Cisco Cisco ASR 5700
Bulk Statistics Configuration Mode Commands
▀ receiver
▄ Command Line Interface Reference, StarOS Release 17
1844
mechanism { { { ftp | sftp } login user_name [ encrypted ] password pwd } | tftp
} }
} }
Specifies the method by which data is transferred to the receiver.
ftp login user_name [ encrypted ] password pwd
: the FTP protocol shall be used for data file
transfer.
user_name
specifies the user to provide for remote system secure logins and must be an
alphanumeric string of 1 through 31 characters. The password to use for remote system authentication is
specified as
specified as
pwd
and must be from 1 to 31 characters or 1 to 64 characters if the
encrypted
keyword is also
specified.
sftp login user_name [ encrypted ] password pwd
: the SFTP protocol shall be used for data file
transfer.
user_name
specifies the user to provide for remote system secure logins and must be an
alphanumeric string of 1 through 31 characters. The password to use for remote system authentication is
specified as
specified as
pwd
and must be from 1 to 31 characters or 1 to 64 characters if the
encrypted
keyword is also
specified.
tftp
: the TFTP protocol is to be used to transfer files.
The
encrypted
keyword is intended only for use by the system while saving configuration scripts. The
system displays the
encrypted
keyword in the configuration file as a flag that the variable following the
password
keyword is the encrypted version of the plain text password. Only the encrypted password is saved
as part of the configuration file.
Usage
Use TFTP methods to reduce transfer times if excessive system resources are being used across the network
for transfer of data.
FTP transfer method allows for login which then provides system logging within the enabled FTP logs.
The initial connection is attempted to the primary receiver. If the primary receiver is unreachable for any
reason, the secondary receiver is used. If the secondary receiver is also unreachable, the system retries after a
delay period where it again attempts to connect to the primary receiver followed by the secondary receiver as
necessary.
for transfer of data.
FTP transfer method allows for login which then provides system logging within the enabled FTP logs.
The initial connection is attempted to the primary receiver. If the primary receiver is unreachable for any
reason, the secondary receiver is used. If the secondary receiver is also unreachable, the system retries after a
delay period where it again attempts to connect to the primary receiver followed by the secondary receiver as
necessary.
Important:
For redundant receivers, configuration changes to the receivers are applied to all existing and all
subsequent data sets pending transfer. If no receiver is configured, bulk statistics will be collected and stored on the
system until the maximum amount of memory is used; they will not be transferred to the receiver(s). When the storage
limit has been reached the oldest information is overwritten. When a receiver is configured for the primary and
secondary target, this command will use both receivers as default if no receiver is specified.
system until the maximum amount of memory is used; they will not be transferred to the receiver(s). When the storage
limit has been reached the oldest information is overwritten. When a receiver is configured for the primary and
secondary target, this command will use both receivers as default if no receiver is specified.
Example
receiver 10.2.3.4 primary mechanism tftp
receiver 10.2.3.5 secondary
no receiver 10.2.3.4