一,常用命令1,rmem,store目录收集(该操作以B板举例):登陆C板:>> shbCEM-enb0dev-enb0dev> ssh 192.168.2.1 (Bcem板卡IP)Warning: Permanently added '192.168.2.1' (RSA) to the list of known hosts. enb0dev@192.168.2.1's password: Qwe*90opThis system is restricted solely to authorized users for legitimate business purposes.The actual or attempted unauthorized access, use or modification of this system is strictly prohibited. Unauthorized users are subject to Company disciplinary proceeding and/or criminal and civil penalties under state, federal or other applicable domestic or foreign laws.The use of this system may be monitored and recorded for administrative and security reasons. Anyone accessing this system expressly consents to such monitoring and is advised that if monitoring reveals possible evidence of criminal activity, such activity may be provided as evidence to law enforcement officials.All users must comply, without exception.Starting CLI ProcessRead number of records from file = /active/config/bci_menu.conf.0> shbCEM-enb0dev-enb0dev> su -Password: #edcVfr4%tbCEM-root-root> cd /bCEM-root-/> lsactive conf driver ffs1 lib passive rdatasbin sys uactive vardata etc home mnt pipe rmem scd tftpboot upassivebin dev ffs0 init opt proc root store tmp usrbCEM-root-/> tar czvf b_rmem.tar.gz /rmem (压缩该文件夹)tar: removing leading '/' from member namesrmem/rmem/pltf_syslog.logrmem/callpbrc.upos_txt#3rmem/callpbrc.upos_txt#2.…………………………………………….bCEM-root-/> tar czvf b_ store.tar.gz / store (压缩该文件夹)bCEM-root-/> lsactive conf driver ffs1 lib passive rdata sbin sys uactive varb_rmem.tar.gz data etc home mnt pipe rmem scd tftpboot upassivebin dev ffs0 init opt proc root store tmp usr b_ store.tar.gzbCEM-root-/> chmod 777 b_rmem.tar.gz (修改文件权限)bCEM-root-/> chmod 777 b_ store.tar.gzbCEM-root-/> ftp 192.168.1.2 (Eccm板卡IP)Connected to 192.168.1.2.220 192.168.10.1 FTP server (GNU inetutils 1.6) ready.Name (192.168.1.2:enb0dev): root331 Password required for root.Password: #edcVfr4%t230-230- This system is restricted solely to authorized users for legitimate business 230- purposes.230-230- The actual or attempted unauthorized access, use or modification of this230- system is strictly prohibited. Unauthorized users are subject to Company230- disciplinary proceeding and/or criminal and civil penalties under state,230- federal or other applicable domestic or foreign laws.230-230- The use of this system may be monitored and recorded for administrative and 230- security reasons. Anyone accessing this system expressly consents to such 230- monitoring and is advised that if monitoring reveals possible evidence of 230- criminal activity, such activity may be provided as evidence to law230- enforcement officials.230- All users must comply, without exception.230-230 User root logged in.Remote system type is UNIX.Using binary mode to transfer files.ftp> cd /home/enb0xfer250 CWD command successful.ftp> put b_rmem.tar.gz200 PORT command sucessful.150 Opening BINARY mode data connection for 'b_rmem.tar.gz'.226 Transfer complete.359430 bytes sent in 0.00739 seconds (48643928 bytes/s)ftp> put b_ store.tar.gz200 PORT command sucessful.150 Opening BINARY mode data connection for 'b_rmem.tar.gz'.226 Transfer complete.359430 bytes sent in 0.00459 seconds (456824458 bytes/s)ftp> bye> shbCEM-enb0dev-enb0dev> exit> exitExiting CLI ProcessConnection to 192.168.2.1 closed.eCCM2-enb0dev-enb0dev> cd /home/enb0xfereCCM2-enb0dev-enb0xfer> lsb_rmem.tar.gz b_ store.tar.gz2,database即时刷新命令及导出:登陆C板:>> cd NETCONF/ncagentd/NETCONF/ncagentd> lsdisplayLO Dump DMD databasecdbExportXml Export CDB to yang conform xml-file: database.xml cdbImportXml Import CDB from yang conform xml-file: database.xml displaySingleLO display single object instance in DMD database/NETCONF/ncagentd> cdbExportXml (通过该命令刷新database文件) cdbExportXmlcdbExportXml to file /data/db/active/mim/database.xml is OK /NETCONF/ncagentd> cd />sheCCM2-enb0dev-enb0dev> su -Password: #edcVfr4%teCCM2-root-root> cd /dataeCCM2-root-/data> lsCB bci_menu.conf.20 bci_menu.conf.23 bci_menu.conf.27 db pmfsbackup bci_menu.conf.21 bci_menu.conf.24 bci_menu.conf.4 lost+found scdbci_menu.conf.12 bci_menu.conf.22 bci_menu.conf.25 cfg nv sweCCM2-root-/data> cd dbeCCM2-root-db> ls#BI_08D0#FT_OMsw#FI_eccm2#FV_000003BE active passive snmp_nv.oldeCCM2-root-db> cd activeeCCM2-root-#BI_08D0#FT_OMsw#FI_eccm2#FV_000003BE> lsmib mimeCCM2-root-#BI_08D0#FT_OMsw#FI_eccm2#FV_000003BE> cd mimeCCM2-root-mim> lsA.cdb aaa_init.xml confd notify_init.xml vacm_init.xmlC.cdb community_init.xml database.xml target_init.xmleCCM2-root-mim> cp database.xml /home/enb0xfer (复制到/home/enb0xfer目录)eCCM2-root-mim> cd /home/enb0xfereCCM2-root-enb0xfer> chmod 777 database.xml (修改文件权限)3,Eccm板卡上小区倒换操作:登陆Eccm板卡:>> cd pltf/pltf/fsmg/pltf/pltf/fsmg> lsstat State of the partitionsinfo Display some debug informationactivate Activate the passive partitionupgrade <file> Upgrade the passive u-bootactivecurr Activate Current Active partition/pltf/pltf/fsmg> activate (通过该命令进行切区)activate : Current boot partition id is : ffs0activate : Next boot partition id will be : ffs1后面需要登陆Eccm板卡root用户,进行reboot操作4,查看各板卡IP,MAC(主要针对RRH):>> sheCCM2-enb0dev-enb0dev> su -Password: #edcVfr4%teCCM2-root-root> arpAddress HWtype HWaddress Flags Mask Iface192.168.128.2 ether 00:11:3f:dc:a1:63 CM eth3100.93.238.1 ether 34:e0:cf:fe:51:70 C eth0.1501192.168.1.10 ether 00:01:02:03:04:05 CM eth3192.168.148.1 ether 54:a6:19:34:22:8b C eth3192.168.130.3 ether 00:11:3f:dc:d9:0c CM eth3100.83.238.36 ether 34:e0:cf:fe:51:70 C eth0.601100.83.238.1 ether 34:e0:cf:fe:51:70 C eth0.601192.168.146.1 ether 54:a6:19:34:23:cd C eth3192.168.129.2 ether 00:11:3f:dc:a1:63 CM eth3192.168.150.1 ether 54:a6:19:2f:b1:e9 C eth3通过ARP命令可以看到Eccm,RRH板卡的IP及MAC信息。