Application Faults
This section contains information about application fault statistics. This category of alarm accounts for problems related to applications (protocols).
- H.323
- SIP
- RADIUS and Diameter
Application alarms do not display an alarm message in the graphic display window on the front panel of the chassis.
H.323 Statistics
You can use the following command to display H.323 statistics:
- show h323d
There is also an alarm that occurs when stack initialization fails.
Viewing H.323 Statistics
Display H.323 statistics by using the show h323d command.
For example:
acmepacket# show h323d
18:32:26-86
Session Stats -- Period -- -------- Lifetime -------
Active High Total Total PerMax High
Incoming Calls 5 5 1 18 6 5
Outgoing Calls 1 1 1 18 6 2
Connected Calls 1 1 1 8 2 1
Incoming Channels 2 2 2 17 4 2
Outgoing Channels 2 2 2 17 4 2
Contexts 5 5 1 18 6 5
H323D Status Current Lifetime
Queued Messages 1 1608
TPKT Channels 5 404
UDP Channels 0 0
Stack State Type Mode Registered Gatekeeper
h323172 enabled H323 Gateway No
In the first display section, the following statistics are displayed for period and lifetime durations in addition to an active count.
- Incoming Calls—Number of incoming H.323 calls.
- Outgoing Calls—Number of outgoing H.323 calls.
- Connected Calls—Number of currently connected H.323 calls.
- Incoming Channels—Number of established incoming channels.
- Outgoing Channels—Number of established outgoing channels.
- Contexts—Number of established H.323 contexts.
In the second section, the following statistics are displayed for current and lifetime durations.
- Queued Messages—Number of messages queued.
- TPKT Channels—Number of TPKT channels open(ed).
- UDP Channels—Number of UDP channels open(ed).
H.323 Stack Initialization Failure Alarm
The following table provides information about the H.323 ALARM STACK INITIALIZATION FAILURE application alarm, which is triggered by the failure of an H.323 stack to initialize properly.
Alarm Name | Alarm ID | Alarm Severity | Cause(s) | Example Log Message | Actions |
---|---|---|---|---|---|
H.323 ALARM STACK INITIALIZATION FAILURE | 327682 | CRITICAL | The H.323 stack has failed to initialize properly and is terminated. | [H.323 | IWF] stack <stack-name> has failed to initialize and is terminated | apSyslogMessageGenerated trap generated
critical dry contact syslog |
H.323 Monitoring Stack Alarm
- Viewing the number of active calls—You can see the number of active calls using the show h323 stack call command at either the User or Superuser prompt.You can also access this information with an SNMP query.
- Viewing alarm information—Two ACLI commands allow you to view alarm information, but they provide different information:
- display-alarms—This command shows alarm the most recently generated by an H.323 stack and the total number of stack monitoring alarms the
Oracle Communications Session Border Controller has generated. Since alarms can fire simultaneously, the alarm you can see using this command will only be the most recent one.
ORACLE# display-alarms 1 alarms to show ID Task Severity First Occurred Last Occurred 327694 462796192 3 2009-06-03 18:51:46 2009-10-03 18:51:46 Count Description 2 current calls are over critical threshold of 50 percent. Total no of h323 stack alarm generated are 2
- show h323 stack stack-alarms—This command refers to specific stacks by stack name, and provides shows the alarm severity and the current percentage of max-calls that triggered the alarm. The
Oracle Communications Session Border Controller keeps track of how many alarms are raised by each stacks, and the severity of each of those alarms. When the alarm clears, the information relating to it is erased from the display.
ORACLE# show h323 stack stack-alarms Stack-Name Alarm-Severity %Max-Call external minor 50 internal critical 50
- display-alarms—This command shows alarm the most recently generated by an H.323 stack and the total number of stack monitoring alarms the
Oracle Communications Session Border Controller has generated. Since alarms can fire simultaneously, the alarm you can see using this command will only be the most recent one.
