|
|
This chapter describes the basic tasks for configuring Cisco DSLAM general system features such as access control and basic DSLAM management. These sections describe these tasks:
The role of the administration interface is to provide a simple, command-line interface to all internal management and debugging DSLAM facilities. This section describes the system management tasks you need to perform to maximize system performance.
To create and configure a command alias, perform these tasks in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
| |
2 |
|
|
3 |
|
|
To display all aliases, use the privileged EXEC command:
Command | Task |
|---|---|
|
|
To make adjustments to initial buffer pool settings and to the limits at which temporary buffers are created and destroyed, use the global configuration command:
Command | Task |
|---|---|
|
|
|
|
To display the buffer pool statistics, use the privileged EXEC command:
Command | Task |
|---|---|
|
To specify the frequency with which the DSLAM sends Cisco Discover Protocol (CDP) updates, perform the tasks in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
3 |
|
|
To reset CDP traffic counters to zero (0) on your DSLAM, perform the tasks in privileged EXEC mode:
Step | Command | Task |
|---|---|---|
1 |
| |
2 |
|
|
To show the CDP configuration, use the privileged EXEC commands:
Command | Task |
|---|---|
| |
|
|
|
|
|
|
|
|
To log on to the DSLAM at a specified level, use the EXEC command:
Command | Task |
|---|---|
|
To configure the enable password for a given level, use the global configuration command:
Command | Task |
|---|---|
|
To change the length of time for which data is used to compute load statistics, perform these tasks, beginning in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
To log messages to a syslog server host, use the global configuration commands:
Command | Task |
|---|---|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
To enable Extended Terminal Access Controller Access Control System (TACACS+) authentication for logins, perform these steps, beginning in global configuration mode:
Command | Task |
|---|---|
| |
|
To control the maximum amount of time that can elapse without running the lowest-priority system processes, use these global configuration commands:
Command | Task |
|---|---|
|
|
|
|
To configure miscellaneous system services, use these global configuration commands:
Command | Task |
|---|---|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
To create or update an access policy, use these global configuration commands:
Command | Task |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
To display the SNMP status, use the EXEC command:
Command | Task |
|---|---|
|
|
To establish a username-based authentication system at login, use the global configuration commands:
This section describes how to configure and display the privilege level access to the DSLAM. You can configure access privileges at the global level for the entire DSLAM, or at the line level for a specific line.
To set the privilege level for a command, use the global configuration command:
Command | Task |
|---|---|
|
|
To display your current level of privilege, use the privileged EXEC command:
Command | Task |
|---|---|
|
|
To set the default privilege level for a line, perform these tasks, beginning in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
To display your current level of privilege, use the privileged EXEC command:
Command | Task |
|---|---|
|
This section describes how to configure the Network Time Protocol (NTP) on the DSLAM.
To control access to the system NTP services, use the global NTP configuration commands in this section. To remove access control to the system's NTP services, use the no ntp command. See the example configuration at the end of this section and the output examples to confirm the NTP configuration.
To view a list of the NTP commands enter a ? in EXEC configuration mode. This example shows the list of commands available for NTP configuration:
DSLAM(config)# ntp ? access-group Control NTP access authenticate Authenticate time sources authentication-key Authentication key for trusted time sources broadcastdelay Estimated round-trip delay clock-period Length of hardware clock tick master Act as NTP master clock max-associations Set maximum number of associations peer Configure NTP peer server Configure NTP server source Configure interface for source address trusted-key Key numbers for trusted time sources update-calendar Periodically update calendar with NTP time
To control access to the system NTP services, use the global configuration command:
Command | Task |
|---|---|
|
|
To enable NTP authentication, perform these steps in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
To specify that a specific interface should send NTP broadcast packets, perform these steps, beginning in Global Configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
As the NTP compensates for any error in the system clock, it keeps track of the correction factor needed to correct this error. The system automatically saves this correction factor into the system configuration using the ntp clock-period global configuration command.
