Print Download PDF Send Feedback

Previous

Troubleshooting

In This Section:

General Guidelines

Log Files

Viewing the Performance Statistics

Automatically Saving Messages from the Falcon Acceleration Cards

General Guidelines

Log Files

Location

Description

/tmp/bcm_boot_log

Temporary boot log file.

Contains additional information about the Falcon Acceleration Cards startup.

/var/log/sam_crash/

A fatal error in the Falcon Acceleration Card software triggers a panic on the Host Security Appliance and initiates a procedure to transfer relevant forensic data from the Falcon Acceleration Card to the Host Security Appliance. After the Host Security Appliance reboots, core dump files are located in this directory.

/var/log/sam_crash/crash_list

File that contain information about crashes and hangs of Falcon Acceleration Cards.

This file does not exist until the first crash or hang.

/var/ktr_dump

File that shows the kernel trace information from Falcon Acceleration Cards.

This file does not exist until the first crash or hang.

/var/log/messages

Gaia Operating System log file.

/var/log/dmesg

Log file for the Linux kernel ring buffer.

To see the current messages, run the dmesg command in the Expert mode.

Viewing the Performance Statistics

For more information about the SecureXL, see the R80.20 Performance Tuning Administration Guide.

Step

Description

1

Connect to the command line on the Host Security Appliance.

2

Log in to the Expert mode.

3

Run the applicable commands (see below).

Best Practice - Collect the complete information before and after the issue:

  1. Collect the output before the issue:

    [Expert@HostName:0]# (echo "$(hostname) , $(/bin/date +"%b %d %H:%M:%S %Y")" ; ipsctl -a) >> /var/log/ipsctl_before.txt

  2. Replicate the issue / wait for the issue to occur.
  3. Collect the output after the issue:

    [Expert@HostName:0]# (echo "$(hostname) , $(/bin/date +"%b %d %H:%M:%S %Y")" ; ipsctl -a) >> /var/log/ipsctl_after.txt

To see the packet drops on the interfaces:

ipsctl -a | grep "slot:" | \
egrep "_err|_drop" | \
egrep "fail_|ifdown_|invalid_if_|l2_filt_|too_big|nae_|no_link_|pcie_|rx_v"

Description of counters:

To see the packets in Slow Path (F2F):

ipsctl -a net:dev:adp:if:reasons

Most important counters are:

Packet drops because of route lookup failures:

ipsctl net:dev:adp:rt:stats:rt_reinject_drop

To see the packet drops because of ARP failures:

ipsctl -a | egrep "arp_dropped|arp_expired"

Description of the counters:

To see the packet drops between the PCIe and acceleration cards:

ipsctl -a | grep tx_fulls

Description of the counters:

To see the packet drops between the PCIe and the Host Security Appliance:

ipsctl -a | egrep "no_jumbo_local|no_reg_local"

Description of the counters:

To see the Deep Packet Inspection (DPI) drops:

ipsctl -a | grep ':dpi:' | \
egrep "enqueue_failure|packet_pool_failures|search_clamping|search_failure|start_failure"

Description of the counters:

To see the Falcon Acceleration Cards packet pool:

ipsctl -a | grep usim | grep pkt_pool

To see the IPsec Security Associations (SAs) encryption and decryption statistics:

ipsctl -a | grep "slot:" | egrep "no_sa|oerr|olen_err|replay_err"

Description of the counters:

To see the traffic paths distribution:

fwaccel [-i <SecureXL Instance ID>] stats

To see the PXL statistics:

fwaccel [-i <SecureXL Instance ID>] stats -x

To see the packet reordering prevention statistics:

fwaccel [-i <SecureXL Instance ID>] stats -o

To see the CoreXL Dispatcher statistics:

fw ctl pstat -m

Most important counters are:

To see the CPAS drop statistics:

fw ctl fwcpasstat | grep drop

To see the PSL drop statistics:

fw ctl fwtcpstrstat -p | grep drop

Automatically Saving Messages from the Falcon Acceleration Cards

You can configure the Falcon Acceleration Cards to generate additional important messages automatically.

In this case, you must configure the Host Security Appliance to save these messages automatically.

The Host Security Appliance saves the messages in the Linux kernel ring buffer - dmesg.

To control this feature, use these parameters on the Host Security Appliance:

Parameter Value

Description

net:dev:bp:log_messages=0

This is the default value.

The Falcon Acceleration Cards do not generate additional important messages automatically.

net:dev:bp:log_messages=1

The Falcon Acceleration Cards generate additional important messages automatically.

Best Practice - In cluster, configure the same value of this parameter on all the Cluster Members.

To examine the current Host Security Appliance configuration:

Step

Description

1

Connect to the command line on your Host Security Appliance.

2

Log in to the Expert mode.

3

Check the current value of the Falcon Acceleration Cards logging parameter:

[Expert@MyAppliance:0]# ipsctl net:dev:bp:log_messages

Example:

[Expert@MyAppliance:0]# ipsctl net:dev:bp:log_messages

ipsctl net:dev:bp:log_messages = 0

[Expert@MyAppliance:0]#

To enable the feature temporarily on the Host Security Appliance (does not survive reboot):

Step

Description

1

Connect to the command line on your Host Security Appliance.

2

Log in the Expert mode.

3

Set the current value of the Falcon Acceleration Cards logging parameter:

[Expert@MyAppliance:0]# ipsctl -w net:dev:bp:log_messages 1

Example:

[Expert@MyAppliance:0]# ipsctl -w net:dev:bp:log_messages 1

net:dev:bp:log_messages 0 -> 1

[Expert@MyAppliance:0]#

To enable the feature permanently on the Host Security Appliance (survives reboot):

Step

Description

1

Connect to the command line on your Host Security Appliance.

2

Log in to the Expert mode.

3

Set the value of the Falcon Acceleration Cards logging parameter:

  1. Back up the current script:

    [Expert@MyAppliance:0]# cp -v /etc/rc.d/rc.local{,_BKP}

  2. Edit the current script:

    [Expert@MyAppliance:0]# vi /etc/rc.d/rc.local

  3. Add these two lines at the bottom of the script:

    # Falcon Acceleration Cards - Additional logging during the card crash
    ipsctl -w net:dev:bp:log_messages 1

    Important - After the second line, you must press Enter to start a new line.

  4. Save the changes in the file and exit the Vi editor.
  5. Examine the file (it must end with an empty line):

    [Expert@MyAppliance:0]# cat -n /etc/rc.d/rc.local

5

Reboot the Host Security Appliance.

Important - In cluster, this can cause a failover.

6

Connect to the command line on your Host Security Appliance.

7

Log in to the Expert mode.

8

Make sure the new value of the Falcon Acceleration Cards logging parameter is set:

[Expert@MyAppliance:0]# ipsctl net:dev:bp:log_messages

To see the messages saved in the Linux kernel ring buffer:

Step

Description

1

Connect to the command line on your Host Security Appliance.

2

Log in to the Expert mode.

3

Examine the saved messages from the Linux kernel ring buffer:

[Expert@MyAppliance:0]# less /var/log/dmesg

4

Print the contents of the current Linux kernel ring buffer.

  • To print the messages on the screen:

    [Expert@MyAppliance:0]# dmesg

  • To print the messages into a file:

    [Expert@MyAppliance:0]# dmesg > /<path>/<filename>

    Example:

    [Expert@MyAppliance:0]# dmesg > /var/log/acceleration_card_dmesg.txt

For more information, see https://linux.die.net/man/8/dmesg.