Sunteți pe pagina 1din 54

Converting Cisco IOS Configurations to

Cisco IOS XR Configurations


Cisco IOS XR Software Release 3.3

Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100

Text Part Number: OL-8503-01

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public
domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of
Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo,
Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step,
Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study,
LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to
Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (0710R)

Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the
document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Converting Cisco IOS Configurations to Cisco IOS XR Configurations
Copyright 2006 Cisco Systems, Inc. All rights reserved.

R3.3.0 FCS DraftCisco Conf idential Informa tion

Contents
Preface

Changes to This Document

Obtaining Documentation v
Cisco.com v
Documentation DVD vi
Ordering Documentation vi
Documentation Feedback

vi

Cisco Product Security Overview vii


Reporting Security Problems in Cisco Products

vii

Obtaining Technical Assistance viii


Cisco Technical Support & Documentation Website
Submitting a Service Request viii
Definitions of Service Request Severity ix
Obtaining Additional Publications and Information

viii

ix

Converting Cisco IOS Configurations to


Cisco IOS XR Configurations 1
Contents

Conversion Procedure

General Differences Between Cisco IOS and Cisco IOS XR Software


Cisco IOS Configurations Absent From Cisco IOS XR Software

Cisco IOS and Cisco IOS XR Configurations That Are the Same

Cisco IOS Configurations That Are Similar in Cisco IOS XR


Basic Interface Configuration

IPv4 Unicast Routing and Forwarding 8


General IP Routing 8
Intermediate System-to-Intermediate System (IS-IS)
Open Shortest Path First (OSPF) 11

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

iii

Contents

R3.3 Beta DraftCisco Conf idential Information


Border Gateway Protocol (BGP)
Multicast 20

13

Multiprotocol Label Switching (MPLS) 21


Minor Differences and Adjustments 21
Label Distribution Protocol (LDP) 22
Traffic Engineering (TE) 22
Quality of Service (QoS)
IPv6

24

26

Other Cisco IOS XR Issues 27


Access Lists 27
Username Configuration and Permission Levels 28
Network Time Protocol (NTP) 29
Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)
Line Configurations 30
Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language 31
Introduction and Overview 31
Original Route Map Configuration 32
A Simple Translation 33
Using Nested Conditionals to Reduce Repetitive Comparisons 34
Using Inline Sets to Remove Small Indirect Set References 36
Taking Advantage of Parameterization to Reuse Common Structures 37
INDEX

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

iv

29

Preface
This document describes how to convert Cisco IOS software configurations to Cisco IOS XR software
configurations. This preface for Converting Cisco IOS Configurations to Cisco IOS XR Configurations
contains the following sections:

Changes to This Document, page v

Obtaining Documentation, page v

Documentation Feedback, page vi

Cisco Product Security Overview, page vii

Obtaining Technical Assistance, page viii

Obtaining Additional Publications and Information, page ix

Changes to This Document


Table 1

Changes for This Document

Revision

Date

Change Summary

OL-8503-01

September 2007

Added Conversion Procedure, page 2

OL-8503-01

April 2006

Initial release of this document.

Obtaining Documentation
Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several
ways to obtain technical assistance and other technical resources. These sections explain how to obtain
technical information from Cisco Systems.

Cisco.com
You can access the most current Cisco documentation at this URL:
http://www.cisco.com/univercd/home/home.htm
You can access the Cisco website at this URL:
http://www.cisco.com

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Preface
Documentation Feedback

You can access international Cisco websites at this URL:


http://www.cisco.com/public/countries_languages.shtml

Documentation DVD
Cisco documentation and additional literature are available in a Documentation DVD package, which
may have shipped with your product. The Documentation DVD is updated regularly and may be more
current than printed documentation. The Documentation DVD package is available as a single unit.
Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product
number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.
Cisco Ordering tool:
http://www.cisco.com/en/US/partner/ordering/
Cisco Marketplace:
http://www.cisco.com/go/marketplace/

Ordering Documentation
You can find instructions for ordering documentation at this URL:
http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm
You can order Cisco documentation in these ways:

Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from
the Ordering tool:
http://www.cisco.com/en/US/partner/ordering/

Nonregistered Cisco.com users can order documentation through a local account representative by
calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in
North America, by calling 1 800 553-NETS (6387).

Documentation Feedback
You can rate and provide feedback about Cisco technical documents by completing the online feedback
form that appears with the technical documents on Cisco.com.
You can send comments about Cisco documentation to bug-doc@cisco.com.
You can submit comments by using the response card (if present) behind the front cover of your
document or by writing to the following address:
Cisco Systems
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

vi

Preface
Cisco Product Security Overview

Cisco Product Security Overview


Cisco provides a free online Security Vulnerability Policy portal at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
From this site, you can perform these tasks:

Report security vulnerabilities in Cisco products.

Obtain assistance with security incidents that involve Cisco products.

Register to receive security information from Cisco.

A current list of security advisories and notices for Cisco products is available at this URL:
http://www.cisco.com/go/psirt
If you prefer to see advisories and notices as they are updated in real time, you can access a Product
Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:
http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

Reporting Security Problems in Cisco Products


Cisco is committed to delivering secure products. We test our products internally before we release them,
and we strive to correct all vulnerabilities quickly. If you think that you might have identified a
vulnerability in a Cisco product, contact PSIRT:

Emergencies security-alert@cisco.com
An emergency is either a condition in which a system is under active attack or a condition for which
a severe and urgent security vulnerability should be reported. All other conditions are considered
nonemergencies.

Nonemergencies psirt@cisco.com

In an emergency, you can also reach PSIRT by telephone:

Tip

1 877 228-7302

1 408 525-6532

We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive
information that you send to Cisco. PSIRT can work from encrypted information that is compatible with
PGP versions 2.x through 8.x.
Never use a revoked or an expired encryption key. The correct public key to use in your correspondence
with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page
at this URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
The link on this page has the current PGP key ID in use.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

vii

Preface
Obtaining Technical Assistance

Obtaining Technical Assistance


For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco
Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical
Support Support and Documentation Website on Cisco.com features extensive online support resources.
In addition, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not
hold a valid Cisco service contract, contact your reseller.

Cisco Technical Support & Documentation Website


The Cisco Technical Support & Documentation website provides online documents and tools for
troubleshooting and resolving technical issues with Cisco products and technologies. The website is
available 24 hours a day, at this URL:
http://www.cisco.com/techsupport
Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user
ID and password. If you have a valid service contract but do not have a user ID or password, you can
register at this URL:
http://tools.cisco.com/RPF/register/register.do

Note

Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting
a web or phone request for service. You can access the CPI tool from the Cisco Technical Support &
Documentation website by clicking the Tools & Resources link under Documentation & Tools. Choose
Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco
Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by
product ID or model name; by tree view; or for certain products, by copying and pasting show command
output. Search results show an illustration of your product with the serial number label location
highlighted. Locate the serial number label on your product and record the information before placing a
service call.

Submitting a Service Request


Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3
and S4 service requests are those in which your network is minimally impaired or for which you require
product information.) After you describe your situation, the TAC Service Request Tool provides
recommended solutions. If your issue is not resolved using the recommended resources, your service
request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:
http://www.cisco.com/techsupport/servicerequest
For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone.
(S1 or S2 service requests are those in which your production network is down or severely degraded.)
Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business
operations running smoothly.
To open a service request by telephone, use one of the following numbers:
Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227)
EMEA: +32 2 704 55 55
USA: 1 800 553-2447

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

viii

Preface
Obtaining Additional Publications and Information

For a complete list of Cisco TAC contacts, go to this URL:


http://www.cisco.com/techsupport/contacts

Definitions of Service Request Severity


To ensure that all service requests are reported in a standard format, Cisco has established severity
definitions.
Severity 1 (S1)Your network is down, or there is a critical impact to your business operations. You
and Cisco will commit all necessary resources around the clock to resolve the situation.
Severity 2 (S2)Operation of an existing network is severely degraded, or significant aspects of your
business operation are negatively affected by inadequate performance of Cisco products. You and Cisco
will commit full-time resources during normal business hours to resolve the situation.
Severity 3 (S3)Operational performance of your network is impaired, but most business operations
remain functional. You and Cisco will commit resources during normal business hours to restore service
to satisfactory levels.
Severity 4 (S4)You require information or assistance with Cisco product capabilities, installation, or
configuration. There is little or no effect on your business operations.

Obtaining Additional Publications and Information


Information about Cisco products, technologies, and network solutions is available from various online
and printed sources.

Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo
merchandise. Visit Cisco Marketplace, the company store, at this URL:
http://www.cisco.com/go/marketplace/

Cisco Press publishes a wide range of general networking, training and certification titles. Both new
and experienced users will benefit from these publications. For current Cisco Press titles and other
information, go to Cisco Press at this URL:
http://www.ciscopress.com

Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and
networking investments. Each quarter, Packet delivers coverage of the latest industry trends,
technology breakthroughs, and Cisco products and solutions, as well as network deployment and
troubleshooting tips, configuration examples, customer case studies, certification and training
information, and links to scores of in-depth online resources. You can access Packet magazine at
this URL:
http://www.cisco.com/packet

iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies
learn how they can use technology to increase revenue, streamline their business, and expand
services. The publication identifies the challenges facing these companies and the technologies to
help solve them, using real-world case studies and business strategies to help readers make sound
technology investment decisions. You can access iQ Magazine at this URL:
http://www.cisco.com/go/iqmagazine
or view the digital edition at this URL:
http://ciscoiq.texterity.com/ciscoiq/sample/

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

ix

Preface
Obtaining Additional Publications and Information

Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering
professionals involved in designing, developing, and operating public and private internets and
intranets. You can access the Internet Protocol Journal at this URL:
http://www.cisco.com/ipj

Networking products offered by Cisco Systems, as well as customer support services, can be
obtained at this URL:
http://www.cisco.com/en/US/products/index.html

Networking Professionals Connection is an interactive website for networking professionals to share


questions, suggestions, and information about networking products and technologies with Cisco
experts and other networking professionals. Join a discussion at this URL:
http://www.cisco.com/discuss/networking

World-class networking training is available from Cisco. You can view current offerings at
this URL:
http://www.cisco.com/en/US/learning/index.html

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to


Cisco IOS XR Configurations
This module describes the conversion of a Cisco IOS configuration to a Cisco IOS XR configuration. It
is not a complete guide to converting every command or configuration from Cisco IOS to
Cisco IOS XR software, but it covers only the most commonly used features. There may be features in
Cisco IOS that you are interested in that do not appear in this document.
The configurations presented here use Cisco IOS XR Software Release 3.3.0 as a reference.
This document is not an introduction to Cisco IOS XR software, nor is it an introduction to any of the
features you can configure in Cisco IOS XR software. It assumes that you are familiar with the
differences in operating infrastructure between Cisco IOS and Cisco IOS XR software and that you
know how the protocols work.

Contents

Conversion Procedure, page 2

General Differences Between Cisco IOS and Cisco IOS XR Software, page 2

Cisco IOS Configurations Absent From Cisco IOS XR Software, page 3

Cisco IOS and Cisco IOS XR Configurations That Are the Same, page 5

Cisco IOS Configurations That Are Similar in Cisco IOS XR, page 6

Basic Interface Configuration, page 7

IPv4 Unicast Routing and Forwarding, page 8

Multiprotocol Label Switching (MPLS), page 21

Quality of Service (QoS), page 24

IPv6, page 26

Other Cisco IOS XR Issues, page 27

Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language, page 31

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Conversion Procedure

Conversion Procedure
In general, the method of conversion is to proceed line-by-line over the Cisco IOS configuration using
the information in this conversion guide to look up and create the equivalent configuration commands
for Cisco IOS XR software.

