|
Table Of Contents
Configuring System Management Functions
Configuring the Cisco Discovery Protocol
Configuring the Enable Password
Configuring Login Authentication
Configuring Miscellaneous System Services
Configuring SNMP Access Policy
Establishing Username Commands
Configuring the Privilege Level
Configuring the Global Privilege Level
Configuring Privilege Level for a Line
Configuring the Network Time Protocol
Configuring the Clock and Calendar
Configuring the Terminal Access Control Access System
Enabling TACACS and Extended TACACS
Testing the System Management Functions
Showing Temperature and Voltage Information
Checking Basic ATM and IP Network Connectivity
Configuring System Management Functions
This chapter describes the basic tasks for configuring Cisco DSLAM general system features such as access control and basic DSLAM management. These sections describe these tasks:
• Configuring the Privilege Level
• Configuring the Network Time Protocol
• Configuring the Clock and Calendar
• Configuring the Terminal Access Control Access System
• Testing the System Management Functions
System Management Tasks
The role of the administration interface is to provide a simple, command-line interface to all internal management and debugging DSLAM facilities. This section describes the system management tasks you need to perform to maximize system performance.
Configuring a Command Alias
To create and configure a command alias, perform these tasks in global configuration mode:
To display all aliases, use the privileged EXEC command:
Command Taskshow aliases [mode]
Display all alias commands, or the alias commands in a specified mode.
Configuring Buffers
To make adjustments to initial buffer pool settings and to the limits at which temporary buffers are created and destroyed, use the global configuration command:
To display the buffer pool statistics, use the privileged EXEC command:
Command Taskshow buffers [all | alloc [dump]]
Display statistics for the buffer pools on the network server.
Configuring the Cisco Discovery Protocol
To specify the frequency with which the DSLAM sends Cisco Discover Protocol (CDP) updates, perform the tasks in global configuration mode:
To reset CDP traffic counters to zero (0) on your DSLAM, perform the tasks in privileged EXEC mode:
To show the CDP configuration, use the privileged EXEC commands:
Configuring the Enable Password
To log on to the DSLAM at a specified level, use the EXEC command:
To configure the enable password for a given level, use the global configuration command:
Command Taskenable password [level level] [encryption-type] password
Configure the enable password.
Configuring the Load-Interval
To change the length of time for which data is used to compute load statistics, perform these tasks, beginning in global configuration mode:
Step Command Task 1interface type slot/port
Select the physical interface to be configured.
2load-interval seconds
Configure the load interval.
Configuring Logging
To log messages to a syslog server host, use the global configuration commands:
Configuring Login Authentication
To enable Extended Terminal Access Controller Access Control System (TACACS+) authentication for logins, perform these steps, beginning in global configuration mode:
Command Taskline [aux | console | vty] line-number
Select the line to configure.
login authentication {default | list-name}
Configure login authentication.
Configuring the Scheduler
To control the maximum amount of time that can elapse without running the lowest-priority system processes, use these global configuration commands:
Configuring Miscellaneous System Services
To configure miscellaneous system services, use these global configuration commands:
Configuring SNMP Access Policy
To create or update an access policy, use these global configuration commands:
To display the SNMP status, use the EXEC command:
Establishing Username Commands
To establish a username-based authentication system at login, use the global configuration commands:
Configuring the Privilege Level
This section describes how to configure and display the privilege level access to the DSLAM. You can configure access privileges at the global level for the entire DSLAM, or at the line level for a specific line.
Configuring the Global Privilege Level
To set the privilege level for a command, use the global configuration command:
To display your current level of privilege, use the privileged EXEC command:
Configuring Privilege Level for a Line
To set the default privilege level for a line, perform these tasks, beginning in global configuration mode:
Step Command Task 1line [aux | console | vty] line-number
Select the line to configure.
2privilege level level
Configure the default privilege level.
To display your current level of privilege, use the privileged EXEC command:
Configuring the Network Time Protocol
This section describes how to configure the Network Time Protocol (NTP) on the DSLAM.
To control access to the system NTP services, use the global NTP configuration commands in this section. To remove access control to the system's NTP services, use the no ntp command. See the example configuration at the end of this section and the output examples to confirm the NTP configuration.
