—MML name of a previously entered IP route (optional).
For example, to modify the local IP addresses for an SCTP association named nasassoc1, you would enter the following command:
prov-ed:ASSOCIATION:NAME="dpnssassoc1", IPADDR1="IP_Addr2", IPADDR2="IP_Addr3"
Step 5 Repeat the Step 4 for each SCTP association you want to modify in your provisioning data.
Step 6 If there are no other components that you need to provision, end your provisioning session as described in the "Saving and Activating your Provisioning Changes" section.
Step 7 Set the SCTP association to be modified to the IS state as described in the "Setting the Service State of an Association" section.
Deleting DPNSS Components
The following sections contain the procedures for modifying the various IUA connections in your Cisco PGW 2200 provisioning data:
• Deleting Cisco Access Server External Nodes
• Deleting DPNSS Signaling Services
Deleting Cisco Access Server External Nodes
To delete Cisco access server external nodes, perform the following steps:
Step 1 Set the interface on the external node that is associated with the Cisco MGC software to the out-of-service state. Refer to the documentation for your media gateway for more information on taking interfaces out-of-service.
Step 2 Delete the signaling service(s) associated with this external node. To delete a DPNSS signaling service, perform the steps in the "Deleting DPNSS Signaling Services" section.
Step 3 If your system uses IP routes for this external node, delete the IP routes as described in the "Deleting IP Routes" section.
Step 4 Delete the SCTP associations for this external node, as described in the "Deleting SCTP Associations" section.
Step 5 Enter the following command to delete a Cisco access server external node:
prov-dlt:extnode:name="name"
Where name is the MML name of the Cisco access server external node to be deleted.
For example, to delete an Cisco access server external node named va-3600-37, you would enter the following command:
prov-dlt:extnode:name="va-3600-37"
Step 6 Repeat the above steps for each Cisco access server external node you want to delete from your provisioning data.
Deleting DPNSS Signaling Services
To delete DPNSS signaling services, perform the following steps:
Step 1 Log in to the active Cisco MGC, start an MML session, and enter the following command:
set-dest:sig_srv:OOS
Where sig_srv is the MML name of the desired signaling service.
For example, to set the service state of a signaling service called sigsrv1 to OOS, enter the following command:
set-dest:sigsrv1:OOS
Step 2 Block all of the CICs associated with this signaling service using the following MML command:
blk-cic:sig_svc:all
Where sig_svc is the MML name of the signaling service associated with the CICs to be blocked.
Step 3 Delete the bearer channels associated with this signaling service using the following MML command:
prov-dlt:switchtrnk:dstsrv="sig_svc", "all"
Where sig_svc is the MML name of this signaling service.
Step 4 If trunk groups are provisioned for this signaling servce, delete the trunk groups using the following MML command:
prov-dlt:trnkgrp:dstsrv="sig_svc", "all"
Where sig_svc is the MML name of this signaling service.
Step 5 Enter the following command to delete a DPNSS signaling service:
prov-dlt:dpnsspath:name="name"
Where name is the MML name of the DPNSS signaling service to be deleted.
For example, to delete an DPNSS signaling service named dpnsvc1, you would enter the following command:
prov-dlt:DPNSSPATH:NAME="dpnsvc1"
Step 6 Repeat the above steps for each DPNSS signaling service you want to delete from your provisioning data.
Deleting IP Routes
To delete IP routes, perform the following steps:
Step 1 Set the service state of the IP route to OOS, as described in the "Setting the Service State of an IP Route" section.
Step 2 Delete any components that used this route as a parameter. To delete SCTP associations, perform the steps found in the "Deleting SCTP Associations" section .
Step 3 Enter the following command to delete an IP route:
prov-dlt:iproute:name="name"
Where name is the MML name of the IP route to be deleted.
For example, to delete an IP route named iprte1, you would enter the following command:
prov-dlt:IPROUTE:NAME="iprte1"
Step 4 Repeat the above steps for each IP route you want to delete from your provisioning data.
Deleting SCTP Associations
To delete SCTP associations, perform the following steps:
Step 1 Set the service state of the SCTP association to OOS, as described in the "Setting the Service State of an Association" section.
Step 2 Enter the following command to delete an SCTP association:
prov-dlt:association:name="name"
Where name is the MML name of the association you want to delete.