Note

If you have many nodes in your network on which you plan to convert your configurations, you may also
consider contacting Cisco Advanced Services to help expedite the conversion.

Step 1

Before you install Cisco IOS XR software, convert any Cisco IOS commands for configurations you
want to keep to Cisco IOS XR configuration commands, creating a text file containing the desired IOS
XR configurations.

Step 2

Install the Cisco IOS XR software according to the instructions in Migrating from Cisco IOS to Cisco
IOS XR Software on the Cisco XR 12000 Series Router.

Step 3

After installing the Cisco IOS XR software, reconfigure your router using the Cisco IOS XR
configuration commands you developed in step 1. You can reconfigure your router using one of two
methods:

Note

Enter the new CLI configuration commands line-by-line at the appropriate configuration submodes,
using the IOS XR configurations you created as a reference. You must enter the commit command
to make new configurations part of the running configuration. You can enter the commit command
after entering a configuration at each submode or enter the command in the global configuration
mode after entering all the new configurations.

Go to global configuration mode and copy and paste the entire text file containing the new IOS XR
configuration at the command prompt, then enter the commit replace command to replacethe entire
running configuration.

As the commands are parsed, error messages might displayindicating incorrect commands or syntax.

General Differences Between Cisco IOS and Cisco IOS XR


Software
In Cisco IOS XR software, features are generally disabled by default and must be explicitly enabled.
This means that, for example, you need to explicitly enable the address-family ipv4 unicast command
in some routing protocols (IS-IS, BGP), whereas you did not need to do it in Cisco IOS. This also means
that external services that listen to TCP/UDP ports and IP protocols (telnet, ssh, tcp-small-servers, and
so forth) are off unless you turn them on.
In general, use the following guidelines when initially converting between operating systems:

Do not configure new features without understanding them first.

Do not turn on features in Cisco IOS XR software that are off in your Cisco IOS configuration.

Do not assume that you need all the same features in Cisco IOS XR software that you needed in
Cisco IOS.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Cisco IOS Configurations Absent From Cisco IOS XR Software

Think before you add or remove features. Is the feature really something you use, or are you just
carrying it over because it is in your Cisco IOS configuration?

Test changes carefully and ask for help if you are having difficulty.

After you have converted an existing Cisco IOS configuration to a working Cisco IOS XR software
configuration, you might want to try some of the additional features in Cisco IOS XR software. For more
information on these features, consult the standard Cisco IOS XR configuration guides:

Cisco IOS XR IP Addresses and Services Configuration Guide

Cisco IOS XR Interface and Hardware Component Configuration Guide

Cisco IOS XR Multicast Configuration Guide

Cisco IOS XR Multiprotocol Label Switching Configuration Guide

Cisco IOS XR Modular Quality of Service Configuration Guide

Cisco IOS XR Routing Configuration Guide

Cisco IOS XR System Management Configuration Guide

Cisco IOS XR System Security Configuration Guide

Cisco IOS Configurations Absent From Cisco IOS XR Software


In Table 2 are some of the Cisco IOS configurations that do not exist in Cisco IOS XR software. The
Cisco IOS column contains either a configuration string or a partial configuration string. If it is partial
(like ip tftp ), that means that only the top level text has changed and options past the listed text are
the same in Cisco IOS and Cisco IOS XR software.
The Cisco IOS XR column contains the text No such configuration or No such keyword. No such
configuration means that the service that is configured in Cisco IOS cannot be configured in
Cisco IOS XR software. largely because the feature does not exist. An example is the Cisco IOS version
command. No such keyword means that, although the configuration exists, the specific keyword listed
in the Cisco IOS configuration does not exist in CCisco IOS XR software. Both types of entries might
also have a comment explaining what happened to the Cisco IOS functionality.
Table 2

List of Cisco IOS Configurations That Do Not Exist in Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

aaa authentication enable

No such keyword.
Cisco IOS XR software has no concept of changing
enable level when logged in; all permissions are defined
in the usergroup/taskgroup model.

aaa new-model

No such configuration.
There is no old model authentication, authorization, and
accounting (AAA) in Cisco IOS XR software.

access-list compiled

No such configuration.
Cisco IOS XR software manages access control lists
(ACL) and takes no configurable input from the user.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Cisco IOS Configurations Absent From Cisco IOS XR Software

Table 2

List of Cisco IOS Configurations That Do Not Exist in Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

access-list number

No such configuration.
All ACLs are configured using ipv4 access-list submode;
see the ACL section later on.

boot system ...

No such configuration.
The Cisco IOS XR boot model is very different from
Cisco IOS boot model.

enable

No such configuration.
You must have a username. The password and enable level
ability are defined within the username and taskgroup
set of commands.

ip bgp-community new-format

No such configuration.
Community-lists, which support old-style numbering, are
being phased out. See also the extensive section on Border
Gateway Protocol (BGP) later in this document.

ip bootp server

No such configuration.
No BOOTP server exists in Cisco IOS XR software.

ip classless

No such configuration,
Cisco IOS XR software fully supports classless
interdomain routing (CIDR) and variable-length subnet
mask (VLSM). Classful routing does not exist in
Cisco IOS XR software, so no classless enable is needed.

ip finger

No such keyword.
There is no finger daemon on Cisco IOS XR software.

ip receive

No such configuration.
Cisco IOS XR software does not support receive ACLs.

ip spd

No such configuration.
Selective Packet Discard (SPD) does not exist in
Cisco IOS XR software, in which Local Packet Transport
Services (LPTS) mostly eliminates the need for SPD;
LPTS is not configurable and is not discussed in this book.

ip subnet-zero

No such configuration.
This behavior is automatic. Cisco IOS XR is fully
classless and CIDR-capable.

mpls label protocol ldp

No such configuration.
No Tag Distribution Protocol (TDP) exists in
Cisco IOS XR software, so no need to pick between Label
Distribution Protocol (LDP) and TDP.

mpls traffic-eng auto-bw

No such configuration.
There is no support for Traffic Engineering (TE) auto-bw
in Cisco IOS XR software.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Cisco IOS and Cisco IOS XR Configurations That Are the Same

Table 2

List of Cisco IOS Configurations That Do Not Exist in Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

no service pad

No such configuration.

service compress-config

No such configuration.
Configuration file management is very different between
Cisco IOS and Cisco IOS XR software

service nagle

No such configuration.
nagle is on by default, and this cannot be changed by the
user.

service password-encryption

No such configuration.
You cannot have unencrypted passwords in
Cisco IOS XR software

service tcp-keepalives-in

No such configuration.
In Cisco IOS XR software, it is up to the application to
decide whether to use keepalives or not, and none of this
is configurable. The telnet server sends keepalives every 5
minutes. Telnet client does not send them. Other
TCP-based protocols (BGP, SSH, and so on) have similar
built-in keepalive values.

service tcp-keepalives-out

No such configuration.

service upgrade all

No such configuration.

tag-switching

No such configuration.
All the tag-switching CLI is gone, replaced with
Multiprotocol Label Switching (MPLS)

version

No such configuration.

Cisco IOS and Cisco IOS XR Configurations That Are the Same
A list of some of the configurations that are identical in Cisco IOS and Cisco IOS XR software appear
in Table 3. The Cisco IOS column contains either a configuration string or a partial configuration string.
If it is partial, like ip tftp , that means that all options past the listed text are the same in Cisco IOS and
Cisco IOS XR software.
Table 3

List of Cisco IOS Configurations That Are the Same in Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

banner

Same

hostname hostname

Same

service timestamps debug datetime msec

Same

service timestamps log datetime msec

Same

snmp-server

Same

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Cisco IOS Configurations That Are Similar in Cisco IOS XR

Cisco IOS Configurations That Are Similar in Cisco IOS XR


The following table lists some of the Cisco IOS configurations that differ from their Cisco IOS XR
counterparts in minor ways. The Cisco IOS column contains either a configuration string or a partial
configuration string. If it is partial like ip tftp , only the top level text has changed and options past
the listed text are the same in Cisco IOS and Cisco IOS XR software.
The Cisco IOS XR column contains an explanation of the differences between the two configurations.
Table 4

Cisco IOS Configurations That are Similar in Cisco IOS XR software

Cisco IOS

Cisco IOS XR Software

aaa authentication login name tacacs+

aaa authentication login name group tacacs+


Note the group before tacacs+; this is common for all
aaatacacs+ commands.

aaa authorization commands level


{default | list-name} tacacs+

aaa authorization commands {default | list-name}


group tacacs+
Note the lack of a level, because Cisco IOS XR
permissions are different from those of Cisco IOS.

aaa accounting exec {default | list-name} aaa accounting exec {default | list-name} {start-stop |
{start-stop | stop-only} tacacs+
stop-only} group tacacs+
Note the group before tacacs+.
aaa accounting commands level {default aaa accounting commands {default | list-name}
| list-name} {start-stop | stop-only}
{start-stop | stop-only} group tacacs+
tacacs+
Note the lack of a level; see also the taskgroup section
below.
ip tcp path-mtu-discovery

tcp path-mtu-discovery age-timer minutes

ip telnet source-interface

telnet ipv4 client source-interface

ip tftp

tftp client

ip ftp ...

ftp client ...

ip name-server

domain name-server

ip route network mask

route ipv4 network/masklen ...

Router# ip route 10.0.0.0 255.0.0.0

RP0/0/RP0/CPU0:router# route ipv4 unicast


10.0.0.0/8 ...

All the options available after the network and mask in


parameters Cisco IOS (outgoing interface, next-hop,
tag, admin distance, and so on) are also available after the
network/masklen parameter with the same command in
Cisco IOS XR software.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Basic Interface Configuration

Table 4

Cisco IOS Configurations That are Similar in Cisco IOS XR software

Cisco IOS

Cisco IOS XR Software

line {aux | console} 0

line {aux | console}


No line number is necessary. See also the VTY section
later in this document.

logging buffered 1000000 debugging

The debug level and the buffer size are now two separate
commands:
logging buffered 150000
logging buffered debugging

Basic Interface Configuration


A few differences in interface configuration are shown in the examples below:
Table 5

Basic Interface Configuration in Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

interface POS2/1
ip address 192.168.14.5 255.255.255.0
no ip directed-broadcast
crc 32
clock source internal
pos ais-shut
pos scramble-atm
end

interface POS0/2/0/1
mtu 4474
ipv4 address 192.168.14.8 255.255.255.0
pos
crc 32
!
!
controller SONET0/2/0/1
ais-shut
path
ais-shut
!
clock source internal
!

The major differences are as follows:

Cisco IOS XR software has of a separate mode for configuring SONET.

Cisco IOS XR software has the ipv4 address command instead of the ip address command that
Cisco IOS has.

The Cisco IOS XR software configuration has both ais-shut and path ais-shut commands
configured. This does not map exactly to the Cisco IOS pos ais-shut command, which enables only
line ais-shut, but you achieve the same thing with the two configurations.

Only Packet-over-SONET (PoS) specific configurations (configurations having to do with


High-level Data Link Control (HDLC) and Point-to-Point Protocol (PPP) payload and how they are
put into a Synchronous Payload Envelope [SPE]) go on the interface in Cisco IOS XR software.

The crc command is issued in the (config-if-pos) submode in Cisco IOS XR software.

The ais-shut, clock, path, and other commands in the (config-SONET-path) submode are issued
while in SONET controller submode in Cisco IOS XR software.

