Documente Academic
Documente Profesional
Documente Cultură
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version
of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown
for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://
www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Preface Preface xi
Changes to This Document xi
Obtaining Documentation and Submitting a Service Request xii
CHAPTER 2 Secure Domain Routers on the Cisco ASR 9000 Series Router 11
Prerequisites for Working with Secure Domain Routers 11
Information About Configuring Secure Domain Routers 12
What Is a Secure Domain Router? 12
Owner SDR and Administration Configuration Mode 12
SDR Access Privileges 12
Root-System Users 13
root-lr Users 13
Other SDR Users 14
Designated Shelf Controller (DSC) 14
Default Configuration of the Router 14
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 iii
Contents
CHAPTER 3 Upgrading and Managing Software on Cisco ASR 9000 Series Router 17
Overview of Cisco IOS XR Software Packages 18
Package Installation Envelopes 18
Summary of Cisco IOS XR Software Packages 18
Packages in the Cisco IOS XR Unicast Routing Core Bundle 19
Software Maintenance Upgrades 19
PIE Filenames and Version Numbers 19
Filename Component Description 20
Copying the PIE File to a Local Storage Device or Network Server 22
Information About Package Management 23
Summary of Package Management 23
Adding Packages 23
Activating Packages 24
Activating Multiple Packages or SMUs 24
Activating All Packages Added in a Specific Operation 24
Adding and Activating a Package with a Single Command 24
Upgrading and Downgrading Packages 24
Committing the Active Software Set 25
Rolling Back to a Previous Installation Operation 25
Upgrading Packages 25
Downgrading Packages 26
Impact of Package Version Changes 26
Impact of Package Activation and Deactivation 27
Delaying the Return of the CLI Prompt 27
Displaying Installation Log Information 28
Examples 28
Package Management Procedures 30
Activation and Deactivation Prerequisites 30
Obtaining and Placing Cisco IOS XR Software 31
Transferring Installation Files from a Network File Server to a Local Storage
Device 31
Preparing for Software Installation Operations 34
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
iv OL-23202-05
Contents
Examples 37
Adding and Activating Packages 44
Examples 50
Committing the Active Package Set 52
Examples 53
Upgrading to Cisco IOS XR Software Release 4.0 54
Deactivating and Removing Cisco IOS XR Software Packages 60
Examples 64
Rolling Back to a Previous Software Set 65
Displaying Rollback Points 65
Displaying the Active Packages Associated with a Rollback Point 66
Rolling Back to a Specific Rollback Point 67
Rolling Back to the Last Committed Package Set 67
Additional References 68
CHAPTER 4 Configuring Disk Mirroring on the Cisco ASR 9000 Series Router 71
Disk Mirroring Prerequisites 71
Information About Disk Mirroring 72
How to Enable Disk Mirroring 73
Enabling Disk Mirroring 73
Replacing the Secondary Mirroring Device 75
Replacing the Primary Mirroring Device 76
Configuration Examples for Enabling Disk Mirroring 80
Additional References 81
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 v
Contents
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
vi OL-23202-05
Contents
Replacing a Line Card with the Same Media Type and Port Count 121
Replacing a Line Card with the Same Media Type and a Different Port Count 121
Replacing a Line Card or PLIM with a Different Media Type 122
Upgrading the CPU Controller Bits 122
Examples 123
Additional References 123
CHAPTER 7 Upgrading FPD on the Cisco ASR 9000 Series Router 127
Prerequisites for FPD Image Upgrades 128
Overview of FPD Image Upgrade Support 128
Automatic FPD Upgrade 128
How to Upgrade FPD Images 129
Configuration Examples for FPD Image Upgrade 132
show hw-module fpd Command Output: Example 132
show fpd package Command Output: Example 134
upgrade hw-module fpd Command Output: Example 143
show platform Command Output: Example 144
Troubleshooting Problems with FPD Image Upgrades 144
Power Failure or Removal of a SPA During an FPD Image Upgrade 144
Performing a SPA FPD Recovery Upgrade 145
