简介
本文档介绍有关Catalyst 9800历史事件列表的快速参考。
结构
利用9800平台的永远在线日志记录功能,您可以快速轻松地列出特定类型的事件,前提是您知道特定的日志行是什么样子的。
本文围绕“show logging profile wireless”命令的使用,这个命令主要经过所有与无线相关的二进制日志(这些日志始终打开,即使没有启用任何形式的活动调试)。
“start last <time period>”允许返回至日志中的特定时间段。
如果不使用管道限制搜索,该命令将在终端上输出大量数据,这就是所有示例使用具有特定事件的管道的原因。
客户端
列出特定时间内AP从特定客户端收到的关联请求:
myc9800-CL#show logging profile wireless start last 1 hour filter mac 9418.6548.6fb1 | i Association received | MY_AP
2024/07/30 08:55:58.981172447 {wncd_x_R0-0}{1}: [client-orch-sm] [19389]: (note): MAC: 9418.6548.6fb1 Association received. BSSID 38ed.18cb.d7cf, WLAN opendb, Slot 1 AP 38ed.18cb.d7c0, MY_AP, Site tag default-site-tag, Policy tag default-policy-tag, Policy profile test, Switching Central, Socket delay 0ms
列出已成功进行身份验证的客户端:
myc9800-CL#show logging profile wireless start last 10 days | i Authentication Success
2020/09/26 16:41:21.397677 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:04:33.523999 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client d280.eb73.6044
2020/09/26 17:21:59.892585 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:32:09.289109 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 02c0.2901.34c8
2020/09/26 17:41:58.123180 {wncd_x_R0-0}{1}: [ewlc-infra-evq] [19680]: (note): Authentication Success. Resolved Policy bitmap:11 for client 64b5.c66d.13ac
列出获得成功IP地址的客户端:
myc9800-CL#show logging profile wireless start last 10 days | i IP learn successful
2020/09/26 16:41:30.621520 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: DHCP IP: 192.168.1.13
2020/09/26 17:04:37.622905 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: d280.eb73.6044 Client IP learn successful. Method: IP Snooping IP: 192.168.1.36
2020/09/26 17:22:03.830465 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: IP Snooping IP: 192.168.1.13
2020/09/26 17:32:09.966598 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 02c0.2901.34c8 Client IP learn successful. Method: IP Snooping IP: 192.168.1.13
2020/09/26 17:33:30.236544 {wncd_x_R0-0}{1}: [client-iplearn] [19680]: (note): MAC: 3cf7.a4ae.f607 Client IP learn successful. Method: IP Snooping IP: 192.168.1.49
RRM
渠道变革
9800# show logging profile wireless | include history-channel
2020/02/13 10:50:03.297 {wncd_x_R0-0}{2}: [radio-history-channel] [24955]: (note): Channel change for AP5c83.8f6e.4250 Slot:1 Band:802.11a Previous Chan:100 Current Chan:132 chan width: 40 Reason: DCA Algorithm
噪声和干扰值
这需要设置“set platform software trace wireless chassis active r0 rrm rrm-client-dca info”以在日志中显示信息:
9800#show logging profile wireless start last x hours| include rrm-client-dca
2020/06/26 15:44:08.636988 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11a) Channel set request: on cell to channel 40 from 40 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,127) to (-128,-128,127) Reason: 0x1 for slot id: 1
2020/06/26 15:44:08.640828 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11bg) Channel set request: on cell to channel 6 from 1 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-77,-35,-35) to (-66,-58,-57) Reason: 0x4 for slot id: 0
2020/06/26 15:54:18.671638 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11a) Channel set request: on cell to channel 40 from 40 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,127) to (-128,-128,127) Reason: 0x1 for slot id: 1
2020/06/26 15:54:18.673055 {wncd_x_R0-0}{1}: [rrm-client-dca] [9853]: (info): f4bd.9e38.4200 (Radio: 802.11bg) Channel set request: on cell to channel 6 from 6 (width 20) to reduce co-channel interference (noise/interference/rssi) from (-128,-128,-58) to (-128,-128,-58) Reason: 0x1 for slot id: 0
DCA算法运行
9800-17#show logging profile wireless start last boot | i Running DCA Algo
2020/02/14 16:23:09.177 {rrm_bg_R0-0}{1}: [rrm-mgr-dca] [22117]: (note): (Radio: 802.11a) Running DCA Algorithm