Payload scrambling (pos scramble-atm in Cisco IOS) is on by default in Cisco IOS XR software.
It can be disabled using the path scrambling disable command.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

For further information on SONET controller configuration and PoS configurations, including PPP and
HDLC, see the following configuration guide and command reference modules:

Note

The Configuring SONET Controller Interfaces on Cisco IOS XR Software module of the
Cisco IOS XR Interface and Hardware Component Configuration Guide

The Configuring POS Interfaces on Cisco IOS XR Software module of the


Cisco IOS XR Interface and Hardware Component Configuration Guide

The Packet-over-SONET User Interface and SONET Layer-1 Commands on Cisco IOS XR Software
module of the Cisco IOS XR Interface and Hardware Component Command Reference

The SONET APS Commands on Cisco IOS XR Software module of the Cisco IOS XR Interface and
Hardware Component Command Reference

The cHDLC Commands on Cisco IOS XR Software module of the Cisco IOS XR Interface and
Hardware Component Command Reference

The PPP Commands on Cisco IOS XR Software module of the Cisco IOS XR Interface and
Hardware Component Command Reference

The other interface type supported in Cisco IOS XR software is the Gigabit Ethernet (GigE) interface.
The GigE interface does not have a controller submode and, therefore, configuration of GigE is similar
to configuration of GigE in Cisco IOS.

IPv4 Unicast Routing and Forwarding


This section contains the following parts:

General IP Routing, page 8

Intermediate System-to-Intermediate System (IS-IS), page 9

Open Shortest Path First (OSPF), page 11

Border Gateway Protocol (BGP), page 13

Multicast, page 20

General IP Routing
A major difference between Cisco IOS and Cisco IOS XR software is that in Cisco IOS, you enable a
protocol on an interface by some combination of configuration in the Interior Gateway Protocol (IGP)
and on the physical interface. An example of the first method is an Open Shortest Path First (OSPF)
network statement, while an example of the second method is an Intermediate System-to-Intermediate
System (IS-IS) ip router isis command, or any change in the cost of an interface. In
Cisco IOS XR software, all protocol-specific configuration goes under the global protocol configuration
submode and not on the physical interface configuration. This means that there are no OSPF or IS-IS
commands on a physical interface; they are all put under the interface submode of the routing protocol
configuration. See the examples in Intermediate System-to-Intermediate System (IS-IS) and Open
Shortest Path First (OSPF) for more detail.
A useful feature for all routing protocols in Cisco IOS XR software is the global router-id command. In
Cisco IOS, it is recommended that you hard-code a router-id to a loopback (by convention, Loopback0)
for every protocol. In Cisco IOS XR software, you can use the global command router-id interface.
Thus, all the following Cisco IOS commands are replaced by a single Cisco IOS XR command:

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Table 6

Examples of Cisco IOS Commands Replaced by the Cisco IOS XR router-id Command

Cisco IOS

Cisco IOS XR Software

Example of the IS-IS router-id command:

router-id Loopback0

router isis
mpls traffic-eng router-id Loopback0

Example of the OSPF router-id command:


router ospf
router-id ip_address_of_Loopback0
mpls traffic-eng router-id Loopback0

Example of the BGP router-id command:


router bgp
bgp router-id ip_address_of_Loopback0

You can override the global router-id command in Cisco IOS XR software by further configuring a
router-id command within a given protocol. However, configuring different router IDs per protocol
makes management more complicated and provides no gain, so we do not recommend this practice.
For more information about the router-id command, see the following configuration guide and
command reference modules:

The Implementing Network Stack IPv4 and IPv6 on Cisco IOS XR Software module of the
Cisco IOS XR IP Addresses and Services Configuration Guide

The Network Stack IPv4 and IPv6 Commands on Cisco IOS XR Software module of the
Cisco IOS XR IP Addresses and Services Command Reference

The Implementing Label Distribution Protocol on Cisco IOS XR Software module of the
Cisco IOS XR Multiprotocol Label Switching Configuration Guide

The Implementing Optical User Network Interface on Cisco IOS XR Software module of the
Cisco IOS XR Multiprotocol Label Switching Configuration Guide

The MPLS Label Distribution Commands on Cisco IOS XR Software module of the Cisco IOS XR
Multiprotocol Label Switching Command Reference

The Implementing Optical User Network Interface on Cisco IOS XR Software module of the
Cisco IOS XR Multiprotocol Label Switching Configuration Guide

The MPLS Optical User Network Interface Commands on Cisco IOS XR Software module of the
Cisco IOS XR Multiprotocol Label Switching Command Reference

The Implementing OSPF on Cisco IOS XR Software module of the Cisco IOS XR Routing
Configuration Guide

The OSPF Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command
Reference

The OSPFv3 Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command
Reference

Intermediate System-to-Intermediate System (IS-IS)


Some key differences between the Cisco IOS and Cisco IOS XR IS-IS implementation are:

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Cisco IOS XR software does not support Connectionless Network Services (CLNS) routing.

Cisco IOS XR software defaults to multitopology mode for IPv6 (see the IPv6 section later in this
document).

Cisco IOS XR software must have a process name, such as router isis lab, whereas Cisco IOS could
be configured with just router isis.

A sample configuration for IPv4 routing only is given in the Table 7. This is for a very simple network
consisting of a router (Router ID: 192.168.1.5) configured with a PoS interface (POS2/1) under
Cisco IOS, and another router (Router ID:192.168.1.8) configured with a PoS interface (POS0/2/0/1)
under Cisco IOS XR software.
Table 7

Configuration Comparison for IPv4 in Cisco IOS and Cisco IOS XR

IOS (Router ID:192.168.1.5)

IOS XR (Router ID:192.168.1.8)

router isis lab


net 49.0192.0168.0001.0005.00
is-type level-2-only
passive-interface Loopback0
!
interface POS2/1
...
ip router isis lab
isis metric 42
...

router isis lab


is-type level-2-only
net 49.0192.0168.0001.0008.00
interface Loopback0
passive
address-family ipv4 unicast
!
!
interface POS0/2/0/1
address-family ipv4 unicast
metric 42
!
!
!

The largest change difference Cisco IOS and Cisco IOS XR software is that in Cisco IOS XR software
you need to enable the ipv4 address family explicitly, whereas in Cisco IOS it is implicitly enabled. Most
or all of the IS-IS options in Cisco IOS also exist in Cisco IOS XR. Another difference is that there are
very few CLNS commands in Cisco IOS XR; most of the show clns options in Cisco IOS are under the
show isis command in Cisco IOS XR software.
Redistribution for IS-IS is very similar; the only difference is that instead of a route-map (as in
Cisco IOS), you specify a route-policy. Thus, redistribution into Cisco IOS XR software is an attach
point for an RPL route-policy. See Table 8.
Table 8

IS-IS Redistribution Differences Between Cisco IOS and Cisco IOS XR

Cisco IOS

Cisco IOS XR

router isis lab

router isis lab

redistribute connected route-map route-map

address-family ipv4 unicast


redistribute connected route-policy policy
redistribute connected policy policy

All of the standard options are available in both Cisco IOS and Cisco IOS XR software.
Table 9 shows the output produced by issuing the help command (?) while in the proper configuration
submode for the redistribute connected command on systems running Cisco IOS and
Cisco IOS XR software.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

10

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Table 9

Comparison of the redistribute connected command on Cisco IOS and Cisco IOS XR

Cisco IOS

Cisco IOS XR

Router#redistribute connected ?
level-1
level-1-2
level-2
metric
metric-type
route-map
<cr>

RP/0/0/CPU0:gsr4(config-isis-af)#redistribute connected
?
level-1
Redistribute routes into level 1 only
level-1-2
Redistribute routes into both levels
level-2
Redistribute routes into level 2 only
(the default)
metric
Metric for redistributed routes
metric-type
IS-IS metric type for redistributed
routes
route-policy Route policy reference
<cr>

IS-IS configurations for multitopology are slightly different, as well; see the sections on Multiprotocol
Label Switching (MPLS) and IPv6 for details.
For further information on IS-IS configuration, see the following configuration guide and command
reference modules:

The Implementing IS-IS on Cisco IOS XR Software module of the Cisco IOS XR Routing
Configuration Guide

The IS-IS Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command
Reference

Open Shortest Path First (OSPF)


An OSPF configuration is very similar to an IS-IS configuration. A sample configuration for OSPF
routing only is given in Table 10 below. This is for a very simple network consisting of a router (Router
ID:192.168.1.5) configured with a PoS interface (POS2/1) under Cisco IOS, and another router (Router
ID:192.168.1.5) configured with a PoS interface (POS0/2/0/1) under Cisco IOS XR software.
The main point in this description is that redistribution into OSPF on Cisco IOS XR software is a
policy-attach point.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

11

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Table 10

OSPF Configuration for Cisco IOS and Cisco IOS XR

Cisco IOS (Router ID:192.168.1.5)

Cisco IOS XR (Router ID:192.168.1.8)

router ospf 1
log-adjacency-changes
passive-interface Loopback0
network 192.168.1.0 0.0.0.255 area 0
network 192.168.7.0 0.0.0.255 area 0
network 192.168.12.0 0.0.0.255 area 0
network 192.168.13.0 0.0.0.255 area 0
network 192.168.14.0 0.0.0.255 area 0
network 192.168.18.0 0.0.0.255 area 0
network 192.168.20.0 0.0.0.255 area 0
!
interface Loopback0
ip address 192.168.1.5 255.255.255.255
!
interface POS2/1
ip address 192.168.14.5 255.255.255.0
ip ospf cost 17

router ospf lab


log adjacency changes
area 0
interface Loopback0
passive enable
!
interface POS0/1/0/1
!
interface POS0/2/0/0
!
interface POS0/2/0/1
cost 17
!
interface POS0/2/0/2
!
!
mpls traffic-eng area 0
!

Note that the network statement in Cisco IOS has been replaced by enabling the interface under the area
keyword inside OSPF. Also, OSPF does not need an address-family ipv4 unicast command like BGP
or IS-IS. This is because router ospf implies support for unicast IPv4. Cisco does not support MOSPF,
and unicast IPv6 has its own routing protocol, consisting of the router ospfv3 family of commands.
Redistribution is a little different as well. Table 11 gives examples of redistribution configurations in
Cisco IOS and Cisco IOS XR software.
Table 11

Redistribution Configurations for OSPF in Cisco IOS and Cisco IOS XR

Cisco IOS

Cisco IOS XR

router ospf 1
redistribute connected subnets
redistribute static subnets route-map map

router ospf lab


redistribute connected
redistribute static policy

You no longer need the subnets keyword in Cisco IOS XR software. Instead, you declare an RPL
route-policy rather than a route map.
If you want to redistribute only classful routes into OSPF in Cisco IOS XR software, you can use the
redistribute command with the classful keyword. The use of policies rather than route maps is covered
in the Border Gateway Protocol (BGP) section and also in the existing Cisco IOS XR software
documentation on RPL. The main point in this description is that redistribution into OSPF on
Cisco IOS XR software is a policy-attach point.
For more information on OSPF configuration, see the following modules:

The Implementing OSPF on Cisco IOS XR Software module of the Cisco IOS XR Routing
Configuration Guide

The OSPF Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command
Reference

The OSPFv3 Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command
Reference

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

12

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Border Gateway Protocol (BGP)


This section is divided into the following areas:

Introduction and General Examples, page 13

Address-Family Parameters, page 14

Session Parameters, page 15

BGP Neighbors, page 15

Building a Route Policy, page 17

Neighbor Independent Issues, page 19

Introduction and General Examples


BGP is the largest piece of conversion work to be done when migrating to Cisco IOS XR software. BGP
is also where Route Policy Language (RPL) is used most heavily, so this is where RPL is explained.
Because this document focuses on configuration conversion, and because it is not an RPL tutorial, the
treatment of RPL is not complete. For more information on RPL, see the following configuration guide
and command reference modules:

The Implementing Routing Policy on Cisco IOS XR Software module of the Cisco IOS XR Routing
Configuration Guide

The Routing Policy Language Commands on Cisco IOS XR Software module of the Cisco IOS XR
Routing Command Reference

BGP configuration is complex enough that it is worth going over several sample configurations.
First, let us start with a simple IBGP peering between a Cisco IOS router and a Cisco IOS XR router.
For these examples, the Cisco IOS router has an IP address of 192.168.1.5, and the Cisco IOS XR router
has an IP address of 192.168.1.8.
Table 12

Basic BGP Configuration Between a Cisco IOS Router and a Cisco IOS XR Router

Cisco IOS (Router ID: 192.168.1.5)

Cisco IOS XR (Router ID: 192.168.1.8)

router bgp 3402


no synchronization
bgp log-neighbor-changes
neighbor 192.168.1.8 remote-as 3402
neighbor 192.168.1.8 update-source
Loopback0
no auto-summary

router bgp 3402


address-family ipv4 unicast
!
neighbor 192.168.1.4
remote-as 3402
update-source Loopback0
address-family ipv4 unicast

Note

This command is mandatory.

