In this section:
Use the request oam
command to perform the following OAM actions.
> request oam accounting cdrServer admin <primary | secondary> forceCurrentServer - Set this server to be the current generateSshPublicKeys - Generate SSH public key resetCdrServerStats - Reset the CDR server statistics
> request oam alarms resetIpPolicingAlarmStatus
> request oam eventLog filterStatus infoLevelLoggingEnable typeAdmin > request oam eventLog filterStatus <node name> <event_type: audit | debug | security | system | trace> <event_class: audit | callproc | directory | netmgmt | policy | resmgmt | routing | security | signaling | sysmgmt | trace> resetStats > request oam eventLog infoLevelLoggingEnable clearInfoLevelLoggingDisabled > request oam eventLog typeAdmin <event_type: acct | audit | debug | packet | security | system | trace> rolloverLogNow
Filter Status Event Log Parameters Parameter Description Event log class filter status table. SBC system name. The type of event log: Event class for each event type: Use this control to reset the value of Events Filtered column of the filterStatus
<system name>
<event type>
audit
– System audit data. These files contain a record of all management interactions that modify the state of the system, and includes all the changes made via the CLI and the Netconf interface. These files use .AUD extensions.debug
– System debugging data. These files have .DBG extensions.memusage
– Process heap memory usage data. These files have .MEM extensions.security
– Security level events. These files have .SEC extensions.system
– System level events. These files have .SYS extensions.trace
– System trace data. These files have .TRC extensions.<event class>
audit
– Audit subsystem.callproc
– Call Processing subsystem.directory
– Directory Services subsystem.netmgmt
– Network Management subsystem.policy
– Policy subsystem.resmgmt
– Resource Management subsystem.routing
– Network Routing subsystem.security
– Security subsystem.signaling
– Signaling subsystem.sysmgmt
– System Management subsystem.trace
– Call Trace subsystem.resetStats
filterStatus
display.
Info Level Logging Enable Event Log Parameter Parameter Description Use this command to re-enable info level logging after it becomes disabled due to system congestion. If this command is executed while the system is still congested, this may cause the system to become further congested. Note: Only issue this command once system congestion dissipates. clearInfoLevelLoggingDisabled
Type Admin Action Command Parameter Description Event Log configuration table for configuration items related to each Event Log type.typeAdmin
event_type –
Specifies the type of event log to roll over:acct
– System account data. These files have .ACT extensions.audit
– System audit data. These files contain a record of all management interactions that modify the state of the system. These files have .AUD extensions. It includes all the changes made via the CLI and the Netconf interface. (This attribute is only available to an Administrator)debug
– System debugging data. These files have .DBG extensions.memusage
– Process heap memory usage data. These files have .MEM extensions.packet
– Packet information details. These files have .PKT extensions. If enabled, stores the packet details to .PKT files.security
– Security level events. These files have .SEC extensions. (This attribute is only available to an Administrator)system
– System level events. These files have .SYS extensions.trace
– System trace data. These files have .TRC extensions.
> request oam localAuth userStatus <account name> deleteRsaKey keyName <key name> disable enable setRsaKey keyName <key name> rsaKey <key> showRsaKey
Modified: for 12.1.4
> request oam tacacsPlusAuthentication tacacsPlusServer <servername> reEnableServer
Command Parameter
Command Description reEnableServer
Use this command to reenable a TACACS+ server and set its status to available. The server is marked 'unavailable' when it is not reachable.
To set an RSA key:
> request oam localAuth userStatus admin setRsaKey keyName Orkney rsaKey "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEQFsIKJx8YqUsrenlSdeBDaaC7okxXKsEjiPQR8V8UnpTMMYqnkyd7ZMvvYgJkEbjxVbunv0S3y+6GN0FVndbV9y9KFNeeTOyTCrokhE4Z2YKmIrGHHqZJ8Gk9/CNS39HLC43I3tn4EPlyQLLZ9S7EVpk7/opzk7z2GkmdG+eYqLWwrK8CFS+oXyWGpXr7KSU22/N8uVa6qLhVMxGzvFf4RKJd6HJuktOihjFsm5aN2LQbjbkVJoPEPjd6dlXKf9/MHc8stHXekdJtxY0kLjJ9GI5zYhJjm5XdU0i31AYE/7j/DM6UgpUSDB1SuEbzapDQmEaEI4+Nj9/hMVK1WIT" result success reason Request to add RSA Key for the user admin is successful
To delete an RSA key:
> request oam localAuth userStatus admin deleteRsaKey keyName Orkney result success reason Request to delete SSH key for user admin is successful.
To view an RSA key:
> request oam localAuth userStatus admin showRsaKey result success reason success rsaKey1 SBX ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDEQFsIKJx8YqUsrenlSdeBDaaC7okxXKsEjiPQR8V8UnpTMMYqnkyd7ZMvvYgJkEbjxVbunv0S3y+6GN0FVndbV9y9KFNeeTOyTCrokhE4Z2YKmIrGHHqZJ8Gk9/CNS39HLC43I3tn4EPlyQLLZ9S7EVpk7/opzk7z2GkmdG+eYqLWwrK8CFS+oXyWGpXr7KSU22/N8uVa6qLhVMxGzvFf4RKJd6HJuktOihjFsm5aN2LQbjbkVJoPEPjd6dlXKf9/MHc8stHXekdJtxY0kLjJ9GI5zYhJjm5XdU0i31AYE/7j/DM6UgpUSDB1SuEbzapDQmEaEI4+Nj9/hMVK1WIT rsaKey2 rsaKey3 rsaKey4 rsaKey5