To view a list of the NTP commands enter a ? in EXEC configuration mode. This example shows the list of commands available for NTP configuration:
DSLAM(config)# ntp ?
access-group Control NTP access
authenticate Authenticate time sources
authentication-key Authentication key for trusted time sources
broadcastdelay Estimated round-trip delay
clock-period Length of hardware clock tick
master Act as NTP master clock
max-associations Set maximum number of associations
peer Configure NTP peer
server Configure NTP server
source Configure interface for source address
trusted-key Key numbers for trusted time sources
update-calendar Periodically update calendar with NTP time
To control access to the system NTP services, use the global configuration command:
Command Taskntp access-group {query-only | serve-only | serve | peer} access-list-number
Configure a NTP access group.
To enable NTP authentication, perform these steps in global configuration mode:
Step Command Task 1ntp authenticate
Enable NTP authentication.
2ntp authentication-key number md5 value
Define an authentication key.
To specify that a specific interface should send NTP broadcast packets, perform these steps, beginning in Global Configuration mode:
Step Command Task 1interface type slot/port
Select the physical interface to be configured.
2ntp broadcastdelay microseconds
Configure the system to receive NTP broadcast packets.
As the NTP compensates for any error in the system clock, it keeps track of the correction factor needed to correct this error. The system automatically saves this correction factor into the system configuration using the ntp clock-period global configuration command.
Caution Do not enter the ntp clock-period command. It is documented for informational purposes only. The system automatically generates this command as the NTP determines the clock error and compensates.
To prevent an interface from receiving NTP packets, perform these steps, beginning in global configuration mode:
Step Command Task 1interface type slot/port
Select the physical interface to be configured.
2ntp disable
Disable the NTP receive interface.
To configure the DSLAM as a NTP master clock to which peers synchronize themselves when an external NTP source is not available, use the global configuration command:
To configure the DSLAM as a NTP peer that receives its clock synchronization from an external NTP source, use the global configuration command:
Command Taskntp peer ip-address [version number] [key keyid] [source interface] [prefer]
Configure the DSLAM system clock to synchronize a peer or to be synchronized by a peer.
To allow the DSLAM system clock to be synchronized by a time server, use the global configuration command
:
Command Taskntp server ip-address [version number] [key keyid] [source interface] [prefer]
Configure the DSLAM system clock to allow it to be synchronized by a time server.
To use a particular source address in NTP packets, use the global configuration command:
To authenticate the identity of a system to which the NTP will synchronize, use the global configuration command:
To periodically update the DSLAM calendar from the NTP, use the global configuration command:
Example
This example configures the DSLAM to synchronize its clock and calendar to a NTP server, using Ethernet port 0/0:
DSLAM# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
DSLAM(config)# ntp server 198.92.30.32
DSLAM(config)# ntp source Ethernet 0/0
DSLAM(config)# ntp authenticate
DSLAM(config)# ntp max-associations 2000
DSLAM(config)# ntp trusted-key 22507
DSLAM(config)# ntp update-calendar
To show the status of NTP associations, use the privileged EXEC commands:
Command Taskshow ntp associations [detail]
Display NTP associations.
show ntp status
Display the NTP status.
Examples
This example displays the DSLAM detail NTP configuration:
DSLAM# show ntp associations detail
198.92.30.32 configured, our_master, sane, valid, stratum 3
ref ID 171.69.2.81, time B6C04E67.6E779000 (18:18:15.431 UTC Thu Feb 27 1997)
our mode client, peer mode server, our poll intvl 128, peer poll intvl 128
root delay 109.51 msec, root disp 377.38, reach 377, sync dist 435.638
delay -3.88 msec, offset 7.7674 msec, dispersion 1.57
precision 2**17, version 3
org time B6C04F19.437D8000 (18:21:13.263 UTC Thu Feb 27 1997)
rcv time B6C04F19.41018C62 (18:21:13.253 UTC Thu Feb 27 1997)
xmt time B6C04F19.41E3EB4B (18:21:13.257 UTC Thu Feb 27 1997)
filtdelay = -3.88 -3.39 -3.49 -3.39 -3.36 -3.46 -3.37 -3.16
filtoffset = 7.77 6.62 6.60 5.38 4.13 4.43 6.28 12.37
filterror = 0.02 0.99 1.48 2.46 3.43 4.41 5.39 6.36
This example displays the DSLAM NTP status:
DSLAM# show ntp status
Clock is synchronized, stratum 4, reference is 198.92.30.32
nominal freq is 250.0000 Hz, actual freq is 249.9999 Hz, precision is 2**24
reference time is B6C04F19.41018C62 (18:21:13.253 UTC Thu Feb 27 1997)
clock offset is 7.7674 msec, root delay is 113.39 msec
root dispersion is 386.72 msec, peer dispersion is 1.57 msec
Configuring the Clock and Calendar
If no other source of time is available, you can manually configure the current time and date after the system is restarted. The time setting remains accurate until the next system restart. Cisco recommends that you use manual configuration only as a last resort.
