Professional Documents
Culture Documents
V200R002C11
Troubleshooting - Linux
Issue 10
Date 2014-03-14
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and the
customer. All or part of the products, services and features described in this document may not be within the
purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information,
and recommendations in this document are provided "AS IS" without warranties, guarantees or representations
of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Purpose
This document describes the faults that may occur on the modules of the AAA system, and how
to remove the faults.
This document describes the classification of troubleshooting, flow for troubleshooting and fault
analysis methods. It also provides typical cases of the faults on each module of the AAA.
Intended Audience
The intended audiences of this document are:
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
Privacy Notice
To find the fault reasons, necessary service logs may need to be collected, and the logs may
contain subscriber information such as the subscriber number. You must use the information
according to laws and local carrier requirements, and are not allowed to send the log information
out of the customer's network. During use, you are advised to use the anonymization tool to hide
subscriber information. When related faults are located, you must delete the logs in a timely
manner.
Update History
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Information about the Linux platform and DB2 database application environment is added.
Contents
1 Overview
Based on the emergency degree and influence scope, the troubleshooting is classified into two
types:
l General troubleshooting
General troubleshooting is used to remove faults that are not emergent and only have a
slight impact in a small scope, or those that need not be handled at once due to good backup
measures, such as two-node switchover.
l Emergency troubleshooting
Emergency troubleshooting is used to remove the emergent fault that may have a severe
impact, such as system down.
3 Check the application system. If the faults are found, install the application
system again or contact Huawei
Technologies Co., Ltd.
4 Check the two-node cluster. If the faults are found, switch to the standby
node and restart, or contact Huawei
Technologies Co., Ltd.
5 Check the nodes of the cluster. If the faults are found, contact Huawei
Technologies Co., Ltd.
6 Check the nodes of the two- If the faults are found on a node, remove the
node cluster. node from the Load Balance Device (LBD).
After the troubleshooting, reload the node
to the LBD.
7 Check whether the disk space If the disk space is full, release the space.
is full.
8 Check whether the network If the faults are found, contact Huawei
route is normal. technical support engineers.
9 Check whether the hardware If the faults are found, contact Huawei
devices are normal. technical support engineers.
10 Check whether the running of If the faults are found, refer to the AAA
the devices (including the Emergency Maintenance and contact
database and operation Huawei Technologies Co., Ltd.
system) is normal.
Before you handle a fault, try to collect the original information related to this fault as much as
possible.
l Make sure that you are ready to collect data when required. If any fault, a severe fault in
particular, occurs, understand the situation before proceeding any further. Do not handle
the fault blindly.
l Study and master the services, familiarize yourself with the system principles and service
flows in particular so that the root causes can be found at the earliest.
l When answering a fault claim call, the maintainance personnel should guide the user with
flexible methods, try to ask the subscriber from multiple aspects and angles, and get more
information about the fault.
l Strengthen the business contact inside and outside the department, and set up a good
business relationship with the maintenance personnel of other offices.
The alarm information contains fault symptoms, possible causes and handling suggestions. It is
also an important basis for fault analysis. Through this information, you can locate faults and
find out possible causes.
The AAA defines logs at five levels: prompt, alarm, minor error, major error, and fatal error. It
also provides the level-based filter function. You can set the log output levels as required to get
more information for fault location.
2.1 Introduction
2.2 Solution
2.1 Introduction
The main functions of the iSCC1 module is to deduct the basic fee, record the bill of the basic
fee, update the charge policy, scan and record the abnormal user regularly.
2.2 Solution
Log in to the system as user iscc1. Run the p command to check whether the process is normal.
3.1 Introduction
3.2 Solution
3.1 Introduction
The function of the iSCC2 is to control services. The iSMS system manages the iSCC2.
l Authentication failure
l Authorization failure
l Accounting failure
3.2 Solution
Log in to the system as user iscc2. Run the p command to check the iSCC2 process. The iSCC2
module processes include manager, scfserver, scf (may be more than one), and sdf.
l The scf process log: U_scfn.log (n is the serial number of the scf process. The number is
an integer 0 or more than 0.)
l The manager process log: U_manager.log
l The scfserver process log: U_server.log
l The sdf process log: U_sdf.log
l The debug log: After the Debug switch is turned on, the system generates this log. This log
is used to record the debug log of the setval tool.
