Cisco Cisco TelePresence Video Communication Server Expressway 문제 해결 가이드
rx_crc_errors: 0
rx_frame_errors: 0
rx_no_buffer_count: 0
rx_missed_errors: 0
tx_aborted_errors: 0
tx_carrier_errors: 0
tx_fifo_errors: 0
tx_heartbeat_errors: 0
tx_window_errors: 0
tx_abort_late_coll: 0
tx_deferred_ok: 0
tx_single_coll_ok: 0
tx_multi_coll_ok: 0
tx_timeout_count: 0
tx_restart_queue: 0
rx_long_length_errors: 0
rx_short_length_errors: 0
rx_align_errors: 0
tx_tcp_seg_good: 115846
tx_tcp_seg_failed: 0
rx_flow_control_xon: 465
rx_flow_control_xoff: 465
tx_flow_control_xon: 0
tx_flow_control_xoff: 0
rx_long_byte_count: 10446941316
rx_csum_offload_good: 12205535
rx_csum_offload_errors: 0
rx_header_split: 0
alloc_rx_buff_failed: 0
tx_smbus: 0
rx_smbus: 0
dropped_smbus: 0
rx_dma_failed: 0
tx_dma_failed: 0
Checking for viruses
You can use the ps aux command from a root console session, to search for the presence of viruses.
For example, to check for the 'war dialler', type:
ps aux | grep svwar.py
This will produce several output lines similar to this if the 'war dialler' is present:
9430 root 20 0 19020 4340 1880 R 1 0.1 0:00.01 python svwar.py -v -d users.txt <address>
The command should produce no output if the virus is not present.
RMA Procedures for Cisco VCS and TelePresence Conductor Appliances Reference Guide (X8.2)
Page 14 of 19
Logs and evidence