For example, to delete an SCTP association named nasassoc1, you would enter the following command:
prov-dlt:ASSOCIATION:NAME="nasassoc1"
Step 3 Repeat the above steps for each SCTP association you want to delete from your provisioning data.
Troubleshooting Tips
The following sections contain troubleshooting procedures related to provisioning:
• Alarm Troubleshooting Procedures
• Signaling Channel Troubleshooting Procedures
For more information on troubleshooting the rest of the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
Alarm Troubleshooting Procedures
The alarms listed below are the new and modified alarms associated with this feature that require user action to be rectified. For a complete list of Cisco MGC alarms, refer to the Cisco Media Gateway Controller Software Release 9 System Messages Guide.
Association Degraded
This alarm occurs when one of the destination address for an SCTP association has failed, but the association is still up.
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the "Resolving an Association Alarm" section.
Association Fail
This alarm occurs when an SCTP association has failed due to an IP connectivity failure or an out-of-service destination.
Corrective Action
To correct the problem identified by this alarm, perform the procedure in the "Resolving an Association Alarm" section.
IP RTE CONF FAIL
This alarm occurs when an IP route cannot find the local interface defined by its IP address parameter.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Verify that the IP address settings for the identified IP route are correct, using the prov-rtrv MML command, as described in the "Retrieving Provisioning Data" section.
If the IP address settings for your IP route are correct, proceed to Step 2.
If the provisioned settings for your IP route are incorrect, start a dynamic reconfiguration session to change the settings, as described in the "Modifying IP Routes" section.
Step 2 Verify that the other provisioned settings for the identified IP route obtained in Step 1 are correct.
If the other provisioned settings for your IP route are correct, proceed to Step 3.
If the provisioned settings for your IP route are incorrect, start a dynamic reconfiguration session to change the settings, as described in the "Modifying IP Routes" section.
Step 3 Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the "Obtaining Technical Assistance" section.
IP RTE FAIL
This alarm occurs when an IP route is in the OOS state with a cause other thatn off-duty or commanded out-of-service.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Step 1 Verify that the provisioned settings for the identified IP route are correct, using the prov-rtrv MML command, as described in the "Retrieving Provisioning Data" section.
If the provisioned settings for your IP route are correct, proceed to Step 2.
If the provisioned settings for your IP route are incorrect, start a dynamic reconfiguration session to change the settings, as described in the "Modifying IP Routes" section.
Step 2 Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the "Obtaining Technical Assistance" section.
LIF FAIL
This alarm occurs when a local Ethernet interface has failed.
Corrective Action
To correct the problem identified by this alarm, perform the following steps:
Note If the Association Degraded or Association Failed alarms occur along with this alarm, follow the procedure defined in the "Resolving an Association Alarm" section.
Step 1 Verify that the provisioned settings for the identified line interface are correct, using the prov-rtrv MML command, as described in the "Retrieving Provisioning Data" section.
If the provisioned settings for your line interface are correct, proceed to Step 4.
If the provisioned settings for your line interface are incorrect, proceed to Step 2.
Step 2 Place the identified line interface in the out-of-service administrative state, as described in the "Setting the Administrative State" section of the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
Start a dynamic reconfiguration session to change the settings, as described in the "Invoking Dynamic Reconfiguration" section of the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
Step 3 Place the identified line interface in the in-service administrative state, as described in the "Setting the Administrative State" section of the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
If that does not resolve the problem, proceed to Step 4.
Step 4 Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the "Obtaining Technical Assistance" section.
Wrong IP Path
This alarm occurs when an IP route or local interface associated with the identified component cannot be used. This can happen when one of the following occurs:
•A route has been overridden by another route in the operating system routing table.
•A route configured on your system has been deleted using the UNIX command route delete.
•An IP link or route has been provisioned incorrectly.
Corrective Action
This alarm can also occur if an IP signaling channel has been misconfigured. Use the netstat -rnv UNIX command to retrieve the current operating system routing table.
To correct the problem identified by this alarm, perform the following steps:
Step 1 Log in to the active Cisco MGC and retrieve the current operating system routing table using the following UNIX command:
netstat -rnv
The system returns a response similar to the following:
IRE Table: IPv4 Destination Mask Gateway Device Flags ----------------- ---------------- -------------- ------ ----- 10.82.80.0 255.255.255.0 10.82.82.1 UGH 10.82.81.0 255.255.255.0 10.82.83.1 UGH 10.82.82.0 255.255.255.0 10.82.82.112 hme0 U 10.82.83.0 255.255.255.0 10.82.83.112 hme1 U default 0.0.0.0 10.82.82.1 UG 224.0.0.0 240.0.0.0 10.82.82.112 hme0 U 127.0.0.1 255.255.255.255 127.0.0.1 lo0 UH
Step 2 If the response does not contain the route identified in the alarm, open the operating system routing table file using a text editor such as vi. Otherwise, proceed to Step 5.
