|
|
This chapter gives an overview of the types of reports available through MPLS VPN Solution and information that is common among the reports.
Table 14-1, "Reports, Descriptions, and Where Explained," provides the performance reports available in MPLS VPN Solution and the locations where these reports are explained in detail.
| Report | Brief Description | Where Explained |
|---|---|---|
Accounting | Provides information about the VPN traffic from different perspectives. | |
Traffic Summary | Time-based drill-down reports that display total packets and total K bytes for traffic that can be mapped to the VPN world (VPN Traffic) and otherwise to Unmappable Traffic. Drill-down reports also for: TOS, application type, customer site, and PE to PE. | |
Application Type Summary | Total packets and total K bytes for each application type. | |
Customer Summary | Total packets and total K bytes for each customer plus drill-down reports for customer site, TOS, and application type. | |
PE to PE Traffic Summary | Report of all traffic between PE to PE plus drill-down reports for: PE to connected CE; PE to remote CE; PE traffic; PE to CE (by TOS). | |
CE to CE Traffic Summary | Report of all traffic between CE to CE. | |
Type of Service Summary | Total packets and total K bytes for each TOS. | |
Customer Traffic Volume (CECE) | Report of the traffic volume for a specific customer between customer edge router (CE) to CE in packets or K bytes (by TOS). | |
Network Traffic Volume (PEPE) | Report of traffic volume between provider edge router (PE) to PE in packets of K bytes (by TOS). | |
Traffic Volume (PECE) | Report of all traffic between PE to CE (by TOS). | |
Auditing Reports | Report of the details of the audit sequence and its results. | |
CAR MIB Reports | Report of the CAR MIB status for specific managed customer CE routers and for specific PE routers. | |
Data Reports | Overview report of all collected data. | |
List All New Service Requests | Overview report of all service requests with the state of New. | |
List All Service Requests | Overview report of all service requests in the system. | |
SLA Reports | Performance reports that show collection information about Service Assurance Agents (SA Agent) data for SLA monitoring. | |
Time-based drill-down reports that show connectivity as a percentage, maximum delay in milliseconds, and threshold violations as a percentage. | ||
Time-based drill-down reports that show the source to destination direction and the destination to source direction for each of the Jitter arguments. | ||
Time-based drill-down reports that show the Summary HTTP Report and HTTP Stages Report. | ||
Customer Packet Drop (CECE) | Reports that show the packet drop percentage among CEs of a specific customer, measured for jitter protocol only and aggregated by COS. | |
Customer Round Trip Delay (CECE) | Reports that show the Max/Min and Avg. Round trip time among CEs of a specific customer aggregated by COS. | |
Network Packet Drop (PEPE) | Reports that show the packet drop percentage among all the PEs, shadow SA Agents, in the network, measured for jitter protocol only and aggregated by COS. | |
Network Round Trip Delay (PEPE) | Reports that show the Max/Min and Avg. Round trip time among PEs, shadow SA Agents, in the network aggregated by COS. | |
SLA Definition | Report that shows all the service level agreement (SLA) definitions on the SA Agent routers from which data was collected. | |
Verification Reports | Report that provides connectivity status information for collection tasks, except for collections that use SNMP. | |
wdperf Reports (self-monitoring) | Reports that show information about system performance and resource utilization. | |
% CPU | Report that shows the average, minimum, or maximum % of CPU utilization per time period. | Average, Minimum, and Maximum % CPU Utilization per Time Period |
% Memory | Report that shows the average, minimum, or maximum % of memory utilization per time period. | Average, Minimum, and Maximum % Memory Usage per Time Period |
Virtual Memory | Report that shows the average, minimum, or maximum virtual memory in K bytes per time period. | Average, Minimum, and Maximum Virtual Memory Usage per Time Period |
Figure 14-1, "Sample Reports Window," gives an example of a report and can be used to identify the following structure of a report window:

The Status Row is the first row of information after the title bar. Some of the information shown in the Status Row in Figure 14-1, "Sample Reports Window," only appears for specific reports. The information and buttons are described from left to right, as follows:

The information in the Results area varies based on the specific report. This information is explained in the specific report. See Table 14-1, "Reports, Descriptions, and Where Explained," for references to details about specific reports.
The row of filter information has the following components:
The filter mechanism is used to display only the report/list entries that interest you in a window's Results area. Upon specifying a case insensitive filter pattern, press Return. If the filter matches any field in a row, the entire row is displayed. The number of entries displayed as a result of a filter pattern match and the total number of entries are displayed after the Filter field. For example: 2/4.
Click this button to bring up the Advanced Filter dialog window, as shown in Figure 14-3, "Advanced Filter Window."

The information about the Advanced Filter window is explained in the following categories:
The bottom task bar contains actions allowed on the current report, usually one button per action or group of actions. The information in the bottom task bar varies based on the report type. Elements that are specific to a report are explained in that report. See Table 14-1, "Reports, Descriptions, and Where Explained," for references to details about specific reports. When a button is grayed out, it is not available in the current situation. The following buttons are common for performance reports:
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Sep 21 12:24:20 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.