NOTICE
The debug log function affects system performance, slows down the service running speed,
and occupies disk space. Do not enable the function when the system is in commercial use.
If you want to enable this function to locate a fault, you must have your supervisor's
permission. After locating the fault, disable the function as soon as possible.
– U_scfn_debug.log: n is the serial number of the scf process. The number is an integer
equals to or more than 0.
– U_scfsrv_debug.log
– U_sdf_debug.log
– U_man_debug.log
l SCPCFG.INI
It is used to set the number of accessed subscribers, authentication charging port, public
key, and performance parameters.
l SYSCFG.DAT
It is used to set the parameters of all the network devices connected to the iSCC2. The
network devices include the BRAS, PDSN, and GGSN.
l DiamBaseConfig.xml
It is used to set the parameter for connecting the AAA to the eGGSN that supports the Gy
interface.
Tracing
The AAA provides a message tracing tool setval to trace the subscriber authentication and
charging flow.
When you run the setval command, the system displays the Help information and command
syntax.
When you run the setval h or setval help command, the system displays the help information
and numbers of the level-1 module and level-2 module.
For details about the parameters, see B The setval Command Reference.
NOTICE
Use with caution the setval command that is used for tracing all the online users, because this
operation will affect the system performance and may lead to call barring.
Task Command
Task Command
Print the message log setval u user name;setval m 1;setval l 1;setval 1 255;setval pt
when a subscriber is 99999999;setval ps 600000;setval t 2
online.
The following section describes how to use the tool setval by considering the example of tracing
the online and offline flows of a subscriber.
2. Test whether the subscriber can go online and offline normally by using a subscriber
account.
3. Check the debugging log.
Access the ~iscc2/log directory and check the debugging message log (with debug in the
log file name). The name of the log file recording the online and offline processes of the
subscriber is U_scfn_debug.log (n is the serial number of the scf process).
Symptom
Some of the subscribers cannot pass the authentication. Subscribers that pass the authentication
can log in to the network.
Alarm
The "scf scsm buffer has been used off" alarm exists in the U_scfn_debug.log file of the iSCC2.
Cause
When the number of online subscribers exceeds a specified value, the iSCC triggers the load
control and denies new access to some subscribers to ensure the QoS.
Solution
Adjust the threshold value for the iSCC to enable the load control function by modifying the
following items in the ~iscc2/config/SCPCFG.INI file.
l maxDlgIDOfSCP
It is a maximum session permitted by the iSCC, that is, the maximum number of online
subscribers.
Value range: an integer equal to or greater than 0.
l MaxBufferOfTSCSM
It is the maximum number of the machines that can be saved in each scf process.
When the subscriber is accessed, the scf process creates and saves a machine. When the
subscriber goes offline, the scf cleans the mapping machine automatically.
Value range: 1 to the value of maxDlgIDOfSCP. The value cannot be smaller than the
quotient of maxDlgIDOfSCP divided by numOfSCDFRuning.
l numOfSCDFRuning
It is the number of the scf process to be started.
If many scf processes are started, the load of the access is shared by multiple processes. In
addition, the more scf processes that exist, the higher the demand of the machine
performance.
Value range: 1 to the value of maxDlgIDOfSCP.
The value cannot be smaller than the quotient of maxDlgIDOfSCP divided by
MaxBufferOfTSCSM.
l MaxAccess
It is the maximum number of the authentication requests accessible in a second. Requests
that exceed the value are discarded.
If the machine performs well, increase the value according to the actual situation.
4.1 Introduction
4.2 Solution
4.1 Introduction
The MML server is a service management system. It works with the WMAS to manage the
services in the Web mode.
The MML server fault is that the operator cannot normally perform operations normally on the
WMAS.
4.2 Solution
Log in to the system as user ismpmml. Run the procs.sh or p command to check whether the
process is normal.
Log in to the system as user ismpmml. Run the netstat –an|grep port number command to
check whether the status of the port 19999 and 20000 is ESTABLISHED.
Log in the system as user ismpmml. Run the release_off command to change the log level to
DEBUG.