Note the following:

The remote-as and update-source in Cisco IOS XR software are configured inside a neighbor
submode (config-bgp-nbr).

bgp log neighbor changes disable (no hyphens)logging of BGP neighbor resets is on by default
and does not show up in the Cisco IOS XR configuration.

Cisco IOS XR software does not have the concept of auto-summary, so there is nothing to disable
as there is in Cisco IOS.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

13

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

The most important thing to learn from the above configuration is that you can configure everything you
need by using the neighbor submode. Also, Cisco IOS XR software lets you break the BGP
configuration down into separate building blocks that can be reused to build a more modular and more
readable configuration.

Address-Family Parameters
Two building blocks for basic BGP neighbor configuration are supported in Cisco IOS XR software:
address-family groups (referred to in a configuration as an af-group) and session groups (referred to in
a configuration as a session-group). For more discussion of session groups see the Session Parameters
of this document.
You configure properties of different address families using the af-group keyword. The following
address-family groups are supported for Cisco IOS XR Software Release 3.3.0:

Note

IPv4 unicast

IPv4 multicast

IPv6 unicast

IPv6 multicast

A given address family is only supported with a neighbor whose address is from that address family. For
instance, IPv4 neighbors support IPv4 unicast and multicast address families, and IPv6 neighbors
support IPv6 unicast and multicast address families. However, you cannot exchange IPv6 routing
information with an IPv4 neighbor and vice versa.
Inside an af-group, you configure properties specific to the exchange of information for a specific
address family.
Table 13 shows a more complex example of an IBGP peering between a Cisco IOS router (Router ID
192.168.1.5) and a Cisco IOS XR router (Router ID 192.168.1.8):
Table 13

BGP Configuration Using an af-group

Cisco IOS (Router ID:192.168.1.5)

Cisco IOS XR (Router ID:192.168.1.8)

router bgp 3402


no synchronization
bgp log-neighbor-changes
neighbor 192.168.1.8 remote-as 3402
neighbor 192.168.1.8 update-source Loopback0
neighbor 192.168.1.8 soft-reconfiguration
inbound
neighbor 192.168.1.8 weight 50
neighbor 192.168.1.8 maximum-prefix 75
no auto-summary
!

router bgp 3402


af-group test address-family ipv4
unicast
weight 50
maximum-prefix 75 75
soft-reconfiguration inbound
!
neighbor 192.168.1.5
remote-as 3402
update-source Loopback0
address-family ipv4 unicast
use af-group test
!
!
!

You can see from the example that Cisco IOS XR software allows you to put address-family specific
configuration in an af-group and apply that af-group to a specific neighbor using the af-group
command, thus avoiding the need for a series of lines beginning with neighbor 192.168.1.5.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

14

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Session Parameters
Session-groups are conceptually very similar to af-groups, except that they allow you to configure
properties of a BGP session itself rather than configure properties of a specific address family.
Table 14

BGP Configuration Using session-group for Cisco IOS XR

Cisco IOS

Cisco IOS XR

router bgp 3402


no synchronization
bgp log-neighbor-changes
neighbor 192.168.1.8 remote-as 3402
neighbor 192.168.1.8 password 7 045D0409
neighbor 192.168.1.8 update-source Loopback0
neighbor 192.168.1.8 soft-reconfiguration
inbound
neighbor 192.168.1.8 weight 50
neighbor 192.168.1.8 maximum-prefix 75
no auto-summary
!

router bgp 3402


af-group test address-family ipv4
unicast
weight 50
maximum-prefix 75 75
soft-reconfiguration inbound
!
session-group example
remote-as 3402
password encrypted 1303181D
update-source Loopback0
!
neighbor 192.168.1.5
use session-group example
address-family ipv4 unicast
use af-group test
!
!
!

In this example, a password was added between the neighbors; in Cisco IOS XR software, this is in the
session-group, because it is a property of the session rather than a property of the address-family. Also,
instead of the Cisco IOS keyword syntax password 0 or password 7, Cisco IOS XR uses the keyword
syntax password clear or password encrypted.

BGP Neighbors
The next major configuration task is the Cisco IOS XR equivalent of Cisco IOS peer-groups.
Cisco IOS XR calls them neighbor-groups rather than peer-groups, but the function is the same. In recent
versions of Cisco IOS, the concept of dynamic update-groups was added to separate policy grouping
from neighbor grouping. Cisco IOS XR software does this as well, so there is no restriction on what
policies can be shared across which update-groups.
The following configuration examples illustrate the difference in peer-groups under Cisco IOS and
neighbor-groups under Cisco IOS XR software.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

15

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Table 15

Configuring BGP by Using Peer Groups in Cisco IOS and Neighbor Groups in Cisco
IOS XR Software

Cisco IOS

Cisco IOS XR

router bgp 3402


no synchronization
bgp log-neighbor-changes
neighbor ibgp-peers peer-group
neighbor ibgp-peers remote-as 3402
neighbor ibgp-peers password 7 10480616
neighbor ibgp-peers update-source Loopback0
neighbor ibgp-peers soft-reconfiguration
inbound
neighbor ibgp-peers weight 50
neighbor ibgp-peers maximum-prefix 75
neighbor 192.168.1.8 peer-group ibgp-peers
no auto-summary
!

router bgp 3402


af-group test address-family ipv4
unicast
weight 50
maximum-prefix 75 75
soft-reconfiguration inbound
!
session-group example
remote-as 3402
password 7 1303181D
update-source Loopback0
!
neighbor-group ibgp-peers
use session-group example
address-family ipv4 unicast
use af-group test
!
!
neighbor 192.168.1.5
use neighbor-group ibgp-peers
!
!

Although the Cisco IOS XR configuration is longer, as the number of peers grows, the abstractions
that Cisco IOS XR software offers makes your configurations shorter and more manageable.
Another issue to look at is routing policy. Routing policy is applied in Cisco IOS XR software through
Route Policy Language (RPL) and is a powerful replacement for Cisco IOS route maps. The terminology
translation table for RPL vs. route-maps is:
Table 16

Translation Table Between Cisco IOS Route Maps and Cisco IOS XR RPL

Cisco IOS route-map terminology

Cisco IOS XR RPL terminology

route-map

route-policy

ip prefix-list

prefix-set

ip as-path access-list

as-path-set

community-list

community-set

Cisco IOS uses lists, but Cisco IOS XR software uses sets. A set in the mathematical sense is an
unordered grouping of items, which is more logical than an ordered list for many applications.
One major change between Cisco IOS and Cisco IOS XR is that in Cisco IOS XR software there must
be a policy applied (both inbound and outbound) between EBGP neighbors for routes to be exchanged.
Below is a basic configuration between the same two routers as before, but note in Table 17 that the
autonomous system (AS) numbers are now different.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

16

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

Table 17

EGBP Configurations in Cisco IOS and Cisco IOS XR Software with No Policies

Cisco IOS (Router ID: 192.168.1.5)

Cisco IOS XR (Router ID: 192.168.1.8)

router bgp 5
no synchronization
bgp log-neighbor-changes
neighbor 192.168.1.8 remote-as 8
neighbor 192.168.1.8 ebgp-multihop 255
neighbor 192.168.1.8 update-source
Loopback0
no auto-summary
!

router bgp 8
neighbor 192.168.1.5
remote-as 5
ebgp-multihop 255
update-source Loopback0
!
!

With the above configuration, no routes are sent from or received by the Cisco IOS XR router; when the
configuration is committed, Cisco IOS XR software displays the following message:
%BGP-4-NBR_NOPOLICY: No inbound IPv4 Unicast policy is configured for eBGP neighbor
192.168.1.5. No IPv4 Unicast prefixes will be accepted from the neighbor until inbound
policy is configured.
%BGP-4-NBR_NOPOLICY: No outbound IPv4 Unicast policy is configured for eBGP neighbor
192.168.1.5. No IPv4 Unicast prefixes will be sent to the neighbor until outbound policy
is configured.

A warning also shows when using the show bgp summary command if you do not have a policy
configured.

Building a Route Policy


You need both an inbound policy and outbound policy on Cisco IOS XR software. The simplest policy
is one that allows all routes to pass back and forth. Adding this to the configuration, we have:
Table 18

EBGP Configuration in Cisco IOS and Cisco IOS XR Software with Inbound and
Outbound Policies

Cisco IOS

Cisco IOS XR Software

router bgp 5
no synchronization
bgp log-neighbor-changes
neighbor 192.168.1.8 remote-as 8
neighbor 192.168.1.8 ebgp-multihop 255
neighbor 192.168.1.8 update-source
Loopback0
no auto-summary
!

route-policy permit
pass
end-policy
!
router bgp 8
neighbor 192.168.1.5
remote-as 5
ebgp-multihop 255
update-source Loopback0
address-family ipv4 unicast
route-policy permit in
route-policy permit out
!
!
!

With the policy in place, the routes can pass.


A complete explanation of converting route maps to RPL policies is beyond the scope of this document.
However, we include an extended example here to briefly illustrate the process. See Translating Cisco
IOS Route Maps to Cisco IOS XR Routing Policy Language in this document for a more complete
example of the conversion process.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

17

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

For more information on writing route policies in Cisco IOS XR software, see the following documents:

The Implementing Routing Policy on Cisco IOS XR Software module of the Cisco IOS XR Routing
Configuration Guide

The Routing Policy Language Commands on Cisco IOS XR Software module of the Cisco IOS XR
Routing Command Reference

To get the same behavior in Cisco IOS XR software as in Cisco IOS, create the permit route policy and
apply it to every address-family (or in the af-group) for all EBGP neighbors.
Combining the EBGP policy configuration with the af-group and session-group configuration from the
IBGP example, the final configurations are:
Table 19

Final Configuration for EBGP for Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR

router bgp 5
no synchronization
bgp log-neighbor-changes
neighbor ebgp-peers peer-group
neighbor ebgp-peers remote-as 8
neighbor ebgp-peers password 7 15140403
neighbor ebgp-peers ebgp-multihop 255
neighbor ebgp-peers update-source Loopback0
neighbor ebgp-peers soft-reconfiguration
inbound
neighbor ebgp-peers weight 50
neighbor ebgp-peers maximum-prefix 75
neighbor 192.168.1.8 peer-group ebgp-peers
no auto-summary
!

route-policy permit
pass
end-policy
!
router bgp 8
af-group test address-family ipv4
unicast
weight 50
maximum-prefix 75 75
soft-reconfiguration inbound
route-policy permit in
route-policy permit out
!
session-group example
remote-as 5
password 7 00021C09
ebgp-multihop 255
update-source Loopback0
!
neighbor-group ebgp-peers
use session-group example
address-family ipv4 unicast
use af-group test
!
!
neighbor 192.168.1.5
use neighbor-group ebgp-peers
!
!

