Professional Documents
Culture Documents
Disclaimer
The contents of this document are subject to revision without notice due to
continued progress in methodology, design and manufacturing. Ericsson shall
have no liability for any error or damage of any kind resulting from the use
of this document.
Contents
1 Introduction 1
2 Workflow 1
3 Mandatory Data 1
3.1 Mandatory Logs and Data 3
3.2 Acceptable Compression Formats 5
5 Severity Levels 7
5.1 Emergency 7
5.2 High Severity 8
5.3 Medium Severity 8
5.4 Low Severity 9
Glossary 10
1 Introduction
2 Workflow
1 Collect the general mandatory data for the problem experienced. See
Section 3 on page 1.
2 Collect specific data based on the problem type. See Section 4 on page 5.
3 Mandatory Data
You must collect the following data for a CSR, regardless of the problem type.
Use the checklist in Table 1 when writing a CSR. A description of each line
follows the checklist. Some parts are not applicable to certain types of requests
such as documentation errors or consultations, but all parts apply to software
and hardware faults. Complete as many checklist items as possible for each
case.
RECENT CHANGES
SW changes:
Configuration changes:
HW changes:
O&M procedures:
Environment:
CASE DESCRIPTION
Case description:
Date and time:
Problem frequency:
Problem reproducibility:
Problem effects:
Network diagram to illustrate the problem:
ATTACHMENTS
System logs:
Crashfiles:
Output of the show tech-support command:
Network Diagram/Topology:
Other attachments:
MEASURES
On-site or online support:
Work around:
0 Configuration changes
0 State the exact date and time when the fault occurred or was
discovered.
0 Describe the effects of the fault; for example, whether it affected traffic
or O&M.
• Measures:
The log file must include the time of the failure. In the CSR, also include the
time stamps before and after the event occurred. It is important to verify which
file contains the failure, because the active message log file is eventually
overwritten. For example, the file can be /var/log/messages.2.gz instead
of the current message log file.
Note: The /flash partition is about 128 MB, and /md partition is 896 MB.
All mandatory logs and data should be backed up in time, otherwise,
the files are overwritten when the disk is full.
Collect system logs from controller card. To collect the logs, enter the save
tech-support log command in exec mode. The logs are stored in the /md
directory on the controller card. You can transfer the file to an external server
using the copy command with the ftp or scp command.
Verify if related core dump files were generated at the time of the problem
by entering the following commands:
• show crashfiles
Transfer the files in binary mode from the router and include an MD5 checksum
of the original file.
• System hardware
• Configuration
• IP routes
• System logs
If you know that your problem is related to one of the following hardware
or process, you can also run the show tech-support command with an
appropriate keyword to collect the output. See show tech-support for the
keywords.
Network Diagram/Topology
You must provide Network Diagram or Topology including logical protocol level
and actual physical layer 1 port connectivity with IP address of the node in
which issue is reported.
For more specific problems, collect the output of the following commands.
The show tech-support command can be used with the following optional
keywords to collect troubleshooting data about many Ericsson IP Operating
System modules. To collect data for specific problems, use the command in
exec mode with the appropriate keyword.
For example, if you know that your problem is related to BFD, enter the show
tech-support bfd command.
Note: Because the output of these commands is intended for use by support
engineers, the format might differ from typical show command output
and might not be readable.
5 Severity Levels
You must state the severity of the CSR. Applying the correct severity level
ensures that critical problems are fixed before less critical ones. It is important
to follow the guidelines for the four severity types: Emergency, High, Medium,
and Low.
The First-Line Support (FLS) and Second-Line Support (SLS) staff analyze
and determine the severity if the priority is not clear. FLS can increase priority
because of commercial reasons.
5.1 Emergency
Examples of emergencies include:
• Complete system failure—The system does not handle any traffic, and a
manual intervention is needed to restore the system.
• Consultation requests
• Configuration questions
• Documentation problems
• Review of documents
• Configuration consultation
Glossary
AAA TWAMP
Authentication, Authorization, and Accounting Two Way Active Measurement Protocol
BFD
Bidirectional Forwarding Detection
BGP
Border Gateway Protocol
CES
Circuit Emulation Service
CLIs
Command-Line Interfaces
CSR
Customer Service Request
DHCP
Dynamic Host Configuration Protocol
FLS
First-Line Support
IS-IS
Intermediate System-to-Intermediate System
LDP
Label Distribution Protocol
O&M
Operation and Maintenance
OSPF
Open Shortest Path First
PTP
Precision Time Protocol
QoS
Quality Of Service
SLS
Second-Line Support
SNMP
Simple Network Management Protocol