NOTICE
The debug log function affects system performance, slows down the service running speed, and
occupies disk space. Do not enable the function when the system is in commercial use. If you
want to enable this function to locate a fault, you must have your supervisor's permission. After
locating the fault, disable the function as soon as possible.
You can run the release_on command to stop DEBUG. For details, see the ~ismpmml/
sms_run/shell/env.rc file.
The log file of the MML server has two types: running log and operation log.
For the failed operation in the WMAS menu, see the sms_oplog_internal.log file.
Symptom
The operator fails to define a subscriber through the billing system after the MML server
interconnects with the billing system.
Alarm
The ~ismpmml/sms_run/log/oplog/sms_oplog_internal.log file records the following alarm:
[]2006-07-15 00:17:29[]4[]Result[]17[]cdmaadm[]internal[]2[]Executing command
failed[]17[]ADD C270 ACCOUNT[]RETN=1010, DESC="Sorry, the subscriber already
exists.";
Cause
According to the returned log, it can be concluded that the subscriber data already exists.
Solution
1. In the subscriber basic table of the database, check the state of the subscriber with a duplicate
name.
2. If the subscriber is in to-be-deleted state, you can infer that the subscriber is deleted, but
the subscriber data is still stored.
Delete the subscriber again in the WMAS. Select not to store the subscriber data.
3. If the subscriber is in normal state, you can infer that the subscriber name is valid and may
be in use. Add the subscriber with a new name.
Symptom
The account of the operator root in the WMAS system is locked.
Alarm
None.
Cause
The root operator of WMAS system is locked.
Solution
1. Modify the operator status field.
Run the following command to change the value of status to 0 in the record of the root
operator in the operator database table.
update operator set status="0" where userid="root"
5.1 Introduction
5.2 Solution
5.1 Introduction
The WMAS provides a Web-based operation management interface for the carrier and the agent.
The carrier and the agent can visit the WMAS with the browser and manage the cross-area
service.
The fault of the WMAS system concerns the display and operation of the GUI window.
5.2 Solution
Check whether port 8443are normal. If the ports are in the LISTEN status, it indicates that the
port is connected properly.
check whether the status of the instances sysdb and billdb is normal.
NOTE
For the detailed operation procedures, refer to the HUAWEI AAA Routine Maintenance.
Symptom
The WMAS administrator cdmaadm fails to define a subscriber.
Alarm
l The WMAS system prompts the following information:
Sorry, the subscriber already exists.
l The following alarm information is displayed in the websmap_opl.log file under the
~websmap/apps/WEB-INF/logs directory:
[Time] 00:17:29 July 15, 2006 733[LogID]04[LogType]MML[User Name]cdmaadm
[SessionID]05317713227651599695 [ACK]{TRANCONTROL=TXEND, TRANID=19,
DESC="Sorry, the subscriber already exists.", OPER=ADD C270 ACCOUNT,
SESSID=18, SESSCONTROL=DLGCON, RETN=1010}
Cause
The subscriber already exists.
Solution
1. Log in to the WMAS system as administrator cdmaadm.
2. When defining a subscriber, ensure that the user name is unique.
Symptom
A WMAS operator fails to log in to the system.
Alarm
The system displays "Reached the maximum number of operator logins."
Cause
The operator has consecutively entered the wrong password three times. Thus, the system locks
the operator.
Solution
1. Log in to the WMAS system as the operator of a higher level.
NOTE
If an operator of the normal administrator level is locked, the operator needs to be unlocked by an operator
of the service administrator level (such as cdmaadm).
If an operator of the service administrator level is locked, the operator needs to be unlocked by an operator
of the carrier system administrator level (such as servadm).
2. Unlock the operator.
6.1 Introduction
6.2 Solution
6.1 Introduction
The Billproc provides the functions of the bill delivery, input, statistics, and settlement.
The Billproc gets the bills from the iSCC1 and iSCC2 directory. The Billproc also generates the
settlement result according to the bill statistics and settlement strategy, and save them to the
database.
6.2 Solution
Check the Log
The Billproc faults can be located through logs. The Billproc logs include the running logs and
error logs, as listed in Table 6-1.