Step 3 Add the route to the routing table using the appropriate text editor command.
Step 4 Save the file and exit the editing session. If this resolves the problem, the procedure is complete. Otherwise, proceed to Step 5.
Step 5 Verify that the provisioned settings for the identified IP link are correct, using the prov-rtrv MML command, as described in the "Retrieving Provisioning Data" section.
If the provisioned settings for your IP link are correct, proceed to Step 6.
If the provisioned settings for your IP link are incorrect, start a dynamic reconfiguration session to change the settings, as described in the "Invoking Dynamic Reconfiguration" section of the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
Step 6 Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the "Obtaining Technical Assistance" section.
Signaling Channel Troubleshooting Procedures
The following signaling channel troubleshooting procedures are new for this feature:
• Resolving an Association Alarm
• Setting the Service State of an Association
• Setting the Service State of an IP Route
Resolving an Association Alarm
When referred here by an alarm indicating a failure on an association, perform the following steps:
Step 1 If this alarm occurs along with a LIF FAIL alarm on the local IP address (ADDR1 and ADDR2), proceed to Step 2. Otherwise, proceed to Step 4.
Step 2 Verify the functioning of the cabling between the Cisco MGC and the LAN switch.
If the cables are functioning properly, proceed to Step 3.
If bad cable(s) are found, replace them. If that resolves the problem, the procedure is complete. Otherwise, proceed to Step 3.
Step 3 Verify the functioning of the associated LAN switch. Refer to the documentation for your LAN switch for the steps necessary for verifying its proper functioning.
If the LAN switch is functioning properly, proceed to Step 6.
If the LAN switch is not functioning properly, refer to documentation for the LAN switch for the appropriate troubleshooting procedures. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 4 Debug the IP connectivity between the Cisco MGC and the associated access server.
If the IP connectivity is working correctly, proceed to Step 5.
If the IP connectivity is not working correctly, fix the identified problem. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 5.
Step 5 Determine the health of the associated access server.
If the access server is working correctly, proceed to Step 6.
If the access server is not healthy, fix the problem using the procedures in the user documentation for the access server. If that corrects the problem, the procedure is complete. Otherwise, proceed to Step 6.
Step 6 Contact the Cisco TAC to further analyze the problem and determine a solution. For more information about contacting the Cisco TAC, refer to the "Obtaining Technical Assistance" section.
Setting the Service State of an Association
To change the service state of an association, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-association:assoc_name:serv_state[,confirm]
Where:
•assoc_name—MML name of the association you want to modify.
•serv_state—Service state to which you want to change. Valid values for IP links are IS, OOS, and FOOS.
•confirm—This parameter is required when you are setting the service state to OOS or FOOS.
Note This command cannot be used on the standby Cisco MGC.
For example, to set the service state of the association, assoc1, to OOS, enter the following command:
set-association:assoc1:OOS,confirm
You can verify that the selected association is in the proper service state by performing the procedure in the "Retrieving the Service State for Associations" section.
Setting the Service State of an IP Route
To change the service state of an IP route, log in to the active Cisco MGC, start an MML session, and enter the following command:
set-iproute:iproute_name:serv_state[,confirm]
Where:
•iproute_name—MML name of the IP route you want to modify.
•serv_state—Service state to which you want to change. Valid values for IP links are IS, OOS, and FOOS.
•confirm—This parameter is required when you are setting the service state to OOS or FOOS.
Note This command cannot be used on the standby Cisco MGC.
An IP route in any of the following combinations of primary and secondary service states can be set to OOS or FOOS:
•IS
•OOS, CONF
•OOS, OFF_DUTY
•OOS, STDBY
For an IP route to be set to IS, it must have a primary service state of OOS and secondary service state of COOS.
For example, you would enter the following command to set the service state of an IP route called iprte1 to OOS:
set-iproute:iprte1:OOS,confirm
Note You can verify that the selected IP route is in the proper service state by performing the procedure in the "Retrieving the Service State for IP Routes" section.