SIP Statistics
You can use the following commands to view SIP statistics:
- show sipd errors
- show processes sipd
- show registration
Viewing SIP Errors
Display SIP error statistics by using the show sipd errors command. For example:
ORACLE# show sipd errors 11:34:13-194 SIP Errors/Events ---- Lifetime ---- Recent Total PerMax SDP Offer Errors 0 0 0 SDP Answer Errors 0 0 0 Drop Media Errors 0 0 0 Transaction Errors 0 0 0 Application Errors 0 0 0 Media Exp Events 0 0 0 Early Media Exps 0 0 0 Exp Media Drops 0 0 0 Expired Sessions 0 0 0 Multiple OK Drops 0 0 0 Multiple OK Terms 0 0 0 Media Failure Drops 0 0 0 Non-ACK 2xx Drops 0 0 0 Invalid Requests 0 0 0 Invalid Responses 0 0 0 Invalid Messages 0 0 0 CAC Session Drop 0 0 0 CAC BW Drop 0 0 0
Viewing SIP Processes
Display statistics about SIP processes by using the show processes sipd command. For example:
ORACLE# show processes sipd 11:34:49-130 (sipd) ID=1b89dfd0 Process Status -- Period -- -------- Lifetime -------- Active High Total Total PerMax High Services 5 5 0 5 5 5 Messages 0 0 0 6 4 3 Transactions 0 0 0 0 0 0 Timed Objects 7 7 0 14 11 9 Total Buffers 5 5 0 5 5 5 Alloc Buffers 3 3 0 7 4 5 Memory Chunks 48 48 0 82 79 50 TOQ Entries 2 2 14 58301 19 4 Operations 14 52997 12 Messages Received 0 3 2 Messages Sent 4 17681 30 Partial Message 0 0 0 Partial Msg Expired 0 0 0 Partial Msg Dropped 0 0 0 Timed Events 14 58291 12 Alarms 0 0 0 System Logs 4 17681 32 Process Logs 4 17684 35 Load Rate 0.0 0.0 CPU Usage 0.0 8.133/529935
Viewing IP Session Replication for Recording (SRR) Information
The show call-recording-server command displays information regarding the IP call recording feature configured on the Oracle Communications Session Border Controller. Entering this command without the optional call recording server (CRS) ID displays all CRS endpoints configured on the Oracle Communications Session Border Controller along with their state.
You can specify a CRS whose information you want to view. When you specify an ID, the ACLI displays all session agents created for the CRS endpoint, its IP address, its state, and the last time a failover occurred. For example:
Viewing SIP Registration Cache Status
Display SIP registration cache status by using the show registration command. The display shows statistics for the Period and Lifetime monitoring spans.
- Cached Entries—Number of registration entries for the address of record
- Local Entries—Number of entries for Contact messages sent to a real registrar.
- Forwards—Number of registration requests forwarded to the real registrar
- Refreshes—Number of registrations the Oracle Communications Session Border Controller answered without having to forward registrations to the real registrar
- Rejects—Number of unsuccessful registrations sent to real registrar
- Timeouts—Number of times a refresh from the HNT endpoint was not received before the timeout
For example:
ORACLE# show registration 11:38:57-177 SIP Registrations -- Period -- -------- Lifetime -------- Active High Total Total PerMax High User Entries 0 0 0 0 0 0 Local Contacts 0 0 0 0 0 0 Via Entries 0 0 0 0 0 0 AURI Entries 0 0 0 0 0 0 Free Map Ports 0 0 0 0 0 0 Used Map Ports 0 0 0 0 0 0 Forwards - - 0 0 0 Refreshes - - 0 0 0 Rejects - - 0 0 0 Timeouts - - 0 0 0 Fwd Postponed - - 0 0 0 Fwd Rejected - - 0 0 0 Refr Extension 0 0 0 0 0 0 Refresh Extended - - 0 0 0 Surrogate Regs 0 0 0 0 0 0 Surrogate Sent - - 0 0 0 Surrogate Reject - - 0 0 0 Surrogate Timeout - - 0 0 0 HNT Entries 0 0 0 0 0 0 Non-HNT Entries 0 0 0 0 0 0
SIP NSEP Statistics
To view statistics related to the NSEP feature, the ACLI show command has been expanded. It now allows you to see all of the statistics for NSEP support, to see them for a specific r-value (namespace and r-priority combination), or to see all of these. You can also reset the NSEP statistics counters.
When you use the ACLI show nsep-stats command without further arguments, the system shows you information for inbound sessions.
To display general NSEP statistics for inbound sessions:
NSEP Statistics per R-Value Display
You can see statistics for specific r-value by entering it with the show nsep-stats command. An r-value is a namespace and priority combination entered in the following format: namespace.priority. The display will also show the specified r-value for which it is displaying data.