Note If you have an outside source to which the DSLAM can synchronize, you do not need to manually set the system clock.
Configuring the Clock
To configure, read, and set the DSLAM as a time source for a network based on its calendar, perform these steps in global configuration mode:
To manually read and set the calendar for the DSLAM system clock, perform these steps in privileged EXEC mode:
Step Command Task 1clock read-calendar
Manually read the calendar into the DSLAM.
2clock set hh:mm:ss day month year
Manually set the system clock.
3clock update-calendar
Set the calendar.
To display the system clock information, use the EXEC command:
Configuring the Calendar
To set the system calendar, use the privileged EXEC command:
To display the system calendar information, use the EXEC command:
Configuring the Terminal Access Control Access System
You can configure the DSLAM to use one of three special TCP/IP protocols related to Terminal Access Controller Access Control System (TACACS): regular TACACS, extended TACACS, or AAA/TACACS+. TACACS services are provided by and maintained in a database on a TACACS server running on a workstation. You must have access to and configure a TACACS server before configuring the TACACS features described in this publication on your Cisco device. Cisco basic TACACS support is modeled after the original Defense Data Network (DDN) application.
A comparative description of the supported versions follows. Table 4-1 compares the versions by commands.
•TACACS—Provides password checking, authentication, and notification of user actions for security and accounting purposes.
•Extended TACACS—Provides information about protocol translator and DSLAM use. This information is used in UNIX auditing trails and accounting files.
•AAA/TACACS+—Provides more detailed accounting information as well as more administrative control of authentication and authorization processes.
You can establish TACACS-style password protection on both user and privileged levels of the system EXEC.
Enabling TACACS and Extended TACACS
This section describes the features available with TACACS and Extended TACACS. The Extended TACACS software is available using FTP (see the README file in the ftp.cisco.com directory).
Note You cannot use several original TACACS and extended TACACS commands after you initialize AAA/TACACS+. To identify which commands you can use with the three versions, refer to Table 4-1.
These sections describe TACACS configuration:
• Configuring AAA Access Control with TACACS+
• Configuring PPP Authentication
Configuring AAA Access Control with TACACS+
To enable the AAA access control model that includes TACACS+, use the global configuration command:
Configuring AAA Accounting
To enable the AAA accounting of requested services for billing or security purposes when using TACACS+, perform these steps in global configuration mode:
Configuring a TACACS Server
To configure a TACACS server, perform these steps in global configuration mode:
Configuring PPP Authentication
To enable Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) and to enable an AAA authentication method on an interface, perform these steps, beginning in global configuration mode:
To enable TACACS to determine whether a user can access the privileged command level, use the global configuration command:
Testing the System Management Functions
This section describes the commands you use to monitor and display the system management functions.
Showing Active Processes
To display information about the active processes, use the privileged EXEC commands:
Command Taskshow processes [cpu]
Display active processes.
show processes memory
Display memory utilization.
Showing Protocols
To display the configured protocols, use the privileged EXEC command:
Command Taskshow protocols
Display the global and interface-specific status of any configured Level 3 protocol; for example, IP, DECnet, Internet Packet Exchange (IPX), and AppleTalk.
Showing Stacks
To monitor the stack utilization of processes and interrupt routines, use the privileged EXEC command:
The show stacks display includes the reason for the last system reboot. If the system was reloaded because of a system failure, a saved system stack trace is displayed. This information is of use only to Cisco engineers analyzing system failure in the field. It is included here in case you need to read the displayed statistics to an engineer over the telephone.
Showing Routes
To discover the IP routes that the switch packets take when the packets travel to their destination, use the EXEC command:
Showing Temperature and Voltage Information
To display temperature and voltage information on the DSLAM console, use the EXEC commands:
Checking Basic ATM and IP Network Connectivity
To diagnose basic ATM and IP network connectivity, use the privileged EXEC command:
Command Taskping atm interface atm slot/port[.vpt] vpi vci
Use ping to check the ATM network connection.
Posted: Fri Dec 3 13:29:36 PST 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.