Cisco Cisco Packet Data Gateway (PDG)
System Logs
▀ Configuring Trace Logging
▄ ASR 5000 System Administration Guide, StarOS Release 18
188
Configuring Trace Logging
Trace logging is useful for quickly resolving issues for specific sessions that are currently active. They are temporary
filters that are generated based on a qualifier that is independent of the global event log filter configured using the
logging filter command in the Exec mode. Like event logs, however, the information generated by the logs is stored in
the active memory buffer.
filters that are generated based on a qualifier that is independent of the global event log filter configured using the
logging filter command in the Exec mode. Like event logs, however, the information generated by the logs is stored in
the active memory buffer.
All debug level events associated with the selected call are stored.
Important:
Trace logs impact session processing. They should be implemented for debug purposes only.
Use the following example to configure trace logs in the Exec mode:
[local]host_name# logging trace { callid call_id | ipaddr ip_address | msid ms_id
| username username }
| username username }
Once all of the necessary information has been gathered, the trace log can be deleted by entering the following
command:
command:
[local]host_name# no logging trace { callid call_id | ipaddr ip_address |
msid ms_id | username username }
msid ms_id | username username }
Configuring Monitor Logs
Monitor logging records all activity associated with all of a particular subscriber’s sessions. This functionality is
available in compliance with law enforcement agency requirements for monitoring capabilities of particular subscribers.
available in compliance with law enforcement agency requirements for monitoring capabilities of particular subscribers.
Monitors can be performed based on a subscriber’s MSID or username, and are only intended to be used for finite
periods of time as dictated by the law enforcement agency. Therefore, they should be terminated immediately after the
required monitoring period.
periods of time as dictated by the law enforcement agency. Therefore, they should be terminated immediately after the
required monitoring period.
This section provides instructions for enabling and disabling monitor logs.
Enabling Monitor Logs
Use the following example to configure monitor log targets:
configure
logging monitor { ip_addr | ipv6_addr | msid id | username name }
end
Repeat to configure additional monitor log targets.