cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2132
Views
0
Helpful
4
Replies

Collect cdr from cisco gateway AS5300 into a database in realtime

nawfeloujdi
Level 1
Level 1

Hello !!

somebody knows how can i collect cdr from cisco gateway AS5300 into a database in realtime?

Regards

2 Accepted Solutions

Accepted Solutions

You can use gw-accounting as explained below:

gw-accounting

To enable an accounting method for collecting call detail  records (CDRs), use the gw-accounting command in global  configuration mode. To disable an accounting method, use the no form of this command.

gw-accounting {aaa | file | syslog [stats] }

no gw-accounting {aaa | file | syslog [stats] }

gw-accounting {h323 [vsa] | syslog | voip}

no gw-accounting {h323 [vsa] | syslog | voip}

Syntax Description

aaa

Enables accounting through the AAA system and sends call  detail records to the RADIUS server in the form of vendor-specific attributes  (VSAs).

file

Enables the file accounting method to store call detail  records in .csv format.

syslog

Enables the system logging facility to output accounting  information in the form of a system log message.

stats

(Optional) Enables voice quality statistics to be sent to the  system log.

h323

Enables standard H.323 accounting using Internet Engineering  Task Force (IETF) RADIUS attributes.

vsa

(Optional) Enables H.323 accounting using RADIUS VSAs.

voip

Enables generic gateway-specific accounting.

You can find more info in cisco IOS voice command reference guide.

This is an example to collect CDR of H.323 calls via RADIUS:

gw-accounting syslog
gw-accounting aaa
attribute acct-session-id overloaded
attribute h323-remote-id resolved
acct-template callhistory-detail

Regards.

View solution in original post

Remove aaa authentication login default group radius local

and try this:

aaa authentication login LOCAL local
line vty 0 4
login authentication LOCAL


Regards.

View solution in original post

4 Replies 4

You can use gw-accounting as explained below:

gw-accounting

To enable an accounting method for collecting call detail  records (CDRs), use the gw-accounting command in global  configuration mode. To disable an accounting method, use the no form of this command.

gw-accounting {aaa | file | syslog [stats] }

no gw-accounting {aaa | file | syslog [stats] }

gw-accounting {h323 [vsa] | syslog | voip}

no gw-accounting {h323 [vsa] | syslog | voip}

Syntax Description

aaa

Enables accounting through the AAA system and sends call  detail records to the RADIUS server in the form of vendor-specific attributes  (VSAs).

file

Enables the file accounting method to store call detail  records in .csv format.

syslog

Enables the system logging facility to output accounting  information in the form of a system log message.

stats

(Optional) Enables voice quality statistics to be sent to the  system log.

h323

Enables standard H.323 accounting using Internet Engineering  Task Force (IETF) RADIUS attributes.

vsa

(Optional) Enables H.323 accounting using RADIUS VSAs.

voip

Enables generic gateway-specific accounting.

You can find more info in cisco IOS voice command reference guide.

This is an example to collect CDR of H.323 calls via RADIUS:

gw-accounting syslog
gw-accounting aaa
attribute acct-session-id overloaded
attribute h323-remote-id resolved
acct-template callhistory-detail

Regards.

Hello !

  Thanks for  reply, it  was helpful. Everythings seems working well but now the telnet connection of cisco gw request an aaa authentication too. how can i exclude telnet connection from radius authentication (Something is missing in my line vty config perhaps). This my aaa  and line vty configuration:

aaa authentication login default group radius local
aaa authorization exec default group radius if-authenticated
aaa accounting network default start-stop group radius
aaa accounting connection default start-stop group radius
aaa accounting connection h323 start-stop group radius
aaa accounting system default start-stop group radius
aaa session-id common

!

!

line vty 0 4
password 7 151E041F507EXXXXXX

Regards

Remove aaa authentication login default group radius local

and try this:

aaa authentication login LOCAL local
line vty 0 4
login authentication LOCAL


Regards.

Thank you Daniele, I get the request behaviour by the way you said in your reply and replacing:

  aaa authorization exec default group radius if-authenticated

with

aaa authorization exec default if-authenticated

Thank you very much!!