To display general NSEP statistics for specific r-values:
- Type show nsep-stats, a Space, and then the r-value for which you want to display statistics. Then press Enter.
ORACLE# show nsep-stats ets.2 RValue = ets.2 -- Period -- -------- Lifetime -------- Active High Total Total PerMax High Incoming Sessions 0 0 0 0 0 0 Outgoing Sessions 0 0 0 0 0 0 InbSessions Rej - - 0 0 0 - OutbSessions Rej - - 0 0 0 -
You can see the full set of statistics for NSEP inbound sessions and for all r-values by using the show nsep-stats all command. The display for r-values is divided into individual sections for each r-value shown.
To display general NSEP statistics for specific r-values:
- Type show nsep-stats all and press Enter.
ORACLE# show nsep-stats all Session Stats ------- Lifetime--------- Current Total PerMax Inbound Sessions 0 0 0 Per RValue Stats -- Period -- -------- Lifetime -------- Active High Total Total PerMax High RValue = ets.2 Incoming Sessions 0 0 0 0 0 0 Outgoing Sessions 0 0 0 0 0 0 InbSessions Rej - - 0 0 0 - OutbSessions Rej - - 0 0 0 - RValue = ets.5 Incoming Sessions 0 0 0 0 0 0 Outgoing Sessions 0 0 0 0 0 0 InbSessions Rej - - 0 0 0 - OutbSessions Rej - - 0 0 0 -
Viewing NSEP Burst Statistics for SIP Session Agents
The ACLI show sipd command supports an sa-nsep-burst argument that displays the NSEP burst rate for all SIP session agents.
ORACLE# show sipd sa-nsep-burst Agent Current Rate Lifetime High 192.168.1.139 0 0 192.168.1.6 0 0 192.168.200.135 4 10
Resetting NSEP Statistics
You can reset the statistics for incoming sessions, for an individual r-value, or for the entire set of NSEP data. You use the same command syntax as you do when showing the statistics, except that you start your entry with the reset command.
In the example below, the command resets the statistics counters for the specific r-value ets.2.
To reset the counters for a specific r-value:
- For the set of statistics you want to reset, type reset nsep-stats and then the group that you want to reset. The press Enter.
ORACLE# reset nsep-stats ets.2
To reset the counters for all NSEP statistics:
- For the set of statistics you want to reset, type reset nsep-stats and then press Enter.
ORACLE# reset nsep-stats
Viewing SIP Method Throttling Mechanism Statistics
You can monitor the SIP method throttling mechanism statistics for either a specific SIP interface or a session agent.
To display SIP method throttling mechanism statistics for a SIP interface:
- Type show sipd interface, a Space, and then the SIP interface’s name and the SIP method name for which you want statistics. Then press Enter.
ORACLE# show sipd interface net1 NOTIFY NOTIFY (15:53:42-57) --------- Server -------- --------- Client -------- Message/Event Recent Total PerMax Recent Total PerMax ------ --------- ------ ------ --------- ------ NOTIFY Requests 0 49 19 0 0 0 Retransmissions 0 0 0 0 0 0 100 Trying 0 49 19 0 0 0 180 Ringing 0 38 19 0 0 0 200 OK 0 38 19 0 0 0 503 Service Unavail 0 11 11 0 0 0 Response Retrans 0 9 5 0 0 0 Transaction Timeouts - - - 0 0 0 Locally Throttled - - - 0 0 0 Avg Latency=0.000 for 0 Max Latency=0.000 BurstRate Incoming=11 Outgoing=0
To display SIP method throttling mechanism statistics for a session agent:
- Type show sipd agents, a Space, and then the session agent IP address and the SIP method name for which you want statistics. Then press Enter.