Monitoring and Maintaining
The following sections contain the procedures required for proper monitoring and maintenance of this feature. For more information on operational tasks for the rest of the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide
Regular Operations
Introduction of this feature requires the new procedures for managing signaling channels.
Managing Signaling Channels
The following sections are new or modified for Release 9.4:
• Retrieving the Service State for Associations
• Retrieving the Service State for IP Routes
Retrieving the Service State for Associations
To retrieve the service state for an individual association, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-association:assoc_name
For example, to retrieve the service state of an association called assoc1, enter the following command:
rtrv-association:assoc1
The system returns a message similar to the following:
Media Gateway Controller 2000-03-26 20:26:18
M RTRV
"assoc1:IS"
To retrieve attributes for all of the associations, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-association:all
The system returns a message similar to the following:
Media Gateway Controller 2000-03-26 19:23:23
M RTRV
"assoc1:OOS
"assoc2:OOS
"assoc3:OOS
"assoc4:OOS
The valid service states for an association are described in the following sections. If the association is in any other state than IS, attempt to bring it into service, as described in the "Resolving an Association Alarm" section.
Association Primary Service States
The PST field shows the current primary service state of the association. Table 1 lists the valid primary service state values:
Association Secondary Service States
The SST field shows the current secondary service state of the specified association. Table 2 lists the valid secondary service state values:
Retrieving the Service State for IP Routes
To retrieve the service state for an individual IP route, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-iproute:iproute_name
For example, to retrieve the service state of an IP route called iprte1, enter the following command:
rtrv-iproute:iprte1
The system returns a message similar to the following:
Media Gateway Controller 2000-03-26 20:26:18
M RTRV
"iprte1:IS"
To retrieve attributes for all of the IP routes, log in to the active Cisco MGC, start an MML session, and enter the following command:
rtrv-iproute:all
The system returns a message similar to the following:
Media Gateway Controller 2000-03-26 19:23:23
M RTRV
"iprte1:IS
"iprte2:IS
The valid service states for an IP route are described in the following sections. If the route is in any other state than IS, attempt to bring it into service, as described in the "Setting the Service State of an IP Route" section.
IP Route Primary Service States
The PST field shows the current primary service state of the IP route. Table 3 lists the valid primary service state values:
IP Route Secondary Service States
The SST field shows the current secondary service state of the specified IP route. Table 4 lists the valid secondary service state values:
Configuration Example
This section provides a configuration example of the associated XECfgParm.dat parameters for this feature. Additional configuration examples for the Cisco MGC software can be found in the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.
Note Configuration of XECfgParm.dat parameters for this feature is only required when the Cisco MGC hosts are not in the same subnet.
*.IP_NextHop1 = 147.21.135.10 *.IP_NextHop2 = 147.15.170.11 *.IP_NextHop3 = 0.0.0.0 *.IP_NextHop4 = 0.0.0.0 *.IP_NextHop5 = 0.0.0.0 *.IP_NextHop6 = 0.0.0.0 *.IP_NextHop7 = 0.0.0.0 *.IP_NextHop8 = 0.0.0.0
Provisioning Example
This section provides an examples of provisioning for this feature. Additional examples of provisioning for the Cisco MGC software can be found in the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
________________________________________
; IP Route
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:IPROUTE:NAME="iprte1",DEST="10.82.80.0",NETMASK="255.255.255.0",NEXTHOP="10.82.82 .1",IPADDR="IP_Addr1",DESC="IP Route 1"