If you look closely at the Cisco IOS XR configuration, you see that the EBGP AS (remote-as 5) is
embedded in the session group. Although you can do this if you want, it is not necessary. If you do this,
you end up having to create a session group per external AS, or not use session groups.
Policies can be cascaded, so that session groups and address family groups can inherit from each other,
and settings in session groups can be overridden. Following are two other ways to accomplish the same
configuration on Cisco IOS XR software while making the configuration more flexible.
Alternate examples for creating BGP policies on Cisco IOS XR software:

Remove the remote-as command from the neighbor group and put it in the neighbor directly:

session-group example
password 7 00021C09
ebgp-multihop 255

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

18

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

update-source Loopback0
!
neighbor-group ebgp-peers
use session-group example
address-family ipv4 unicast
use af-group test
!
!
neighbor 192.168.1.5
remote-as 5
use neighbor-group ebgp-peers
!
!

Create a second neighbor group and use inheritance

router bgp 8
af-group test address-family ipv4 unicast
weight 50
maximum-prefix 75 75
soft-reconfiguration inbound
route-policy permit in
route-policy permit out
!
session-group example
password 7 00021C09
ebgp-multihop 255
update-source Loopback0
!
neighbor-group ASFive
remote-as 5
use neighbor-group ebgp-peers
!
neighbor-group ebgp-peers
use session-group example
address-family ipv4 unicast
use af-group test
!
!
neighbor 192.168.1.5
use neighbor-group ASFive
!
!

The second example hints at the real power you can get with inheritance.

Neighbor Independent Issues


Another important issue to look at in BGP are keywords that are independent of any neighbors or policy.
The three major keywords in Cisco IOS XR software for BGP are bgp, socket, and timers. The
keywords you can configure under BGP are not explored in depth in this document. The bgp command
keywords are listed below:

as-path-loopcheck

auto-policy-soft-reset

bestpath

bgp

cluster-id

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

19

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv4 Unicast Routing and Forwarding

confederation

default

enforce-first-as

fast-external-fallover

graceful-restart

log

receive-buffer-size

redistribute-internal

router-id

scan-time

send-buffer-size

socket

timers bgp keepalive holdtime

update-delay

write-limit

For further information on BGP configuration, see the following configuration guide and command
reference modules:

The Implementing BGP on Cisco IOS XR Software module of the Cisco IOS XR Routing
Configuration Guide

The Implementing Routing Policy on Cisco IOS XR Software module of the Cisco IOS XR Routing
Configuration Guide

The BGP Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command
Reference

The Routing Policy Language Commands on Cisco IOS XR Software module of the Cisco IOS XR
Routing Command Reference

Multicast
There are two things to configure for multicast: multicast forwarding, and multicast routing.
It is difficult to separate out exactly where Cisco IOS configures multicast forwarding versus routing,
since multicast forwarding is not enabled on a Cisco IOS interface until you enable a multicast routing
protocol. Also, enabling multicast-routing on a specific interface inCisco IOS XR software enables
Protocol Independent Multicast (PIM) on that interface, despite the fact that there is a separate PIM
configuration submode.
Cisco IOS XR software does not support PIM dense mode, although enough of dense mode is supported
to enable auto-RP; forwarding of multicast groups not related to auto-RP is not supported.
Multicast is consistent with the Cisco IOS XR model of configuring everything under a protocol
submode rather than on an interface. The examples in Table 20 illustrate enabling basic multicast
(multicast forwarding and PIM with AutoRP).

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

20

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Multiprotocol Label Switching (MPLS)

Table 20

Basic Multicast Configuration on Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR

ip multicast-routing
interface POS6/0
ip pim sparse-dense-mode

multicast-routing address-family ipv4


interface POS0/6/0/2
enable
!
!

To change PIM parameters in Cisco IOS XR software, do so in router PIM configuration mode. For
example, to specify an RP address rather than letting AutoRP discover it, the configuration is:
Table 21

Changing PIM Parameters for Cisco IOS and Cisco IOS XR Multicast Configurations

Cisco IOS

Cisco IOS XR software

ip pim rp-address 1.2.3.4

router pim address-family ipv4


rp-address 1.2.3.4
!

The basic idea in Cisco IOS XR software is this: enabling multicast-routing turns on AutoRP (so by
definition PIM sparse-dense) and also multicast forwarding on any interface you specify. Additionally,
the all keyword allows you to turn on multicast on all interfaces in the router and then selectively disable
some of them. If you want to modify your PIM configuration, most of the changes you make are under
router pim; configurations such as administratively scoped boundaries, which have nothing to do with
PIM but are instead forwarding-related, are configured under the (config-mcast-ipv4)submode.

Multiprotocol Label Switching (MPLS)


There are three major parts to MPLS configuration on Cisco IOS XR software:

Minor Differences and Adjustments, page 21

Label Distribution Protocol (LDP), page 22

Traffic Engineering (TE), page 22

No support exists in Cisco IOS XR software for static labels, VPNv4 prefixes in BGP, or AToM.

Minor Differences and Adjustments


Table 22 lists some minor differences in MPLS usage between the Cisco IOS and Cisco IOS XR
configurations.
Table 22

Minor DIfferences in MPLS usage for Cisco IOS and Cisco IOS XR Configurations

Cisco IOS

Cisco IOS XR software

no mpls ip propagate-ttl

mpls ip-ttl-propagate disable

mpls label range min max {static }

mpls label range {table table-id} min max

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

21

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Multiprotocol Label Switching (MPLS)

Label Distribution Protocol (LDP)


The difference in configuration between LDP in Cisco IOS and Cisco IOS XR software is similar to the
difference between OSPF configurations. There is a global mpls ldp submode under which all LDP
commands exist, including those relevant to an interface. Sample LDP configurations are presented in
the configurations below:
Table 23

LDP Configurations in Cisco IOS and Cisco IOS XR software

Cisco IOS

Cisco IOS XR software

mpls label protocol ldp


interface POS2/1
...
tag-switching ip

mpls ldp
interface
!
interface
!
interface
!
interface
!
!

POS0/1/0/1
POS0/2/0/0
POS0/2/0/1
POS0/2/0/2

Most of the Cisco IOS LDP capabilities also are in Cisco IOS XR software. One notable exception is the
ability to configure an LDP targeted session. You can accept targeted hellos in Cisco IOS XR software
using the command sequence
mpls ldp
discovery targeted-hello accept

and the equivalent to the Cisco IOS command mpls ldp neighbor <nbr> targeted is neighbor <nbr>
targeted under the MPLS LDP submode.
Other configurations, such as authentication, timer tuning, and graceful restart are similar in both
systems. Note that Cisco IOS XR software supports DU mode only, so there are no DoD commands.
For further information on LDP configuration, see the following configuration guide and command
reference modules:

The Implementing MPLS Label Distribution Protocol on Cisco IOS XR Software module of the
Cisco IOS XR Multiprotocol Label Switching Configuration Guide

The MPLS Label Distribution Protocol Commands on Cisco IOS XR Software module of the
Cisco IOS XR Multiprotocol Label Switching Command Reference

Traffic Engineering (TE)


TE configuration in Cisco IOS XR software is slightly different from Cisco IOS. In either Cisco IOS or
Cisco IOS XR software, there are four things you configure: Interior Gateway Protocol (IGP), TE
infrastructure, Resource Reservation Protocol (RSVP), and TE tunnels. IGP configuration is very similar
between Cisco IOS and Cisco IOS XR software. In Cisco IOS XR software, both TE and RSVP have
their own submodes, whereas in Cisco IOS neither one has a submode and most of the configuration is
done on a physical interface. TE tunnel head end configuration is similar, except that in
Cisco IOS XR software the name of the tunnel denotes its type, which removes the need to preface every
TE tunnel command with the tunnel mpls traffic-eng command.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

22

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Multiprotocol Label Switching (MPLS)

A sample configuration for two routers which are tunnel head/tail pairs follows.
Table 24

Configuration of Tunnel head/tail Pairs in Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR software

interface Tunnel1
ip unnumbered Loopback0
tunnel destination 192.168.1.1
tunnel mode mpls traffic-eng
tunnel mpls traffic-eng autoroute
announce
tunnel mpls traffic-eng path-option 10
dynamic

interface tunnel-te1
ipv4 unnumbered Loopback0
tunnel destination 192.168.1.11
autoroute announce
path-option 10 dynamic
!

interface POS6/0
...
mpls traffic-eng tunnels
ip rsvp bandwidth
interface POS7/0
...
mpls traffic-eng tunnels
ip rsvp bandwidth

mpls traffic-eng
interface POS0/6/0/0
!
interface POS0/7/0/0
!
!
router ospf lab
mpls traffic-eng area 0
!

router ospf 1
mpls traffic-eng router-id Loopback0
mpls traffic-eng area 0

rsvp
interface POS0/6/0/0
bandwidth
!
interface POS0/7/0/0
bandwidth
!
!

In Cisco IOS XR software, four TE-related submodes exist below global configuration mode: tunnel
interface, MPLS traffic-eng, IGP, and RSVP. In Cisco IOS, three TE-related submodes exist below
global configuration mode: tunnel interface, physical interface, and IGP.
An IS-IS TE configuration in Cisco IOS XR software is similar to an IS-IS configuration in Cisco IOS;
Cisco IOS XR software supports the full range of narrow, transition, and wide metrics that Cisco IOS
supports, and the TE configuration is under the IPv4 address family:
router isis lab
address-family ipv4 unicast
mpls traffic-eng level 2
!
!