ORACLE# show sipd agents 198.167.1.60 NOTIFY NOTIFY (15:53:34-49) --------- Server -------- --------- Client -------- Message/Event Recent Total PerMax Recent Total PerMax ------ --------- ------ ------ --------- ------ NOTIFY Requests 0 50 31 0 0 0 Retransmissions 0 3 3 0 0 0 200 OK 0 25 18 0 0 0 503 Service Unavail 0 25 24 0 0 0 Transaction Timeouts - - - 0 0 0 Locally Throttled - - - 0 24 24 Avg Latency=0.000 for 0 Max Latency=0.000 BurstRate Incoming=5 Outgoing=0
Viewing SIP IP CAC Statistics
You can display CAC parameters for an IP address using the show sipd ip-cac command. For example:
ORACLE# show sipd ip-cac 192.168.200.191 CAC Parameters for IP <192.168.200.191> Allowed Sessions=2 Active-sessions=0 Allowed Bandwidth=3000000 used-bandwidth=0
Viewing SIP PUBLISH Statistics
You can display statistics related to incoming SIP PUBLISH messages using the show sipd publish command. For example:
summer# show sipd publish PUBLISH (10:26:43-199) --------- Server -------- --------- Client -------- Message/Event Recent Total PerMax Recent Total PerMax ------ --------- ------ ------ --------- ------ PUBLISH Requests 1 1 1 0 0 0 Retransmissions 0 0 0 0 0 0 405 Not Allowed 1 1 1 0 0 0 Transaction Timeouts - - - 0 0 0 Locally Throttled - - - 0 0 0
RADIUS Statistics
The ACLI show radius command, used with the three arguments described in this section, displays the status of any established RADIUS accounting connections and authentications. A working RADIUS connection displays READY, and a disabled connection displays DISABLED.
There is also an alarm that occurs when the RADIUS connection is down.
Viewing RADIUS Statistics
The show radius command can take one of the three available arguments:
- authentication—Shows authentication statistics for primary and secondary RADIUS servers, including: server IP address and port; round trip time; information about failed and successful requests/authentications; number of rejections; number of challenges; number of time-outs, number of retransmissions
- accounting—Shows the
information described in the following table:
Section Description Client Display General accounting setup (as established in the accounting configuration element), including: Information about the state of the RADIUS client
Accounting strategy used (Hunt, Failover, RoundRobin, FastestRTT, or FewestPending)
IP address and port on which the server is listening
Maximum message delay in seconds
Number of configured accounting servers
Waiting Queue Amount of accounting (RADIUS) messages waiting to be sent. Waiting queue capacity is 4,096 messages. <IP Address:Port> Information about each configured accounting server (established in the accounting servers configuration). The heading above each accounting server section is the IPv4 address and port combination of the accounting server described. This section also includes information about the accounting server’s state (e.g., Connect_Attempt, INIT). - all—Shows all of the information for both the authentication and accounting displays
The following is an example of the show radius authentication command output.
ORACLE# show radius authentication Active Primary Authentication Servers: server ipAddr: 172.30.0.7 Active Secondary Authentication Servers: server ipAddr: 172.30.0.8 Authentication Statistics: Server:"172.30.0.7:1812" RoundTripTime :0 MalformedAccessResponse:0 AccessRequests :2 BadAuthenticators :0 AccessRetransmissions :5 AccessAccepts :0 Timeouts :6 AccessRejects :0 UnknownPDUTypes :0 AccessChallenges :0 Server:"172.30.0.8:1812" RoundTripTime :0 MalformedAccessResponse:0 AccessRequests :2 BadAuthenticators :0 AccessRetransmissions :9 AccessAccepts :0 Timeouts :10 AccessRejects :0 UnknownPDUTypes :0 AccessChallenges :0
The following is an example of the show radius accounting command output.
ORACLE# show radius accounting
*********Client Display Start************ Client State = READY, strategy=Hunt listening on 127.0.0.1:1813 max message delay = 60 s, # of servers = 2 ================= Waiting Queue ================ Waiting size = 89 ================================================ ----------------- 10.0.0.189:1813 ------------------ Remote = 10.0.0.189:1813, Local = 0.0.0.0:1026, sock=45 (BOUND) conn state=READY, RTT=250 ms Min Rtt=250 ms, Max inactivity=60 s, expires at Nov 21 13:50:19.582, Restart delay=30 s ----------------- 192.168.200.70:5050 ------------------ Remote = 192.168.200.70:5050, Local = 0.0.0.0:1027, sock=46 (BOUND) conn state=DISABLED, RTT=0 ms Min Rtt=250 ms, Max inactivity=60 s, expires at Nov 21 13:50:19.569, Restart delay=30 s *********Client Display End************
The following is an example of the show radius all command output.