prov-add:IPROUTE:NAME="iprte2",DEST="10.82.81.0",NETMASK="255.255.255.0",NEXTHOP="10.82.82 .1",IPADDR="IP_Addr2",DESC="IP Route 2"
________________________________________
; SS7 External Node
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:extnode:NAME="va-2600-165",TYPE="SLT",DESC="2611 SLT RUDP E1"
prov-add:extnode:NAME="va-2600-166",TYPE="SLT",DESC="2611 SLT RUDP E1"
________________________________________
; Point Codes
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:OPC:NAME="opc",DESC="Own pointcode",NETADDR="1.1.3",NETIND=2,TYPE="TRUEOPC"
prov-add:DPC:NAME="dpc1",DESC="Destination pointcode1",NETADDR="1.1.1",NETIND=2
prov-add:DPC:NAME="dpc2",DESC="Destination pointcode2",NETADDR="1.1.2",NETIND=2
________________________________________
; Signal Services to Inet via SLT
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:SS7PATH:NAME="ss7svc1",DESC="SS7 to dpc1",DPC="dpc1", OPC="opc", MDO="Q761_BASE"
prov-add:SS7PATH:NAME="ss7svc2",DESC="SS7 to dpc2",DPC="dpc2", OPC="opc", MDO="Q761_BASE"
________________________________________
; SS7 linksets
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:LNKSET:NAME="ls1",DESC="linkset 1 to dpc1",APC="dpc1",PROTO="SS7-ITU",TYPE="IP"
prov-add:LNKSET:NAME="ls2",DESC="linkset 2 to dpc2",APC="dpc2",PROTO="SS7-ITU",TYPE="IP"
________________________________________
; SS7 route
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:SS7ROUTE:NAME="rte1",DESC="SS7 Rte 1-dpc1",OPC="opc",DPC="dpc1",LNKSET="ls1",PRI=1
prov-add:SS7ROUTE:NAME="rte2",DESC="SS7 Rte 2-dpc2",OPC="opc",DPC="dpc2",LNKSET="ls2",PRI=1
________________________________________
; Sessionset
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:sessionset:NAME="slt1",ipaddr1="IP_Addr1",ipaddr2="IP_Addr2", PORT=7000, PEERADDR1="10.82.80.188",PEERADDR2="10.82.81.165",PEERPORT=7000,extnode="va-2600-165", TYPE="BSMV0",IPROUTE1="iprte1", IPROUTE2="iprte2"
prov-add:sessionset:NAME="slt2",ipaddr1="IP_Addr1",ipaddr2="IP_Addr2", PORT=7000,PEERADDR1="10.82.80.191",PEERADDR2="10.82.81.166",PEERPORT=7000, extnode="va-2600-166", TYPE="BSMV0",IPROUTE1="iprte1", IPROUTE2="iprte2"
________________________________________
; C7IPLinks
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:C7IPLNK:NAME="ls1lk1",DESC="SS7ANSI", LNKSET="ls1", sessionset="slt1",SLC=0,PRI=1,TIMESLOT=0
prov-add:C7IPLNK:NAME="ls2lk1",DESC="SS7ANSI", LNKSET="ls2",sessionset="slt1",SLC=0,PRI=1,TIMESLOT=2
prov-add:C7IPLNK:NAME="ls1lk2",DESC="SS7ANSI", LNKSET="ls1", sessionset="slt2",SLC=1,PRI=1,TIMESLOT=0
prov-add:C7IPLNK:NAME="ls2lk2",DESC="SS7ANSI", LNKSET="ls2",sessionset="slt2",SLC=1,PRI=1,TIMESLOT=2
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
; External Node
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:EXTNODE:NAME="va-3660-20",TYPE="AS3660",DESC="IUA DPNSS", ISDNSIGTYPE="IUA"
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
; SCTP Association
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
prov-add:ASSOCIATION:NAME="dpnssassoc2",ipaddr1="IP_Addr3",ipaddr2="IP_Addr4", PEERADDR1="10.82.80.31",PEERADDR2="10.82.81.31", extnode="va-3660-20", TYPE="IUA",IPROUTE1="iprte1",IPROUTE2="iprte2"
Command Reference
This section documents new, modified, or deleted Man-Machine Language (MML) commands. All other commands are documented in the Cisco Media Gateway Controller Software Release 9 MML Command Reference Guide.
New MML Commands
This section contains the MML commands that are new for this feature.
RTRV-ASSOCIATION—Display State of SCTP Association
RTRV-IPROUTE—Display Primary and Secondary States of an IP Route
SET-ASSOCIATION—Changing Association Primary State
SET-IPROUTE—Changing IP Route Primary State
Modified MML Commands
This section contains the MML commands that were modified for this feature.
PROV-ADD—Add Provisioning Component
PROV-DLT—Delete Components or Parameters
PROV-ED—Modify Provisioned Component
RTRV-IPLNK—Display Primary and Secondary States of an IP Link
Reference Information
The following sections contain reference material related to this feature. Information is included on the following areas:
• Alarms
XECfgParm.dat Parameters
The XECfgParm.dat file configuration parameters added for this feature are in the table below.