In Cisco IOS XR software the default metric-style is narrow, just as it is in Cisco IOS.
For further information on TE configuration, see the following configuration guide and command
reference modules:

The Implementing MPLS Traffic Engineering on Cisco IOS XR Software module of the
Cisco IOS XR Multiprotocol Label Switching Configuration Guide

The MPLS Traffic Engineering Commands on Cisco IOS XR Software module of the Cisco IOS XR
Multiprotocol Label Switching Command Reference

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

23

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Quality of Service (QoS)

Quality of Service (QoS)


The most commonly used QoS element on a Cisco XR 12000 Series Router is the Modular QoS CLI
(MQC). Converting Cisco IOS MQC to Cisco IOS XR MQC is straightforward because the syntax is the
same; the only difference is the available set of capabilities. A list of the matching options for
Cisco IOS XR Software Release 3.3.0 and Cisco IOS 12.0(28)S on a Cisco XR 12000 Series Router
appears in Table 25.
Table 25

Matching Options for QoS in Cisco IOS and Cisco IOS XR Configurations

Cisco IOS

Cisco IOS XR

access-group

access-group

any

any

atm

discard-class

cos

dscp

dscp

mpls

fr-dlci

packet

ip

precedence

mpls

protocol

not

qos-group

precedence

vlan

protocol
qos-group
vlan

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

24

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Quality of Service (QoS)

Table 26

Available Policy-map Actions in Cisco IOS and Cisco IOS XR

Cisco IOS

Cisco IOS XR

bandwidth

bandwidth

police

police

priority

priority

queue-limit

queue-limit

random-detect

random-detect

service-policy

service-policy

set

set
dscp

cos

ip

discard-class

mpls

dscp

precedence

mpls

atm-clp

precedence

cos

qos-group

discard-class

srp-priority

fr-de

shape

qos-group
shape
You have a few more class-map options in Cisco IOS than Cisco IOS XR software, but the core matching
options of dscp, mpls, qos-group, and discard-class are present. Cisco IOS XR software has no support
for atm-clp or fr-de, but that is because there is no support for ATM or FR encapsulation in
Cisco IOS XR software.
The actions you can take in a policy map are almost identical as well.
One issue to note in MQC is that in Cisco IOS some measures of bandwidth are in bits per second, some
are in bytes per second, and some are in kilobits per second. The three keywords in a policy-map that
refer to bandwidth on a Cisco XR 12000 Series Router in 12.0(28)S are:

bandwidth rate_in_kilobits_per_second

police rate_in_bits_per_second bc_bytes be_bytes

shape average cir_bits_per_second bc_bits be_bits

In Cisco IOS XR software, everything is in kilobits per second:

bandwidth kilobits_per_second

police rate kilobits_per_second bc_kilobits be_kilobits

shape average cir_kilobits_per_second burst_in_kilobits

To convert from bytes to kilobits, multiply by 0.008. Thus, 64,000 bytes is 512 kilobits.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

25

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


IPv6

Other parts of QoS that exist in Cisco IOS are Selective Packet Discard (SPD) and receive ACLs.
Cisco IOS XR software also has Local Packet Transport Service (LPTS) to provide protection against
Denial of Service (DoS) attacks. In the current release, you can monitor but not configure LPTS, so this
document does not describe LPTS.
For further information on QoS configuration, see the following configuration guide and command
reference:

Cisco IOS XR Modular Quality of Service Configuration Guide

Cisco IOS XR Modular Quality of Service Command Reference

IPv6
IPv6 configuration is very similar to IPv4.
Table 27

IPv6 IS-IS Configuration in Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

interface POS2/1
ipv6 address FEC0:0:0:14::5/104
ipv6 router isis labv6

interface POS0/2/0/1
ipv6 address fec0:0:0:14::8/104

router isis labv6


net 49.0192.0168.0001.0005.00
is-type level-2-only
metric-style wide
redistribute connected
passive-interface Loopback0
!
address-family ipv6
multi-topology
exit-address-family
!

router isis labv6


is-type level-2-only
net 49.0192.0168.0001.000.8.00
interface Loopback0
passive
address-family ipv6 unicast
!
!
interface POS0/2/0/1
address-family ipv6 unicast
!
!

One thing to note is that Cisco IOS XR software uses multi-topology routing rather than a single
topology with all prefixes as leaf nodes, so you need to enable multi-topology under the address family
in Cisco IOS.
In general, IPv6 show commands are the same as IPv4 show commands; many of the show ip
commands in Cisco IOS are now show ipv4 commands in Cisco IOS XR software, and most of those
commands have a show ipv6 equivalent.
Three routing protocols in Cisco IOS XR software support IPv6:

BGP using IPv6 unicast or multicast address-family

OSPFv3

IS-IS using IPv6 unicast address-family

The IS-IS configuration appears in Table 27. A BGP configuration appears the same as previously
demonstrated BGP configurations (except for using the IPv6 address-family here). OSPF, rather than
having separate address families in a single routing protocol, has its own new routing protocol, OSPFv3.
An OSPFv3 configuration appears like an IPv4 OSPF (also known as OSPFv2) configuration.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

26

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Other Cisco IOS XR Issues

Table 28

IPv4 OSPFv2 and IPv6 OSPFv3 Configurations in Cisco IOS XR Software

Cisco IOS XR OSPFv2 (IPv4)

Cisco IOS XR OSPFv3 (IPv6)

router ospf lab


log adjacency changes
area 0
interface Loopback0
passive enable
!
interface POS0/1/0/1
!
interface POS0/2/0/0
!
interface POS0/2/0/1
cost 17
!
interface POS0/2/0/2
!
!
!

router ospfv3 labv6


log adjacency changes
area 0
interface Loopback0
passive
!
interface POS0/1/0/1
!
interface POS0/2/0/0
!
interface POS0/2/0/1
cost 17
!
interface POS0/2/0/2
!
!
!

There is no implementation of MPLS-TE for IPv6 in IS-IS or OSPF, so any traffic-engineering


commands under the IGP will not be accepted.
IPv6 in both Cisco IOS and Cisco IOS XR software has capabilities that are not covered in this
document
For further information on IPv6 configuration, see the following configuration guide and command
reference:

Cisco IOS XR IP Addresses and Services Configuration Guide

Cisco IOS XR IP Addresses and Services Command Reference

Other Cisco IOS XR Issues


This section addresses the following miscellaneous issues:

Access Lists, page 27

Username Configuration and Permission Levels, page 28

Network Time Protocol (NTP), page 29

Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP), page 29

Line Configurations, page 30

Access Lists
Cisco IOS has standard and extended in addition to named and numbered ACLs. Cisco IOS XR software
does not have named versus numbered ACLs, although you can use a set of numbers as an ASCII name
string. Standard and extended ACL configurations are shown below in Table 29. For Cisco IOS, named
and numbered ACLs are shown; for Cisco IOS XR software, the corresponding configuration is shown.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

27

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Other Cisco IOS XR Issues

Note that Cisco IOS XR software does not have a concept of named or numbered ACLs, and also note
that there is no such thing as a standard or extended ACL; for the equivalent of the standard Cisco IOS
ACL, configure a Cisco IOS XR ACL with only the source IP address specified.
Cisco IOS XR software supports a full set of keyword equivalents for Cisco IOS.
Table 29

Comparison of Access-lists between Cisco IOS and Cisco IOS XR Configurations

Cisco IOS

Cisco IOS XR Software

access-list 10 permit 1.1.1.1


access-list 10 permit 10.0.0.0 0.255.255.255

ipv4 access-list ten


10 permit ipv4 host 1.1.1.1 any
20 permit ipv4 10.0.0.0 0.255.255.255 any

access-list 100 permit ip 20.0.0.0 0.0.255.0 any


access-list 100 permit icmp any host 1.2.3.4

ipv4 access-list 100


10 permit ipv4 20.0.0.0 0.0.255.0 any
20 permit icmp any host 1.2.3.4

ip access-list standard test


permit 9.9.9.9

ipv4 access-list test


10 permit ipv4 host 9.9.9.9 any

ip access-list extended moreTest


permit eigrp 1.0.2.0 0.255.0.255 host 7.7.7.6

ipv4 access-list moreTest


10 permit eigrp 1.0.2.0 0.255.0.255 host 7.7.7.6

Cisco IOS XR software also allows you to resequence an ACL, so that if you have left yourself no space
to add new lines, you can create that space. The first example shows the results of using the show ipv4
access-lists command:
RP/0/RP/CPU0:router# show ipv4 access-lists test
ipv4 access-list test
10 permit ipv4 11.0.0.0 0.0.0.255 any
11 permit ipv4 12.0.0.0 0.0.0.255 any

Username Configuration and Permission Levels


This section briefly describes a very powerful and therefore complex set of Cisco IOS XR software tools
for allowing multiple levels of permissions to a CLI user. Cisco IOS has privilege levels; an
unauthenticated user is privilege level 1, a user with the enable password is privilege level 15, and some
networks use the levels in between for partial access.
Cisco IOS XR software has the concepts of task groups and user groups that allow you much more
flexibility in a more logical manner; you define a group of users that has access to a certain set of
capabilities. Some of these capabilities are debugs, some are show commands, some are configurations.
Different user groups have configuration access to different parts of the router, so deriving an exact
translation of an unprivileged Cisco IOS user is difficult. However, at a minimum, you want to configure
a root-system user; this is the most powerful user in the Cisco IOS XR scheme and is essentially the same
as a fully enabled user in Cisco IOS. The configuration for a root-system user in Cisco IOS XR software
is:
username lab
password 7 1042081B
group root-system

In this example, the name of the created user lab, with a password of lab. This user has the power to do
anything on the router. Configuring a user with less than complete privileges is easy, as Cisco provides
the following task groups:

cisco-supportdebugging and troubleshooting features, usually used by Cisco support presonnel

netadminconfiguration tasks, such as those for routing protocols

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

28

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Other Cisco IOS XR Issues

operatorday-to-day monitoring activities and limited configuration rights

root-systemconfiguration and display rights for all SDRs in the system

root-lrconfiguration and display rights for a specific SDR

sysadminadministrative tasks such as maintaining the location for stored core dumps or setting up
the Network Timing Protocol (NTP)

In addition, you can define your own task groups (with sets of capabilities that a task group member has)
and usergroup (collections of task groups) and attach them to a username. Doing this is beyond the scope
of this document, although investigation of task groups and the Cisco IOS XR authentication model is
highly recommended. For information on task groups, user groups, and so on, see Cisco IOS XR System
Security Configuration Guide and Cisco IOS XR Getting Started Guide.
Beginning in Release 3.3.0, we support Secure Domain Routers (SDRs). Each SDR has its own set of
usernames and access privileges. The root-system username can be used only on the DSC (primary RP
of rack 0) to access the Admin EXEC and Admin configuration modes. The other usernames are assigned
to a specific SDR. If the system has only the default SDR, then every user logs in to the same RP.

Network Time Protocol (NTP)


The NTP configuration in Cisco IOS XR software is similar to that in Cisco IOS:
Table 30

NTP Configuration in Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

ntp server 10.86.202.56

ntp
server 161.44.71.59
!

Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol
(VRRP)
HSRP and VRRP configurations are similar in Cisco IOS and in Cisco IOS XR software.
Table 31

HSRP and VRRP Configurations in Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

interface GigabitEthernet4/0

standby 1 ip 1.2.3.4
end

router hsrp
interface GigabitEthernet0/6/0/0
hsrp 1 ipv4 1.2.3.4
!
!

interface GigabitEthernet4/0

vrrp 1 ip 1.2.3.4
end

router vrrp
interface GigabitEthernet0/6/0/0
vrrp 1 ipv4 1.2.3.4
!
!