Log Description
XXbillcvt.log Records exceptions and errors during the running of the billcvt
process.
billgeterr.log Records exceptions and errors during the running of the billget
process.
Log Description
billprocerrXX.log Records exceptions and causes during the running of the billproc
process.
billputerr.log Records exceptions and errors during the running of the billput
process.
The causes of the Billproc faults can be found from the preceding logs. For example, if the logs
contain the information about the database operation faults, you can check the SQL statement
and error number to locate the fault.
The Billproc processing mechanism ensures that the bill cannot be lost. The bill that is not loaded
to the database is saved in the ~billproc/record/bad directory. If the Billproc fails to get the
bill, the related bill file is still saved in the original bill directory.
Symptom
The bills cannot be loaded into the database.
Alarm
Check the ~billproc/record/entry directory. A bill file always exists. For example, the
ps1_20061111_10010_00000001.default.txt bill file. View the contents of the bill and no error
information is found. The contents of the bill file are as follows:
ps1_20061111_10010_00000001.default.txt:
2|103|10|ddd|0|1|7|210|10.164.73.119||0|186|186|544|544|0|280||0.0.0.1|84565374|
169||1010|zyf access SV3|||3|8|1|20061111235722|20061111235722|20061111235822|60|
1|||0|0|02525065103-1185897562-102||0|
ps1_20061111_10010_00000001.default.txt:
3|103|10|ddd|0|1|7|210|10.164.73.119||0|186|186|544|544|0|280||0.0.0.1|84565374|
169||1010|zyf access SV3|||1|8|1|20061111235722|20061111235822|20061111235900|38|
3|||0|0|02525065103-1185897562-102||0|
ps1_20061111_10010_00000001.default.txt:
4|103|10|ddd|0|1|7|210|10.164.73.119||0|64|64|187|187|0|280||0.0.0.1|84565374|
Cause
Consider the Oracle database as an example. Check whether the space of the bill database is
sufficient.
Log in to the system as user oracle. Then run the following commands:
setenv ORACLE_SID billdb
sqlplus "/ as sysdba"
select t.tablespace_name, round(sum(d.bytes/(1024*1024)),0) total_size, round(sum
(f.bytes)/(1024*1024)) as free_space, round(sum(f.bytes)/(1024*1024)*100/round(sum
(d.bytes/(1024*1024)),0)) as capacity from dba_tablespaces t, dba_data_files d,
dba_free_space f where t.tablespace_name = d.tablespace_name and t.tablespace_name
= f.tablespace_name group by t.tablespace_name;
Check the return result of the system. If the value in the free column that matches with the
database table name of RECORDDBS is 0 or approaching 0, it indicates that the database space
is insufficient.
Solution
Delete the expired bills.
7.1 Overview
7.1 Overview
Broadband users access the Internet on Portal in wireless mode. As a portal of the RADIUS
server, Portal cooperates with the RADIUS server to authenticate and authorize users.
Symptom
When accessing WLAN on Portal, a user failed to obtain an IP address.
Check the portalserver.log file in $HOME/tomcat/logs for the keywords ipaddress not
found. If the keywords are found, the IP address cannot be obtained.
2011–11–14 12:34:47,273|DEBUG|BrasDatabase.java Line:64|[getBrasInfoByAddress]
fullAddress = null
2011–11–14 12:34:47,274|INFO|BrasDatabase.java Line:68|[getUserIpAddress]
fullAddress = null
2011–11–14 12:34:47,275|ERROR|LogoutServlet.java Line:76|[getBrasAddress]
ipaddress not found in t_bras_dhcpAddress = null
Cause
The possible causes are as follows:
l For Portal in earlier version (with the HSQLDB database), the IP address segment is
incomplete during the BRAS configuration.
l For Portal in earlier version (with the HSQLDB database), the local database is not restarted
after the BRAS configuration.
Solution
1. Log in to Portal as the portal user.
2. Access /export/home/portal/hsqldb and modify the bpss.script file.
vi bpss.script
3. Check whether one or more IP address segments that contain less than three digits exist.
l If yes, do as follows:
a. Add zeros to IP address segments that contain less than three digits.