For information on the other XECfgParm.dat parameters, refer to the Cisco Media Gateway Controller Software Release 9 Installation and Configuration Guide.
Alarms
This section contains the alarms that are added and modified to support this feature. For information on the other alarms for the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Messages Reference Guide.
New Alarms
The alarms that are added for this feature are listed below.
Association Degraded
Description A destination address of the association has failed, and the association is still in an UP state.
Severity Minor
Cause This alarm is reported when one of the association destination addresses has failed.
Type 1 (Communication error).
Action Refer to the "Association Degraded" section.
Association Fail
Description The SCTP association has failed.
Severity Major
Cause This alarm is reported when the destination node is out of service or there is an IP connectivity failure.
Type 1 (Communication error)
Action Refer to the "Association Fail" section.
Wrong IP Path
Description The IP route or local interface provisioned for the specified component is not being used.
Severity Minor
Cause This alarm is reported when generic analysis cannot access the conditional route description table.
Type 1 (Communication error).
Action Refer to the "Wrong IP Path" section.
Modified Alarms
The alarms that are modified for this feature are described in the following section.
IP RTE CONF FAIL
Description IP route is out of service due to a configuration failure.
Severity Information
Cause This existing alarm is now generated against the IP route components instead of signal channel components Indicates that an IP route is out of service because of a configuration failure.
Type 1 (No error)
Action Refer to the "IP RTE CONF FAIL" section.
IP RTE FAIL
Description IP route is out of service. This existing alarm is now generated by IP route objects instead of the signal channel components.
Severity Information
Cause Indicates that an IP route is out of service.
Type 1 (No error)
Action Refer to the "IP RTE FAIL" section.
LIF FAIL
Description Line interface failure.
Severity Major
Cause This existing alarm is now generated against local interface components. The line interface (LIF) has failed. All physical lines to the Cisco MGC and local interface components can raise this alarm.
Type 4 (Equipment error alarm)
Action Refer to the "LIF FAIL" section.
M-OOS
Description Resource has been manually taken OOS.
Severity Minor
Cause A software process not necessary for normal system operation has been requested manually out of service. This existing alarm is now generated against IP route components.
Type 1 (Communication alarm)
Action Restore the process to the in-service state using the user interface. IP routes can be returned to service using the procedure in the "Setting the Service State of an IP Route" section.
Measurements
Table 5 contains the system measurements that are added to support this feature. For information on the other system measurements, refer to the Cisco Media Gateway Controller Software Release 9 Operations, Maintenance, and Troubleshooting Guide.
Components
The sections below contain the provisioning components that are added and modified for this feature. For information on the rest of the components in the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
New Components
The following provisioning components are added for this feature.
DPNSS Signaling Service
The DPNSS signaling service component type represents a DPNSS signaling path that is back-hauled over IP to/from a Network Access Server (destination). Its MML name is as follows:
•MML Name—DPNSSPATH
The DPNSS signaling service component structure is shown in Table 6.
The following parameters cannot be modified:
•NAME
•EXTNODE
The following rules apply when creating or editing DPNSS signaling paths:
•The maximum number of combined DPNSSPATHs and IUA NASPATHs per IUA External Node is 112.
•An ASSOCIATION must be defined with same EXTNODE attribute as the DPNSSPATH. If this ASSOCIATION hasn't been defined when the DPNSSPATH is added/edited, a warning is issued. If the ASSOCIATION still hasn't been defined when provisioning session is copied or deployed, an error message is generated and the copy or deployment is stopped.
•If the ASSOCIATION with the same EXTNODE value as the DPNSSPATH is deleted, a warning message is issued to inform the user that the DPNSSPATH must also be deleted. If it hasn't when the provisioning session is copied or deployed, an error message is generated and the copy or deployment is stopped.
IP Route
The IP route represents a static IP route. Its MML name is as follows:
• MML Name—IPROUTE
The IP route component structure is shown in Table 7.
Note NAME is the only parameter for this command that cannot be modified.
The following rules apply when creating or editing IP Routes:
•The NETMASK attribute is validated by the system. For your provisioning set-up to work correctly, its value (when converted to binary) must have at least one leading 1 and cannot have any trailing 1s after the first 0. The values 255.255.0.0 and 255.255.255.128 are valid. The values 0.0.255.255, 255.0.0.255, and 0.0.0.0 are invalid.
•Ensure the destination resolves to a non-zero address.