The primary difference here is, of course, that you configure interface properties not on the interface
directly, but under the interface submode of the protocol either router hsrp or router vrrp.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

29

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Other Cisco IOS XR Issues

Line Configurations
The line {console | aux | vty} configurations are very similar in Cisco IOS and Cisco IOS XR software.
In most networks, the console and vtys are configured; the aux port is not very useful in either Cisco IOS
or Cisco IOS-XR software. A simple translation of Cisco IOS to Cisco IOS XR software appears in
Table 32.
Table 32

Line Configurations in Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

aaa authentication login default local


username lab password 7 09404F0B
line con 0
exec-timeout 0 0
line vty 0 4
password lab
login
!

username lab
password 7 1042081B
group root-system
!
line console
exec-timeout 0 0
!
telnet ipv4 server enable

Note that in Cisco IOS XR software you must configure the global command telnet ipv4 server enable
for the router to allow telnet.
Secure Shell (SSH) support is very similar. The crypto key zerioze and crypto key generate commands
are in EXEC mode in Cisco IOS XR software, but in Cisco IOS they are in configuration mode.
Table 33

Secure Shell (with no telnet) Configurations in Cisco IOS and Cisco IOS XR Software

Cisco IOS

Cisco IOS XR Software

aaa authentication login default local


username lab password 7 09404F0B
line vty 0 4
transport input ssh
!

username lab
password 7 1042081B
group root-system
!
line console
exec-timeout 0 0
!
ssh server enable

For SSH support, you need to have crypto support, just as in Cisco IOS. This is generally accomplished
by installing the k9sec package.
In Cisco IOS XR software, no matter whether you have enabled the telnet server, the SSH server, or
both, show line vty vty shows both transports as allowed:
RP/0/0/CPU0:router# show line vty 0
Tty
vty0

Speed
0

Modem
-

Uses
-

Noise Overruns
0/0

Line vty0, Location Unknown, Type Unknown


Length: 24 lines, Width: 80 columns
Baud rate (TX/RX) is 0, 0 parity, 0 stopbits, 0 databits
Template: default
Config:
Allowed transports are telnet ssh.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

30

Acc I/O
-/-

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

This is a little confusing, as the notion of a transport being allowed in Cisco IOS means that you can use
that transport to connect to the router; in Cisco IOS XR software, you need to enable both the server and
the transport, and the transport is enabled by default. To be certain of control access into the router,
enable and disable the server.

Translating Cisco IOS Route Maps to Cisco IOS XR Routing


Policy Language
This section contains the following topics:

Introduction and Overview, page 31

Original Route Map Configuration, page 32

A Simple Translation, page 33

Using Nested Conditionals to Reduce Repetitive Comparisons, page 34

Using Inline Sets to Remove Small Indirect Set References, page 36

Taking Advantage of Parameterization to Reuse Common Structures, page 37

Introduction and Overview


Consider the following route maps, prefix lists, and community lists. We show four different translations
into the routing policy language, continually using more capabilities of the language to reduce the
amount of configuration needed. This example steps you through using several of the features of the
language to modularize the configuration. Decide what you should modularize and whether you should
modularize specific portions in the context of how that particular piece of policy will be used.
You cannot use both RPL and an old policy (including route maps and access control lists) at the same
attach point.
For example, the following configuration would be invalid:
router bgp 2
neighbor 10.0.101.2
address-family ipv4 unicast
route-policy rpl0 in
route-map rm0 in

However, this configuration would be valid:


router bgp 2
neighbor 10.0.101.2
address-family ipv4 unicast
route-policy rpl0 in
route-map rm0 out
neighbor 10.0.101.3
address-family ipv4 unicast
route-policy rpl1 out

In the next example, a route map is translated to the policy language while retaining the redundant
operations.

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

31

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

Original Route Map Configuration


The following is an example of an original route map.
ip prefix-list 101
10 permit 10.48.0.0/16 le 32
20 permit 172.48.0.0/19 le 32
30 permit 172.10.10.0/24
40 permit 172.11.1.0/24
50 permit 192.168.3.0/24
60 permit 192.168.8.0/21
70 permit 192.168.32.0/21
ip prefix-list 102
10 permit 10.48.0.0/16 le 32
20 permit 10.48.0.5/19 le 32
30 permit 172.16.10.0/24
40 permit 172.16.1.0/24
50 permit 172.16.3.0/24
60 permit 192.168.8.0/21
70 permit 192.168.32.0/21

ip community-list 1
10 permit 10:11
ip community-list 2
10 permit 10:12
ip community-list 3
10 permit 10:13
ip community-list 4
10 permit 10:14
route-map sample1-translation-1 permit
match ip address prefix-list 101
match community 1
set community 12:34 additive
set metric 11
route-map sample1-translation-1 permit
match ip address prefix-list 101
match community 2
set metric 12
set community 12:34 additive
route-map sample1-translation-1 permit
match ip address prefix-list 101
match community 3
set metric 13
set community 12:34 additive
route-map sample1-translation-1 permit
match ip address prefix-list 101
match community 4
set metric 14
set community 12:34 additive
route-map sample1-translation-1 permit
match ip address prefix-list 101
set metric 100
set community 12:34 additive

10

20

30

40

50

route-map sample2-translation-1 permit 10


match ip address prefix-list 102
match community 1

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

32

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

set community 12:35 additive


set metric 11
route-map sample2-translation-1 permit
match ip address prefix-list 102
match community 2
set metric 12
set community 12:35 additive
route-map sample2-translation-1 permit
match ip address prefix-list 102
match community 3
set metric 13
set community 12:35 additive
route-map sample2-translation-1 permit
match ip address prefix-list 102
match community 4
set metric 14
set community 12:35 additive
route-map sample2-translation-1 permit
match ip address prefix-list 102
set metric 100
set community 12:35 additive

20

30

40

50

A Simple Translation
A simple translation of this route map configuration to the policy language would retain the redundant
operations, as shown in the following example:
prefix-set ps101
10.48.0.0/16 le 32
172.48.0.0/19 le 32
172.10.10.0/24
172.11.1.0/24
192.168.3.0/24
192.168.8.0/21
192.168.32.0/21
end-set
prefix-set ps102
10.48.0.0/16 le 32
10.48.0.5/19 le 32
172.16.10.0/24
172.16.1.0/24
172.16.3.0/24
192.168.8.0/21
192.168.32.0/21
end-set
community-set cs1
10:11
end-set
community-set cs2
10:12
end-set
community-set cs3
10:13
end-set
community-set cs4
10:14

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

33

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

end-set
route-policy sample1-translation-1a
if destination in ps101 and community matches-any cs1
set med 11
set community 12:34 additive
elseif destination in ps101 and community matches-any
set med 12
set community 12:34 additive
elseif destination in ps101 and community matches-any
set med 13
set community 12:34 additive
elseif destination in ps101 and community matches-any
set med 14
set community 12:34 additive
elseif destination in ps101
set med 100
set community 12:34 additive
endif
end-policy
route-policy sample2-translation-1a
if destination in ps102 and community matches-any cs1
set med 11
set community (12:35) additive
elseif destination in ps102 and community matches-any
set med 12
set community (12:35) additive
elseif destination in ps102 and community matches-any
set med 13
set community (12:35) additive
elseif destination in ps102 and community matches-any
set med 14
set community (12:35) additive
elseif destination in ps102
set med 100
set community (12:35) additive
endif
end-policy

then

cs2 then

cs3 then

cs4 then

then

cs2 then

cs3 then

cs4 then

Using Nested Conditionals to Reduce Repetitive Comparisons


Common operations can be coalesced by nesting the conditionals, testing the destination address only
once, and setting the community only once, as shown in the following example:
prefix-set ps101
10.48.0.0/16 le 32
172.48.0.0/19 le 32
172.10.10.0/24
172.11.1.0/24
192.168.3.0/24
192.168.8.0/21
192.168.32.0/21
end-set
prefix-set ps102
10.48.0.0/16 le 32
10.48.0.5/19 le 32
172.16.10.0/24
172.16.1.0/24
172.16.3.0/24
192.168.8.0/21

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

34

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

192.168.32.0/21
end-set
community-set cs1
10:11
end-set
community-set cs2
10:12
end-set
community-set cs3
10:13
end-set
community-set cs4
10:14
end-set
route-policy sample1-translation-1b
if destination in ps101 then
set community (12:34) additive
if community matches-any cs1 then
set med 11
elseif community matches-any cs2 then
set med 12
elseif community matches-any cs3 then
set med 13
elseif community matches-any cs4 then
set med 14
else
set med 100
endif
endif
end-policy
route-policy sample2-translation-1b
if destination in ps102 then
set community (12:35) additive
if community matches-any cs1 then
set med 11
elseif community matches-any cs2 then
set med 12
elseif community matches-any cs3 then
set med 13
elseif community matches-any cs4 then
set med 14
else
set med 100
endif
endif
end-policy

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

35

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

Using Inline Sets to Remove Small Indirect Set References


Because the community comparisons are simple, we can replace the named community set references
with direct inline references, thus eliminating the need to define four community sets, each of which
contains only one community value. These replacements leave two prefix sets and two policies, as
follows:
prefix-set ps101
10.48.0.0/16 le 32
172.48.0.0/19 le 32
172.10.10.0/24
172.11.1.0/24
192.168.3.0/24
192.168.8.0/21
192.168.32.0/21
end-set
prefix-set ps102
10.48.0.0/16 le 32
10.48.0.5/19 le 32
172.16.10.0/24
172.16.1.0/24
172.16.3.0/24
192.168.8.0/21
192.168.32.0/21
end-set
route-policy sample1-translation-1c
if destination in ps101 then
set community (12:34) additive
if community matches-any (10:11) then
set med 11
elseif community matches-any (10:12) then
set med 12
elseif community matches-any (10:13) then
set med 13
elseif community matches-any (10:14) then
set med 14
else
set med 100
endif
end-policy
route-policy sample2-translation-1c
if destination in ps102 then
set community (12:35) additive
if community matches-any (10:11) then
set med 11
elseif community matches-any (10:12) then
set med 12
elseif community matches-any (10:13) then
set med 13
elseif community matches-any (10:14) then
set med 14
else
set med 100
endif
end-policy

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

36

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

Taking Advantage of Parameterization to Reuse Common Structures


The following example takes advantage of the ability to parameterize common structures and create a
common parameterized policy (sample-translation-common) that is reused:
prefix-set ps101
10.48.0.0/16 le 32
172.48.0.0/19 le 32
172.10.10.0/24
172.11.1.0/24
192.168.3.0/24
192.168.8.0/21
192.168.32.0/21
end-set
prefix-set ps102
10.48.0.0/16 le 32
10.48.0.5/19 le 32
172.16.10.0/24
172.16.1.0/24
172.16.3.0/24
192.168.8.0/21
192.168.32.0/21
end-set
route-policy sample-translation-common($tag)
set community (12:$tag) additive
if community matches-any (10:11) then
set med 11
elseif community matches-any (10:12) then
set med 12
elseif community matches-any (10:13) then
set med 13
elseif community matches-any (10:14) then
set med 14
else
set med 100
endif
end-policy
route-policy sample1-translation-1d
if destination in ps101 then
apply sample-translation-common ($34)
pass
endif
end-policy
route-policy sample2-translation-1d
if destination in ps102 then
apply sample-translation-common ($35)
pass
endif
end-policy

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

37

Converting Cisco IOS Configurations to Cisco IOS XR Configurations


Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

38

INDEX

HC

Cisco IOS XR Interface and Hardware Component


Configuration Guide

IC

Cisco IOS XR IP Addresses and Services Configuration Guide

bandwidth command (IOS XR)

MCC

Cisco IOS XR Multicast Configuration Guide

banner command (IOS)

MPC

Cisco IOS XR MPLS Configuration Guide

banner command (IOS XR)

QC

Cisco IOS XR Modular Quality of Service Configuration


Guide
Cisco IOS XR Routing Configuration Guide
Cisco IOS XR Session Border Controller Configuration Guide
Cisco IOS XR System Security Configuration Guide
Cisco IOS XR System Management Configuration Guide

5
13, 14, 15, 16, 17,

18

SBC
SC

bgp log-neighbor-changes command (IOS)

RC

SMC

23

boot system command (IOS)

A
Cisco IOS commands
aaa accounting commands command (IOS)

aaa accounting commands

aaa accounting commands command (IOS XR)


aaa accounting exec command (IOS)

aaa authentication
6

aaa new-model
6

aaa authorization commands command(IOS XR)