An example is as follows:
INSERT INTO T_BRAS_DHCP VALUES
('1','BPSS_BRAS_1','255.255.255.255','0.0.0.0')
After the modification, the IP address is as follows:
l If the IP address segment format is correct, check whether the local database is restarted
after the BRAS configuration. If yes, restart the HSQLDB database. For details, see b
in 3.
7.2.2 Failed to Display the Portal Login Page Due to Overlarge Log
File or Connection Number
Symptom
A user cannot access the Portal login page.
Alarm
None
Cause
The possible causes are as follows:
Solution
l If the Portal login page cannot display because the number of connections exceeds the
threshold, do as follows:
1. Log in to the Portal server as the root user.
2. Run the following command to modify the /etc/sysctl.conf file:
vi /etc/sysctl.conf
NOTE
If the log file contains TCP connection error information, set net.ipv4.ip_conntrack_max to
65536.
4. Set net.ipv4.ip_local_port_range to 1024 65000, indicating that the port number for
Portal to connect to external systems ranges from 1024 to 65000.
5. Add the following configuration items:
net.ipv4.tcp_tw_reuse = 1
net.ipv4.tcp_tw_recycle = 1
net.ipv4.tcp_keepalive_time = 1800
net.ipv4.tcp_fin_timeout = 30
net.core.netdev_max_backlog =8096
l If the Portal login page cannot display because the log file is overlarge, do as follows:
1. Access /export/home/portal/tomcat/logs and back up the catalina.out file.
2. Delete the catalina.out file.
rm catalina.out
A.1 Overview
A.2 Solution
A.1 Overview
The related network devices of the AAA include two LAN switches, two firewalls and mapping
access devices.
A.2 Solution
The network faults mainly focus on the firewalls and access devices, including the network block
and attack.
You are recommended to locate and rectify the fault with the engineer at the device side when
troubleshooting the network.
Symptom
Previous versions of the firewall do not support the session automatic update. Thus after the
two-node switchover, the data package is sent to the original logic host rather than the new one.
Alarm
None.
Cause
The firewall does not support auto session update.
Solution
Enable the clear session function on the two-node cluster so that the firewall session can be
automatically cleaned upon two nodes switchover.
Symptom
l The user cannot pass the authentication.
l The user cannot log in to the portal.
Alarm
None.
Cause
The mapping between the ports on the firewall and the destination IP addresses is incorrect.
For example, if the port 1812 is mapped to the floating IP address of the ismswork resource, all
the authentication requests are sent to the ismswork resource for authentication. Therefore, the
user cannot pass the authentication.
Solution
Check the floating IP addresses of the isccwork and ismswork resources. Then modify the
mapping between the ports and the floating IP addresses according to Table A-1.
Symptom
The online subscriber cannot go offline after the switchover of the two-node cluster. Afterwards,
the subscriber cannot be authenticated successfully.
Alarm
None.
Cause
The subscriber does not go offline normally after the switchover of the two-node cluster. Thus,
the account is still in use. The AAA limits the number of concurrent users of an account.
Therefore, the user cannot log in to the network using this account.
Solution
There are two methods, manual reset and auto reset.
Manually reset the abnormal subscriber in batches with the function of resetting by device
provided by the WMAS. In addition, the AAA can reset the subscribers automatically.
Configuration parameters related to the automatic reset are shown as follows:
l Charge Period: If the device supports the message of interim charge, the AAA automatically
resets when it detects that the message is timeout. That is, the AAA receives no message
of interim charge 30 minutes after the charge period.
l Maximum Session Duration: If the device does not support the message of interim charge,
the AAA executes the automatic reset when the subscriber online duration exceeds the
value of the parameter.
Symptom
l Subscribers fail to go online.
l Use the setval tool to trace the subscriber who cannot log in. The U_man_debug.log file
records lots of Unknown IP information.
NOTICE
The debug log function affects system performance, slows down the service running speed, and
occupies disk space. Do not enable the function when the system is in commercial use. If you
want to enable this function to locate a fault, you must have your supervisor's permission. After
locating the fault, disable the function as soon as possible.
Use with caution the setval command that is used for tracing all the online users, because this
operation will affect the system performance and may lead to call barring.
Alarm
None.
Cause
The device address is changed and the AAA does not modify the information synchronously.