![]() |
Caution Do not enter the ntp clock-period command. It is documented for informational purposes only. The system automatically generates this command as the NTP determines the clock error and compensates. |
To prevent an interface from receiving NTP packets, perform these steps, beginning in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
To configure the DSLAM as a NTP master clock to which peers synchronize themselves when an external NTP source is not available, use the global configuration command:
Command | Task |
|---|---|
|
|
To configure the DSLAM as a NTP peer that receives its clock synchronization from an external NTP source, use the global configuration command:
Command | Task |
|---|---|
|
|
To allow the DSLAM system clock to be synchronized by a time server, use the global configuration command
:
Command | Task |
|---|---|
|
|
To use a particular source address in NTP packets, use the global configuration command:
Command | Task |
|---|---|
|
|
To authenticate the identity of a system to which the NTP will synchronize, use the global configuration command:
Command | Task |
|---|---|
|
|
To periodically update the DSLAM calendar from the NTP, use the global configuration command:
Command | Task |
|---|---|
|
|
This example configures the DSLAM to synchronize its clock and calendar to a NTP server, using Ethernet port 0/0:
DSLAM# config terminal Enter configuration commands, one per line. End with CNTL/Z. DSLAM(config)# ntp server 198.92.30.32 DSLAM(config)# ntp source Ethernet 0/0 DSLAM(config)# ntp authenticate DSLAM(config)# ntp max-associations 2000 DSLAM(config)# ntp trusted-key 22507 DSLAM(config)# ntp update-calendar
To show the status of NTP associations, use the privileged EXEC commands:
Command | Task |
|---|---|
| |
|
|
This example displays the DSLAM detail NTP configuration:
DSLAM# show ntp associations detail 198.92.30.32 configured, our_master, sane, valid, stratum 3 ref ID 171.69.2.81, time B6C04E67.6E779000 (18:18:15.431 UTC Thu Feb 27 1997) our mode client, peer mode server, our poll intvl 128, peer poll intvl 128 root delay 109.51 msec, root disp 377.38, reach 377, sync dist 435.638 delay -3.88 msec, offset 7.7674 msec, dispersion 1.57 precision 2**17, version 3 org time B6C04F19.437D8000 (18:21:13.263 UTC Thu Feb 27 1997) rcv time B6C04F19.41018C62 (18:21:13.253 UTC Thu Feb 27 1997) xmt time B6C04F19.41E3EB4B (18:21:13.257 UTC Thu Feb 27 1997) filtdelay = -3.88 -3.39 -3.49 -3.39 -3.36 -3.46 -3.37 -3.16 filtoffset = 7.77 6.62 6.60 5.38 4.13 4.43 6.28 12.37 filterror = 0.02 0.99 1.48 2.46 3.43 4.41 5.39 6.36
This example displays the DSLAM NTP status:
DSLAM# show ntp status Clock is synchronized, stratum 4, reference is 198.92.30.32 nominal freq is 250.0000 Hz, actual freq is 249.9999 Hz, precision is 2**24 reference time is B6C04F19.41018C62 (18:21:13.253 UTC Thu Feb 27 1997) clock offset is 7.7674 msec, root delay is 113.39 msec root dispersion is 386.72 msec, peer dispersion is 1.57 msec
If no other source of time is available, you can manually configure the current time and date after the system is restarted. The time setting remains accurate until the next system restart. Cisco recommends that you use manual configuration only as a last resort.