ORACLE# show radius all *********Client Display Start************ Client State = READY, strategy=Hunt listening on 127.0.0.1:1813 max message delay = 60 s, # of servers = 2 ================= Waiting Queue ================ Waiting size = 89 ================================================ ----------------- 10.0.0.189:1813 ------------------ Remote = 10.0.0.189:1813, Local = 0.0.0.0:1026, sock=45 (BOUND) conn state=READY, RTT=250 ms Min Rtt=250 ms, Max inactivity=60 s, expires at Nov 21 13:50:19.582, Restart delay=30 s ----------------- 192.168.200.70:5050 ------------------ Remote = 192.168.200.70:5050, Local = 0.0.0.0:1027, sock=46 (BOUND) conn state=DISABLED, RTT=0 ms Min Rtt=250 ms, Max inactivity=60 s, expires at Nov 21 13:50:19.569, Restart delay=30 s *********Client Display End************ Active Primary Authentication Servers: server ipAddr: 172.30.0.7 Active Secondary Authentication Servers: server ipAddr: 172.30.0.8 Authentication Statistics: Server:"172.30.0.7:1812" RoundTripTime :0 MalformedAccessResponse:0 AccessRequests :2 BadAuthenticators :0 AccessRetransmissions :5 AccessAccepts :0 Timeouts :6 AccessRejects :0 UnknownPDUTypes :0 AccessChallenges :0 Server:"172.30.0.8:1812" RoundTripTime :0 MalformedAccessResponse:0 AccessRequests :2 BadAuthenticators :0 AccessRetransmissions :9 AccessAccepts :0 Timeouts :10 AccessRejects :0 UnknownPDUTypes :0 AccessChallenges :0
RADIUS Connection Down Alarm
The following table lists the alarm generated when the RADIUS accounting connection is down.
Alarm Name | Alarm ID | Alarm Severity | Cause(s) | Example Log Message | Actions |
---|---|---|---|---|---|
RADIUS ACCOUNTING CONNECTION DOWN | 327681 | CRITICAL: if all enabled and configured Remote
Authentication Dial-in User Service (RADIUS) accounting server connections have
timed-out without response from the RADIUS server
MAJOR: if some, but not all configured RADIUS accounting server connections have timed-out without response from the RADIUS server. |
The enabled connections to RADIUS servers have timed-out without a response from the RADIUS server. | CRITICAL: All enabled accounting connections
have been lost! Check accounting status for more details.
MAJOR: One or more enabled accounting connections have been lost! Check accounting status for more details. |
apSyslogMessageGenerated trap generated
apSysMgmtRadiusDownTrap trap generated syslog |
Security Breach Statistics
You can view statistics about denied ACL entries by using the following commands:
- acl-show
- show acl
Viewing List of Denied ACL Entries
Display a list of denied ACL entries by using the acl-show command. If a IP address and realm ID is denied of service, its is added to the deny list. This command shows list of deny ACL entries. Information for each entry includes:
- Incoming port, slot, and VLAN tag
- Source IP, bit mask, port, and port mask
- Destination IP address and port
- Protocol
- ACL entry as static or dynamic
- ACL entry index
For example:
ORACLE# acl-show deny entries: intf:vlan source-ip/mask:port/mask dest-ip/mask:port/mask prot type index Total number of deny entries = 0 Denied Entries not allocated due to ACL constraints: 0 task done
Viewing ACL List Entries
Display entries in the deny, untrusted, and trusted lists using the show acl command.
- show acl denied
- show acl untrusted
- show acl trusted
- show acl summary
- show acl all
- show acl ip
For example:
show acl denied displays summary data for denied endpoints.
ORACLE# show acl denied Deny entries: intf:vlan Source-IP/mask port/mask dest-IP/mask port/mask prot type index Total number of deny entries = 0 Denied Entries not allocated due to ACL constraints: 0 ORACLE# show acl trusted ------------- Apr 30 17:33:05.716 Static trusted entries: intf:vlan src-ip/mask:port dest-ip/mask:port prot type index recv drop 0/3:3000 0.0.0.0 192.168.0.123 ICMP static 2 0 0 0/2:2000 O.0.0.0 172.16.O.123:5060 UDP static 4 0 0 Total number of static trusted entries = 2 dynamic trusted entries: intf:vlan source-ip/mask:port dest-ip/mask:port prot type index 0/3:3000 192.168.0.10:5060 192.168.0.123:5060 UDP dynamic 5 Total number of dynamic trusted entries = 1
show acl summary displays cumulative and per-interface statistics on ACL traffic and drops, displaying Recent, Total and PerMax counts. The parameter also separates the display of traffic from trusted versus untrusted sites.