Solution
Log in to the WMAS as servadm and modify the IP address configuration parameter of the
access device in the AAA system through the WMAS.
Symptom
l Subscribers fail to go online.
l Use the setval tool to trace the subscriber who cannot log in. Then the debug log
U_scfn_debug.log records many prompts containing "Wrong Password."
NOTICE
The debug log function affects system performance, slows down the service running speed, and
occupies disk space. Do not enable the function when the system is in commercial use. If you
want to enable this function to locate a fault, you must have your supervisor's permission. After
locating the fault, disable the function as soon as possible.
Use with caution the setval command that is used for tracing all the online users, because this
operation will affect the system performance and may lead to call barring.
Alarm
None.
Cause
The shared key is different from the shared key configured in the AAA.
Solution
Log in to the WMAS as servadm and modify the shared key configuration parameter of the
access device in the AAA system to the same shared key configured in the access device.
NOTE
The symbol "/" indicates that either one can be used. For example, setval trace 1 equals to setval t 1.
Statement Description
setval trace/t [0,1,2] Set the message printing type.0: Print the message.1:
Print the messages of the session numbers that you want
to trace.2: Print all the messages.
setval dialogue/dlg [1...10000] Set to print the message of a certain session. After the
iSCC2 restarts, the session number starts from 1 and
increases 1 for each call. When reaching
maxDlgIDOfSCP of SCPCFG.INI, the session number
starts from 1 again.
l all: Print the messages of all the session numbers.
l none: Do not print the message of any session
number.
setval level/l [0,1] Set the message printing level.0: Print brief messages.
1: Print detailed messages.
setval mode/m [0,1] Set the message printing destination.0: Print to the
screen.1: Print to the printing information file in the
log directory.
setval interval/i [1...n] Set the interval for printing the statistics messages. The
minimum interval is one minute.
setval clear/c [1,2,3,4,5,6] Clear the counter of the statistics messages to zero.
setval [operationType] Set the traced module number. See B.2 Module List.
[operationCode]
Statement Description
setval [operationType] Modify the tracing setting of the module. See B.2
[operationCode] [value] Module List.
setval printTimes/pt [times] Number of lines to be printed. The part exceeding the
number of lines is not printed.Value range: 0 to 231 - 1
setval printSeconds/ps [seconds] Duration for printing the information, in seconds. After
the set duration is reached, the printing stops
automatically.Value range: 0 to 231 - 1
setval username/u [username] Trace a certain user name.none: Cancel tracing the user
name or do not trace the user name.
NOTE
l The user name and called number cannot be traced at the
same time.
l This command is mainly used in tracing the messages of a
broadband AAA user.
setval printdlg/pd [username/ Print the information about the session and automaton.
CallingNumber]
Table B-2lists the mapping between the level-1 module number and the module name.
No. Module
1 SCF
2 SDF
3 Manager
4 Server
5 Performance
6 SQL
The mapping between the level-2 module number and the module name is omitted. Refer to the
Help of the setval h command.
DB DataBase
ID Identity
IP Internet Protocol
PC Personal Computer
TC Terminal Connector
Index
A mml server
definition, 14
alarm information Introduction, 14
definition, 4 log, 14
Analyzing the Log Information, 5 port, 14
Process, 14
B
Bill
N
Insufficient Data Space, 22 network problem
Billproc cluster switchover, 30
functions, 21 device address, 31
processing mechanism, 22 firewall session, 29
shared keys, 32
C
Classification
O
Troubleshooting, 2 Original information
definition, 4
F
Flow
R
Troubleshooting, 2 root
unlock, 15
I
Indicator Status, 4
S
iscc1 setval, 10
Configuration File, 7 command, 34
functions, 7 module list, 35
Log, 7
Process, 7 T
iscc2
configuration file, 10 Tracing and Analyzing Messages, 5
function, 9 Troubleshooting
Introduction, 9 Analyzing Faults , 4
log, 9 Classification, 2
process, 9 Collecting Information , 3
Tracing, 10 Rectifying Faults , 4
M W
manual reset abnormal subscribers, 31 WMAS
log in fails, 19
unlock operator, 19
wmas
Defining the Subscriber Fails, 18