![]() |
Note If you have an outside source to which the DSLAM can synchronize, you do not need to manually set the system clock. |
To configure, read, and set the DSLAM as a time source for a network based on its calendar, perform these steps in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
| |
2 |
|
|
3 |
|
|
To manually read and set the calendar for the DSLAM system clock, perform these steps in privileged EXEC mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
3 |
|
|
To display the system clock information, use the EXEC command:
Command | Task |
|---|---|
|
To set the system calendar, use the privileged EXEC command:
Command | Task |
|---|---|
|
|
To display the system calendar information, use the EXEC command:
Command | Task |
|---|---|
|
You can configure the DSLAM to use one of three special TCP/IP protocols related to Terminal Access Controller Access Control System (TACACS): regular TACACS, extended TACACS, or AAA/TACACS+. TACACS services are provided by and maintained in a database on a TACACS server running on a workstation. You must have access to and configure a TACACS server before configuring the TACACS features described in this publication on your Cisco device. Cisco basic TACACS support is modeled after the original Defense Data Network (DDN) application.
A comparative description of the supported versions follows. Table 4-1 compares the versions by commands.
You can establish TACACS-style password protection on both user and privileged levels of the system EXEC.
| Command | TACACS | Extended TACACS | TACACS+ |
|---|---|---|---|
aaa accounting |
|
| X |
aaa authentication arap |
|
| X |
aaa authentication enable default |
|
| X |
aaa authentication login |
|
| X |
aaa authentication local override |
|
| X |
aaa authentication ppp |
|
| X |
aaa authorization |
|
| X |
aaa new-model |
|
| X |
arap authentication |
|
| X |
arap use-tacacs | X | X |
|
enable last-resort | X | X |
|
enable use-tacacs | X | X |
|
login authentication |
|
| X |
login tacacs | X | X |
|
ppp authentication | X | X | X |
ppp use-tacacs | X | X | X |
tacacs-server attempts | X | X | X |
tacacs-server authenticate | X | X |
|
tacacs-server extended |
| X |
|
tacacs-server host | X | X | X |
tacacs-server key |
|
| X |
tacacs-server last-resort | X | X |
|
tacacs-server notify | X | X |
|
tacacs-server optional-passwords | X | X |
|
tacacs-server retransmit | X | X | X |
tacacs-server timeout | X | X | X |
This section describes the features available with TACACS and Extended TACACS. The Extended TACACS software is available using FTP (see the README file in the ftp.cisco.com directory).
![]() |
Note You cannot use several original TACACS and extended TACACS commands after you initialize AAA/TACACS+. To identify which commands you can use with the three versions, refer to Table 4-1. |
These sections describe TACACS configuration:
To enable the AAA access control model that includes TACACS+, use the global configuration command:
Command | Task |
|---|---|
|
To enable the AAA accounting of requested services for billing or security purposes when using TACACS+, perform these steps in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
| |
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
| |
7 |
| |
8 |
|
To configure a TACACS server, perform these steps in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
7 |
|
|
8 |
|
|
9 |
|
|
To enable Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) and to enable an AAA authentication method on an interface, perform these steps, beginning in global configuration mode:
Step | Command | Task |
|---|---|---|
1 |
|
|
2 |
| |
3 |
|
To enable TACACS to determine whether a user can access the privileged command level, use the global configuration command:
Command | Task |
|---|---|
|
This section describes the commands you use to monitor and display the system management functions.
To display information about the active processes, use the privileged EXEC commands:
Command | Task |
|---|---|
| |
|
|
To display the configured protocols, use the privileged EXEC command:
Command | Task |
|---|---|
|
To monitor the stack utilization of processes and interrupt routines, use the privileged EXEC command:
Command | Task |
|---|---|
|
|
The show stacks display includes the reason for the last system reboot. If the system was reloaded because of a system failure, a saved system stack trace is displayed. This information is of use only to Cisco engineers analyzing system failure in the field. It is included here in case you need to read the displayed statistics to an engineer over the telephone.
To discover the IP routes that the switch packets take when the packets travel to their destination, use the EXEC command:
Command | Task |
|---|---|
|
|
To display temperature and voltage information on the DSLAM console, use the EXEC commands:
Command | Task |
|---|---|
| |
|
|
|
|
|
|
To diagnose basic ATM and IP network connectivity, use the privileged EXEC command:
Command | Task |
|---|---|
|
|
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue Sep 19 10:54:25 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.