•When the resolved destination address is bit ORed with the netmask value, the result is equal to the netmask (for example, a destination of 10.11.12.13 and a netmask of 255.255.0.0 would be invalid because the ORed result would be 255.255.12.13, which is not equal to 255.255.0.0).
•The combination of DESTINATION, NETMASK, and IPADDR must be unique for each IP Route.
•The combination of DESTINATION, NETMASK, and PRI must be unique for each IP Route.
•When an IP Route is specified in a link object (for example, IPLNK, SESSIONSET, or ASSOCIATION), the IP address resolved from the PEERADDR attribute must be checked against the DESTINATION and NETMASK attributes to verify the IPROUTE is valid.
•When an IP Route is specified in a link object (for example, IPLNK, SESSIONSET, or ASSOCIATION), the IPADDR must match the IPADDR of the link.
•When an IPROUTE is not specified for a link object (having that option), the IP Address resolved from the PEERADDR attribute must be checked against the defined IPROUTES to verify that it should not be assigned an IPROUTE. If the PEERADDR is on the same subnet as the DESTINATION (based on the NETMASK), and if the IPADDR matches the IPADDR of the link object, then use IPROUTE.
•If the NEXTHOP attribute is a hostname or symbolic name from XECfgParm.dat, it can resolve to the address 0.0.0.0, which indicates the IPROUTE is not used. The IPROUTE status shows up in the rtrv-iproute:all command output when in the OOS, OFF_DUTY state.
•If the resolved NEXTHOP address is not 0.0.0.0, it must be on the same subnet of the IPADDR.
The commands to retrieve and set the service state of an IP route can be found in the "Retrieving the Service State for IP Routes" section and the "Setting the Service State of an IP Route" section, respectively.
SCTP Association
The SCTP association represents the connection between the Cisco MGC and a Cisco access server. Its MML name is as follows:
• MML Name—ASSOCIATION
The SCTP association component structure is shown in Table 8.
The following parameters cannot be modified:
•NAME
•EXTNODE
•TYPE
•SGP
The following rules apply when creating/editing SCTP associations:
•Only one association with a type of IUA can be assigned to an external node
•If the type of the association is IUA, the associated external node must have its ISDN signaling type set to IUA, and that external node must be able to support IUA signaling.
•If two associations have the same port value, the values of IPADDR1 and IPADDR2 must either be the same or both different.
•The values of IPADDR1 and IPADDR2 must be different
•If the value of IPPRECEDENCE is not ROUTINE, the value of DSCP must be N/A
•If the value of DSCP is not N/A, the value of IPPRECEDENCE must be ROUTINE
•The value of MAXRTO must be greater than or equal to the value of MINRTO
•When a peer IP address (PEERADDR1 or PEERADDR2) is not on the local subnet of IPADDR1 or IPADDR2, that peer IP address cannot be on the subnet of any other local interface, even if it is not defined within the Cisco MGC software
•When a peer IP address (PEERADDR1 or PEERADDR2) is not on the local subnet of IPADDR1 or IPADDR2, an IP route (IPROUTE1 or IPROUTE2, respectively) must be specified
•When an IP route is specified, the values set in PEERADDR1 and PEERADDR2 are checked against the DESTINATION and NETMASK values of the IP route(s) to verify that the IP route is valid.
•When an IP route is specified, its value for IPADDR must match the related IP address of the association. In other words, IPROUTE1 should have an IPADDR that matches IPADDR1 on the association, and IPROUTE 2 should have an IPADDR that matches IPADDR2 on the association.
•When an IP route is not specified, the IP address resolved from the PEERADDR1 or PEERADDR2 parameter is checked against the defined IP routes to verify that it should not be assigned to one of those IP routes. If the peer address is on the same subnet as an IP route, the link should use that IP route.
•The value of PEERADDR1 cannot be 0.0.0.0 or 255.255.255.255, and the value of PEERADDR2 cannot be 255.255.255.255
•When a hostname is specified for a peer IP address, the hostname must resolve to an IP address.
•PEERADDR1 and PEERADDR2 can resolve to the same IP Address. If the external node only has one IP address and two IP addresses (IPADDR1 and IPADDR2) are defined, PEERADDR2 should be set to the same value as PEERADDR1.
