简介
本文档介绍所有统一资源定位器(URL)在4G网络上的用户数据浏览问题。
先决条件
Cisco建议您了解这些节点的功能:
- 服务分组数据网关(SPGW)
- 控制和用户平面分离(CUPS)
症状识别
注意:在开始测试和日志收集之前,您必须验证这些详细信息。
1. 检查问题出在哪种数据类型:IPv4/IPv6/IPv4v6
2. 检查问题是否与任何特定接入点名称(APN)或所有APN有关,因为问题可能与特定APN有关。
3. 检查问题是否针对特定的Web URL或多个URL。
4. 检查URL是企业URL/客户应用URL还是某个常规服务URL,并检查问题是否出在特定VPN上。
5. 检查直接从浏览器访问URL时或访问Web应用时是否出现问题。
6. 检查问题本质上是间歇性的(例如手机重新启动后或刷新Web URL开始工作),还是问题始终存在,甚至在手机重新启动后也无法工作。
7. 检查观察到的拒绝原因以及针对哪个评级组。
日志收集/测试
注意:对于此类问题,您必须对有问题的用户IMSI执行实时在线故障排除,您必须相应地收集日志/跟踪。
在继续进行测试和日志收集之前:
Flush the subscriber from the node and also clear browsing history/database from testing user handset so that it can freshly attach
clear subscriber imsi <IMSI number> ------------------ to be executed in the node to clear the subscriber
- 首先测试一种PDP类型,首先测试您发现问题的IPv4。
- 启用这些调试日志并记录putty会话。确保会话不能终止(按Tab/每隔几分钟输入一次,这样会话就不会终止)。
On SPGW:
logging filter active facility sessmgr level debug
logging filter active facility acsmgr level debug
logging filter active facility npumgr-acl level debug
logging filter active facility firewall level debug
logging filter active facility vpn level debug
logging filter active facility vpnmgr level debug
logging active ---------------- to enable the logging
after 5 mins
no logging active ---------------- to disable the logging
On CP:
logging filter active facility sessmgr level debug
logging filter active facility sxdemux level debug
logging filter active facility firewall level debug
logging filter active facility vpn level debug
logging filter active facility vpnmgr level debug
logging active ---------------- to enable the logging
after 5 mins
no logging active ---------------- to disable the logging
On UP:
logging filter active facility sessmgr level debug
logging filter active facility sxdemux level debug
logging filter active facility npumgr-acl level debug
logging filter active facility firewall level debug
logging filter active facility vpn level debug
logging filter active facility vpnmgr level debug
logging active ---------------- to enable the logging
no logging active ---------------- to disable the logging
Note :: These logging has to be enabled for short time depending on the CPU utilization because it
increase the utilization so while enabling logging need to keep a watch on CPU
3. 导航到配置模式,然后为用户启用日志记录监控。
config
logging monitor msid <imsi>
end
4. 打开另一个终端,记录putty会话,然后开始使用详细程度5监控用户,并启用以下选项:
SPGW:
Press + for times then it collects the logs verbosity 5 logs then select next options
+++++
X, A, Y, 19, 33, 34, 35, 22, 26, 75
Once option 75 is pressed then select 3,4,8 then press esc
CUPS::
on CP:
monitor subscriber imsi <IMSI> +++++ S, X,A,Y,56,26,33,34,19,37,35,88,89
on UP:
monitor subscriber imsi <IMSI> +++++ S,X,A,Y,56,26,33,34,19,37,35,88,89
5. 附加订用服务器并连续浏览URL 3到5分钟,浏览时多次执行这些命令并记录同一用户的putty会话。
ON SPGW/SAEGW:
show subscriber full imsi <>
show active-charging session full imsi <>
show subscriber pgw-only full imsi <>
show subscriber sgw-only full imsi <>
show subscribers data-rate summary imsi <>
show ims-authorization sessions full imsi <>
show subscribers debug-info msid <>
On CP node:
Show subscriber full imsi <imsi>
Show active-charging session full imsi <imsi>
show subscribers pgw-only full imsi <>
show subscribers sgw-only full imsi <>
show session subsystem facility sessmgr instance <> verbose
show logs
On UP node:
show sub user-plane-only full callid <>
show sub user-plane-only callid <> urr full all
show sub user-plane-only callid <> far full all
show sub user-plane-only callid <> pdr full all
show subscribers user-plane-only callid <> far all
show subscribers user-plane-only callid <> far
show subs data-rate call <callid>
show subscribers user-plane-only flows
show user-plane-service statistics all
show user-plane-service statistic rulebase name <rulebase_name>
6. 浏览5分钟后,在步骤3中打开的另一个终端中执行no logging active。
7. 禁用用户的日志记录监视器。
Config
no logging monitor msid <imsi>
end
8. 不要停止mon sub,让它一直运行,直到您完成收集号码踪迹,但是要注意CPU。
9. 执行此命令以获取用户的呼叫方ID并记录此呼叫方的putty会话。
Show subscriber full imsi <imsi>. -à get the call id
show logs callid <call_id>
show logs
如果呼叫方ID存在,那么用户会话日志显然已收集,如果没有,则需要再次运行它。
已执行故障排除
- 对Web URL服务器IP地址执行ping操作并检查是否有任何丢包。
ping <URL IP address> ------------ from Gi context
--- ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 12160ms. >.>>>> There are packet drops, now we need to check were it is dropping
2.从GI上下文执行traceroute,并检查是否存在任何可接通性问题。
traceroute <peer ip address> src <local diameter origin host ip address>
Ex: traceroute 10.52.5.49 src 10.203.144.8
3. 检查用户统计信息以检查数据包丢弃。
Show subscriber full imsi <imsi number>
input pkts: 455 output pkts: 474
input bytes: 75227 output bytes: 103267
input bytes dropped: 0 output bytes dropped: 0
input pkts dropped: 0 output pkts dropped: 0
input pkts dropped due to lorc : 0 output pkts dropped due to lorc : 0
input bytes dropped due to lorc : 0
in packet dropped suspended state: 0 out packet dropped suspended state: 0
in bytes dropped suspended state: 0 out bytes dropped suspended state: 0
in packet dropped sgw restoration state: 0 out packet dropped sgw restoration state: 0
in bytes dropped sgw restoration state: 0 out bytes dropped sgw restoration state: 0
pk rate from user(bps): 18547 pk rate to user(bps): 25330
ave rate from user(bps): 6182 ave rate to user(bps): 8443
sust rate from user(bps): 5687 sust rate to user(bps): 7768
pk rate from user(pps): 13 pk rate to user(pps): 14
ave rate from user(pps): 4 ave rate to user(pps): 4
sust rate from user(pps): 4 sust rate to user(pps): 4
link online/active percent: 92
ipv4 bad hdr: 0 ipv4 ttl exceeded: 0
ipv4 fragments sent: 0 ipv4 could not fragment: 0
ipv4 input acl drop: 0 ipv4 output acl drop: 0
ipv4 bad length trim: 0
ipv6 input acl drop: 0 ipv6 output acl drop: 0
ipv4 input css down drop: 0 ipv4 output css down drop: 0
ipv4 input css down drop: 0 ipv4 output css down drop: 0
ipv4 output xoff pkts drop: 0 ipv4 output xoff bytes drop: 0
ipv6 output xoff pkts drop: 0 ipv6 output xoff bytes drop: 0
ipv6 input ehrpd-access drop: 0 ipv6 output ehrpd-access drop: 0
input pkts dropped (0 mbr): 0 output pkts dropped (0 mbr): 0
ip source violations: 0 ipv4 output no-flow drop: 0
ipv6 egress filtered: 0
ipv4 proxy-dns redirect: 0 ipv4 proxy-dns pass-thru: 0
ipv4 proxy-dns drop: 0
ipv4 proxy-dns redirect tcp connection: 0
ipv6 bad hdr: 0 ipv6 bad length trim: 0
ip source violations no acct: 0
ip source violations ignored: 0
dormancy total: 0 handoff total: 0
ipv4 icmp packets dropped: 0
APN AMBR Input Pkts Drop: 0 APN AMBR Output Pkts Drop: 0
APN AMBR Input Bytes Drop: 0 APN AMBR Output Bytes Drop: 0
APN AMBR UE Overload Input Pkts Drop: 0 APN AMBR UE Overload Output Pkts Drop: 0
APN AMBR UE Overload Input Bytes Drop: 0 APN AMBR UE Overload Output Bytes Drop: 0
Access-flows:0
Num Auxiliary A10s:0
4. 检查show active charging输出以了解用户流量影响。
Show active-charging session full imsi <imsi num>
PP Dropped Packets: 0
CC Dropped Uplink Packets: 0 CC Dropped Uplink Bytes: 0
CC Dropped Downlink Packets: 0 CC Dropped Downlink Bytes: 0
5. 检查ECS/ACS级别数据包丢弃的show active charging命令输出,并检查是否存在任何数据包丢弃。然后检查配置操作。
Show active-charging session full imsi <imsi num> or show sub user-plane-only full callid <>
Ruledef Name Pkts-Down Bytes-Down Pkts-Up Bytes-Up Hits Match-Bypassed
-------------------- ---------- ---------- ---------- ---------- ---------- --------------
dns_free_covid 4 428 4 340 8 0
icmpv6 0 0 5 1423 5 0
ip-pkts 479 103670 432 74488 764 429
6. 检查DNS解析是否成功。如果成功,则DNS没有问题。
7. 检查用户设备(UE)与服务器之间的TCP连接是否成功建立。
8. 如果在上述任何步骤中均未发现丢弃,则节点中不存在问题。
丢包
1. 检查用户版本统计信息,以确定是否遇到了与此处所示类似的丢包现象。
Total Dropped Packets : 132329995
Total Dropped Packet Bytes: 14250717212
Total PP Dropped Packets : 0
Total PP Dropped Packet Bytes: 0
R7Gx Rule-Matching Failure Stats:
Total Dropped Packets : 871921
Total Dropped Packet Bytes : 86859232
P2P random drop stats:
Total Dropped Packets : 0
Total Dropped Packet Bytes : 0
2. 检查show subscriber输出中观察到的故障百分比。如果丢包率低于1%,则很可能只是侥幸而已,不会产生任何影响。
input pkts: 455 output pkts: 474
input bytes: 75227 output bytes: 103267
input bytes dropped: 0 output bytes dropped: 0
input pkts dropped: 0 output pkts dropped: 0
3. 如果您注意到RX评级组中的数据包丢弃和ITC数据包丢弃,这很可能是因为带宽问题和用户包过期。
ITC Packets Drop: 47235019
4. 在增强型计费服务(ECS)级别,您必须检查/验证如何定义规则/计费操作/规则库的ECS配置,以及是否具有任何阻止因素。在ECS级别有不同类型的丢弃,根据丢弃的类型,您需要继续执行下一个行动计划。
5. 正在传递但未处理的数据包大小的MTU大小。
6. 通过TCP转储/用户级跟踪可以确定数据包被丢弃的中间路径问题。
针对此类问题的恢复行动计划并不相同,因为它会根据问题的模式而有所不同。