ORACLEshow acl summary
14:25:04-594
---------------- ACL Stats Overall ---------------------
Entries Packets Dropped
Recent Total PerMax Recent Total PerMax
Trusted 0 292 292 292 0 0 0
Untrusted 2 65 65 49 0 0 0
-------------------- ACL Stats Per Interface ------------------
Entries Packets Dropped
Recent Total PerMax Recent Total PerMax
Slot 0 /Port 0
Trusted 0 164 164 164 0 0 0
Untrusted 1 37 37 29 0 0 0
Slot 0 /Port 1
Trusted 0 128 128 128 0 0 0
Untrusted 1 28 28 20 0 0 0
Column definitions for this parameter include:
- Recent—-Number of packets or drops accumulated in the most recent 5 minute interval. Note that this interval is not configurable and is not calculated via the command output's time stamp
- Total—Number of packets or drops accumulated since last reboot.
- PerMax—Highest number of SIP messages and/or events that occurred during a single time period since the system was last rebooted.Identifies the highest individual Period Totals since the system was last rebooted.
show acl all displays summary data for denied endpoints, static trusted endpoints, and dynamic trusted endpoints.
ORACLE# show ad all
Deny entries:
intf:vlan src-IP/mask port/mask dest-IP/mask port/mask prot type index
Total number of deny entries = 0
Static trusted entries:
intf:vlan src-IP/mask:port dest-IP/mask:port prot type index recv drop
0/0:0 0.0.0.0 192,1680,80 ICMP static 65536 0 0
1/0:0 0.0.0.0 172.16.0.80 ICMP static 65537 0 0
Total number of static trusted entries = 2
dynamic trusted entries:
intf:vlan src-IP/mask port dest-IP/mask port prot type index recv drop
0/0:0 0.0.0.0 192.168.0.80 ICMP static 65536 0 0
1/0:0 0.0.0.0 172.16.0.80 ICMP static 65537 0 0
Total number of dynamic trusted entries = 2
untrusted entries:
intf:vlan src-IP/mask port dest-IP/mask port prot type index
0/0:0 0.0.0.0 192.168.0.80 5060 UDP static 65538
1/0:0 0.0.0.0 172.16.0.80 5060 UDP static 65539
Total number of untrusted entries = 2
Total deny entries: 0 (0 dropped)
Total media entries: 3
Total static trusted entries: 2 (0 dropped)
Total dynamic trusted entries: 2 (0 dropped)
Total untrusted entries: 2 (0 dropped)
Total INTFC table entries: 0
Media Entries not allocated due to ACL constraints: 0
Trusted Entries not allocated due to ACL constraints: 0
untrusted Entries not allocated due to ACL constraints: 0
Denied Entries not allocated due to ACL constraints: 0
Viewing ACL List Entries by IP Address
You can filter the output of show acl all based on IP address. For example:
ORACLE# show acl ip 192.168.69.65 deny entries: intf:vlan src-ip/mask:port/mask dest-ip/mask:port/mask prot type index Total number of deny entries = 0 trusted entries: intf:vlan src-ip/mask:port/mask dest-ip/mask:port/mask prot type index recv drop Total number of trusted entries = 0 untrusted entries: intf:vlan src-ip/mask:port/mask dest-ip/mask:port/mask prot type index Total number of untrusted entries = 0
Viewing ACL Entry Space in the CAM
Display how much space is used in the CAM for ACL entries, in a percentage and raw value breakdown of the use, by using the show acl info command. For example:
ORACLE# show acl info Access Control List Statistics: | # of entries | % utilization | Reserved Entry Count ------------------------------------------------------------------------------- Denied | 0 0.0% 32000 Trusted | 0 0.0% 8000 Media | 1 0.0% 64000 Untrusted | 0 0.0% 2000 Dynamic Trusted | 0 0.0% 250000 INTFC | 1 - - ------------------------------------------------------------------------------- Total CAM space used = 2 of 126976 (100.00% free) Total HASH-table space used = 0 of 250050 (100.00% free) ------------------------------------------------------------------------------- Media Entries not allocated due to ACL constraints: 0 Trusted Entries not allocated due to ACL constraints: 0 Untrusted Entries not allocated due to ACL constraints: 0 Denied Entries not allocated due to ACL constraints: 0