•Associations, session sets, IP links, SIP links, and SS7 signaling gateway links that share a peer address (that is, PEERADDR, PEERADDR1, or PEERADDR2) must be assigned directly or indirectly to the same external node
•When you are deleting an association, and a NASPATH uses the same external node, a warning message is issued to inform the you that the NASPATH must also be deleted. If it hasn't when the provisioning session is copied or deployed, an error message will be generated and the copy or deployment will be stopped.
•The value of PORT cannot be set to the same value as the PORT attribute of any IP link, session set, SIP link, or SS7 signaling gateway link
•If a value for IPADDR2 or PEERADDR2 is specified, values for IPADDR1 or PEERADDR1 must also be specified. In other words, you cannot have one local address and two remote addresses, or two local addresses and one remote address.
•An IP link, session set, SS7 signaling gateway link, or another association with a different external or signaling gateway node cannot use the resolved value set in PEERADDR1 or PEERADDR2.
•Only one association can be defined to an SS7 signaling gateway process (SGP)
•A value for EXTNODE can be defined only when the association type is IUA
•A value for SGP can be defined only when the association type is M3UA or SUA
•The maximum number of associations with a type of M3UA is defined in the XECfgParm.dat parameter, M3UA.maxSgp
•The maximum number of associations with a type of SUA is defined in the XECfgParm.dat parameter, SUA.maxSgp
The commands to retrieve and set the service state of an association can be found in the "Retrieving the Service State for Associations" section and the "Setting the Service State of an Association" section, respectively.
Modified Components
The following components are modified for this feature.
External Node
The external node component type represents another node with which the MGC communicates. Its MML name is as follows:
•MML Name—EXTNODE
The parameters for EXTNODE are defined in Table 9.
Table 9 External Node Component Structure
Parameter MML Name Parameter Description Parameter Values (Default) NAMEMML name
The name can be as many as 20 alphanumeric characters. No special characters other than "-" are allowed. The name should begin with a letter.
DESCComponent description
The description can be up to 128 characters.
TYPE
The type of the external node
Valid values can be found in the "External Node Types" section.
ISDNSIGTYPE
ISDN Signaling Type
Valid values are IUA or N/A (default is N/A). Added this parameter in software Release 9.4(1)T.
GROUP
M3UA/SUA Group Number
Value is 1-100 for M3UA or SUA nodes. Value is 0 for nodes that do not support M3UA or SUA. Added this parameter in software Release 9.4(1)T.
Note DESC is the only parameter for this command that can be modified:
The following rules apply when creating/editing external nodes:
•TYPE must be one of the valid external node types.
•The maximum number of external nodes with an ISDNSIGTYPE of IUA is 256.
External Node Types
Table 10 lists the valid external node types for this release of Cisco MGC software.
Provisioning Worksheets
This section contains worksheets for the provisioning components required for this feature. For worksheets covering the rest of the provisioning components in the Cisco MGC software, refer to the Cisco Media Gateway Controller Software Release 9 Provisioning Guide.
Table 11 External Node Worksheet Example
Name Type ISDN Signaling Type Group Descriptionva-3600-37
AS3600
iua
DPNSS conn to va-3600-37
Table 12 DPNSS Signaling Service Worksheet Example
Name External Node Customer Group ID DPNSS Side Signaling Port Signaling Slot Descriptiondpnsvc2
va-3660-20
A
0
0
IUA DPNSSpath to GW
Obtaining Technical Assistance
Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.
Cisco.com
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.
Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:
•Streamline business processes and improve productivity
•Resolve technical issues with online support
•Download and test software packages
•Order Cisco learning materials and merchandise
•Register for online skill assessment, training, and certification programs
If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL:
Technical Assistance Center
The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.
Cisco TAC inquiries are categorized according to the urgency of the issue:
•Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration.
•Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.
•Priority level 2 (P2)—Your production network is severely degraded, affecting significant aspects of business operations. No workaround is available.
•Priority level 1 (P1)—Your production network is down, and a critical impact to business operations will occur if service is not restored quickly. No workaround is available.
The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.
Cisco TAC Web Site
You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:
All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:
http://www.cisco.com/register/
If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:
http://www.cisco.com/tac/caseopen
If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.
Cisco TAC Escalation Center
The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.
To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:
http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml
Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.
Glossary
Table 15 contains definitions of acronyms and technical terms used in this feature module.
Posted: Mon Mar 12 16:47:07 PDT 2007
All contents are Copyright © 1992--2007 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.