3

access-list command
number variable (IOS)

address-family ipv6

26

28
10, 14

address-family ipv6 command (IOS)

26

address-family ipv6 command (IOS XR)


ais-shut command (IOS XR)
announce command (IOS)

bgp log-neighbor-changes

address-family command (IOS XR)

af-group command (IOS XR)

23

27

banner

access-list command (IOS)

boot system
cost
26

14, 15, 16, 18

egbp-multihop

17

18

exit-address-family

27

autoroute announce command (IOS XR)

27

enable

23

hostname
23

13, 14, 15, 16, 17, 18

egbp-peers

access-list command

area

3, 30

28

announce

compiled keyword (IOS)

area command (IOS)

access-list
6

aaa authorization commands

3, 30

aaa authorization commands command(IOS)


aaa new-model command (IOS)

aaa accounting exec

aaa accounting exec command (IOS XR)


aaa authentication command (IOS)

26

inbound

14, 16, 18

interface

interface tunnel
ip access-list

23

28

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

39

Index

ip address

net

7, 12

ip bgp-community new-format
ip bootp server
ip classless
ip finger
ip ftp

10, 26

network

12

no auto-summary

13, 14, 16, 17, 18

no mpls ip propagate-ttl

no service pad

no synchronization

ip-multicast-routing

ntp

21

13, 14, 15, 16, 17, 18

29

ip name-server

passive

ip pim address

21

passive interface

12

passive-interface

10, 26

ip receive
ip route

ip router

ip telnet source-interface

remote-as

14, 17, 18

router bgp

13, 14, 15, 16, 17, 18

router-id

ipv6 address
ipv6 router

line

ip unnumbered

11, 26

redistribute connected route-map

ip tcp path-mtu discovery

10

router ospf

26

12, 27

service compress-config

26

service nagle

service password-encryption

10, 26

service tcp-keepalives-in

7, 30

10

router isis

23

10

is-type

redistribute connected

ip subnet-zero

isis

pos scramble-atm

23

ip tftp

15

pos ais-shut

10

ip rsvp bandwidth
ip spd

27

password

21

log adjacency changes

27

service tcp-keepalives-out

log-adjacency-changes

12

service timestamps debug datetime msec

logging buffered
loopback

service timestamps log datetime msec

sevice upgrade all

13, 17

maximum-prefix
metric-style

snmp-server

14, 16, 18

mpls label protocol ldp


mpls label range

standby

22

transport

21

mpls traffic-eng area

tunnel

23

23

update-source

mpls traffic-eng router-id

23

username

multi-topology
neighbor

23

26

13, 14, 16, 17, 18


Converting Cisco IOS Configurations to Cisco IOS XR Configurations

40

version
vrrp

5, 22

30

mpls traffic-eng auto-bw


mpls traffic-eng tunnels

14, 16, 18

29

tag-switching

soft-reconfiguration

26

mpls label protocol

14, 16, 17, 18

30
5

29

weight

14, 16, 18

Index

Cisco IOS XR commands

aaa accounting commands


aaa accounting exec

neighbor-group

10
6

aaa authorization commands


address-family

bandwidth

23

23

controller SONET
domain name-server
egbp-multihop

permit

28

policy

17

remote-as

14, 17, 18

route ipv4

router-id

ipv4 access-list
ipv4 address

router isis

10, 26

router ospf

12

ipv6 address

27

21

service timestamps debug datetime msec

23

service timestamps log datetime msec

28

session-group

ipv4 unnumbered

10

13, 14, 15, 16, 17, 18

router pim

7, 10

interface tunnel-te

11

18

router ospfv3

interface

18

router bgp

30

29

is-type

23

route-policy

30

hsrp

line

17

exec-timeout

hostname

15

redistribute connected policy

27

group

10, 12, 26, 27

redistribute connected

ftp client

passive

peer-group

autoroute announce

cost

29

path scramblilng disable

banner

ntp

path-option

26

14, 15, 16, 18

ais-shut

26

password

10, 14

address-family ipv6
af-group

net

16

show line

23

15

soft-reconfiguration

10, 26

ssh server enable

7, 30

log adjacency changes

14, 16, 18

30

tcp path-mtu-discovery age-timer command

12

logging buffered

telnet ipv4

maximum-prefix

14, 16, 18

telnet ipv4 client source-interface

metric

tftp client

10

mple ip-ttl-propagate disable


mpls label range
mpls ldp

mpls traffic-eng area


multicast-routing
neighbor

12, 23

21

tunnel destination

13, 14, 16, 17, 18

23

14
14, 16, 17, 18
14

use neighbor-group
username

use af-group

23

30

update-source

22

mpls traffic-eng

21

unicast

21

30

snmp-server

26

16

30

use session-group

15

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

41

Index

vrrp

interface command (IOS)

29

weight

interface command (IOS XR)

14, 16, 18

controller SONET command (IOS XR)


conversion procedure

cost command (IOS)

27

7, 10

interface tunnel command (IOS)

23

interface tunnel-te command (IOS XR)


ip access-list command (IOS)

cost command (IOS XR)

ip address command (IOS)

27

23

28

7, 12

ip bgp-community new-format command (IOS)


ip bootp server command (IOS)

ip classless command (IOS)

domain name-server command (IOS XR)

ip finger command (IOS)


ip ftp command (IOS)

3, 4

ip multicast-routing command (IOS)

E
egbp-multihop command (IOS)

17

egbp-multihop command (IOS XR)


egbp-peers command (IOS)
enable command (IOS)

17

ip name-server command (IOS)

ip pim address command (IOS)

21

ip receive command (IOS)


ip route command (IOS)

18

4
6

ip router command (IOS)

exec-timeout command (IOS)

exec-timeout command (IOS XR)


exit-address-family command (IOS)

10

ip rsvp bandwidth command (IOS)

30

ip spd command (IOS)

30
26

21

23

ip subnet-zero command (IOS)

ip tcp path-mtu-discovery command (IOS)


ip telnet source-interface command (IOS)

ip tftp command (IOS)

ftp client command (IOS XR)

23

ipv4 access-list command (IOS XR)


ipv4 address command (IOS XR)

28

ipv4 unnumbered command (IOS XR)

group command (IOS XR)

ipv6 address command (IOS)

30

ipv6 router command (IOS)


isis command (IOS)

hostname command (IOS)

hostname command (IOS XR)


hsrp command (IOS XR)

26

26

10

is-type command (IOS)

23

26

ipv6 address command (IOS XR)

ip unnumbered command (IOS)

10, 26

is-type command (IOS XR)

10, 26

29

L
I

line command (IOS)

inbound command (IOS)

14, 16, 18

7, 30

line command (IOS XR)

7, 30

log adjacency changes command (IOS)


Converting Cisco IOS Configurations to Cisco IOS XR Configurations

42

27

Index

log-adjacency-changes command (IOS)

no service pad command (IOS)

12

log adjacency changes command (IOS XR)


logging buffered command (IOS)
loopback command (IOS)

no synchronization command (IOS)

12

ntp command (IOS)

logging buffered command (IOS XR)

29

ntp command (IOS XR)

13, 14, 15, 16, 17, 18

29

13, 17

O
M

outer ospf command (IOS)

maximum-prefix command (IOS)

14, 16, 18

maximum-prefix command (IOS XR)


metric command (IOS XR)

14, 16, 18

10

metric-style command (IOS)

26

passive command (IOS)

mpls ip-ttl-propagate disable command (IOS XR)


mpls label protocol command (IOS)

22

mpls label protocol ldp command (IOS)


mpls label range command (IOS)

21

mpls label range command (IOS XR)


mpls ldp command (IOS XR)

12

21

27

passive command (IOS XR)

passive interface command (IOS)

12

passive-interface command (IOS)

10, 26

password command (IOS)


21

10, 12, 26, 27

15

password command (IOS XR)

22

15

path-option command (IOS XR)

mpls traffic-eng area command (IOS)

23

path scrambling disable command (IOS XR)

mpls traffic-eng area command (IOS XR)

12, 23

peer-group command (IOS XR)

mpls traffic-eng auto-bw command (IOS)

permit command (IOS XR)

mpls traffic-eng command (IOS XR)

23

mpls traffic-eng router-id command (IOS)


mpls traffic-eng tunnels command (IOS)
multicast-routing command (IOS XR)
multi-topology command (IOS)

23

18

28

pos ais-shut command (IOS)


23

pos scramble-atm command (IOS)

23

21

26

redistribute connected command (IOS)

13, 14, 16, 17, 18

neighbor command (IOS XR)

13, 14, 16, 17, 18

neighbor-group command (IOS XR)


net

11, 26

redistribute connected command (IOS XR)

N
neighbor command (IOS)

16

10

net command (IOS)

10, 26
10, 26

network command (IOS)

12

no auto-summary command (IOS)

10

redistribute connected route-map command (IOS)

10

remote-as command (IOS)

14, 17, 18

remote-as command (IOS XR)

14, 17, 18

route ipv4 command (IOS XR)

router bgp command (IOS)

no mpls ip propagate-ttl command (IOS)

21

router-id command (IOS)

17, 18

13, 14, 15, 16, 17, 18

router bgp command (IOS XR)


13, 14, 16, 17, 18

11

redistribute connected policy command (IOS XR)

route-policy command (IOS XR)

net command (IOS XR)

13, 14, 15, 16, 17, 18

router-id command (IOS XR)

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

43

Index

router isis command (IOS)

telnet ipv4 client source-interface command (IOS XR)

10

router isis command (IOS XR)


router ospf command (IOS)

telnet ipv4 command (IOS XR)

10, 26

tftp client command (IOS XR)

12, 27

router ospf command (IOS XR)

transport command (IOS)

12

router ospfv3 command (IOS XR)


router pim command (IOS XR)

tunnel command (IOS)

27

30
6

30

23

tunnel destination command (IOS XR)

21

23

routing policy
translating Cisco IOS route maps to Cisco IOS XR
routing policy language (example) 31

U
unicast command (IOS XR)

14

update-source command (IOS)

14, 16, 17, 18

update-source command (IOS XR)


SDR

29

use af-group command (IOS XR)

Secure Domain Router, see SDR

29

14

use neighbor-group command (IOS XR)

service compress-config command (IOS)


service nagle command (IOS)

14, 16, 17, 18

username command (IOS)

30

username command (IOS XR)

service password-encryption command (IOS)


service tcp-keepalives-in command (IOS)
service tcp-keepalives-out command (IOS)

30

use session-group command (IOS XR)

5
5

service timestamps debug datetime msec command


(IOS) 5

version command (IOS)

service timestamps debug datetime msec command (IOS


XR) 5
service timestamps log datetime msec command (IOS)

vrrp command (IOS)


5

29

vrrp command (IOS XR)

29

service timestamps log datetime msec command (IOS


XR) 5
service upgrade all command (IOS)

session-group command (IOS XR)

15

show line command (IOS XR)


snmp-server command (IOS)

W
weight command (IOS)

30

snmp-server command (IOS XR)

soft-reconfiguration command (IOS)

14, 16, 18

soft-reconfiguration command (IOS XR)


ssh server enable command (IOS XR)
standby command (IOS)

14, 16, 18

30

29

T
tag-switching command (IOS)

5, 22

tcp path-mtu-discovery age-timer command (IOS XR)

Converting Cisco IOS Configurations to Cisco IOS XR Configurations

44

14, 16, 18

weight command (IOS XR)

16

14, 16, 18

15

S-ar putea să vă placă și