Performing a SIP FPD Recovery Upgrade 145
Additional References 145
CHAPTER 9 Implementing NTP on the Cisco ASR 9000 Series Router 155
Prerequisites for Implementing NTP on Cisco IOS XR Software 156
Information About Implementing NTP 156
How to Implement NTP on Cisco IOS XR Software 157
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 vii
Contents
CHAPTER 10 Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router 177
Prerequisites for Implementing Physical and Virtual Terminals 178
Information About Implementing Physical and Virtual Terminals 178
Line Templates 178
Line Template Configuration Mode 178
Line Template Guidelines 179
Terminal Identification 179
vty Pools 179
How to Implement Physical and Virtual Terminals on Cisco IOS XR Software 180
Modifying Templates 180
Creating and Modifying vty Pools 182
Monitoring Terminals and Terminal Sessions 184
Configuration Examples for Implementing Physical and Virtual Terminals 185
Additional References 187
CHAPTER 11 Implementing SNMP on the Cisco ASR 9000 Series Router 189
Prerequisites for Implementing SNMP 190
Restrictions for SNMP Use on Cisco IOS XR Software 190
Information About Implementing SNMP 190
SNMP Functional Overview 190
SNMP Manager 190
SNMP Agent 190
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
viii OL-23202-05
Contents
MIB 191
SNMP Notifications 191
SNMP Versions 192
Comparison of SNMPv1, v2c, and v3 193
Security Models and Levels for SNMPv1, v2, v3 194
SNMPv3 Benefits 195
SNMPv3 Costs 196
User-Based Security Model 196
View-Based Access Control Model 197
MIB Views 197
Access Policy 197
IP Precedence and DSCP Support for SNMP 197
How to Implement SNMP on Cisco IOS XR Software 197
Configuring SNMPv3 198
Configuring SNMP Trap Notifications 200
Setting the Contact, Location, and Serial Number of the SNMP Agent 203
Defining the Maximum SNMP Agent Packet Size 204
Changing Notification Operation Values 206
Setting IP Precedence and DSCP Values 207
Configuring MIB Data to be Persistent 209
Configuring LinkUp and LinkDown Traps for a Subset of Interfaces 210
Configuration Examples for Implementing SNMP 213
Configuring SNMPv3: Examples 213
Configuring Trap Notifications: Example 216
Setting an IP Precedence Value for SNMP Traffic: Example 217
Setting an IP DSCP Value for SNMP Traffic: Example 217
Additional References 217
CHAPTER 12 Implementing CDP on the Cisco ASR 9000 Series Router 221
Prerequisites for Implementing CDP 221
Information About Implementing CDP 222
How to Implement CDP on Cisco IOS XR Software 223
Enabling CDP 223
Modifying CDP Default Settings 224
Monitoring CDP 226
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 ix
Contents
Examples 227
Configuration Examples for Implementing CDP 229
Additional References 229
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
x OL-23202-05
Preface
This book presents configuration information and examples for System Management of the Cisco IOS XR
software. The preface for Cisco ASR 9000 Series Aggregation Services Router System Management
Configuration Guide consists of the following sections:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 xi
Preface
Obtaining Documentation and Submitting a Service Request
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
xii OL-23202-05
CHAPTER 1
Configuring Profiles on the Cisco ASR 9000 Series
Router
Your router caters to different market segments on the service provider edge space. Your router is capable
of supporting a wide range of market segments and features, but to make the software more efficient, you
must configure the appropriate profiles to achieve the results you require.
• Different customers have different network architectures, and this puts different scale demands on the
router. By configuring the scale profile, you can configure your router to accommodate your needs.
• The software supports a wide range of features. To optimize performance, each feature profile enables
a subset of the total available features for a release. You must configure the appropriate profile to enable
the features that you require.
Release Modification
Release 3.9.1 The scale profile was introduced
Release 4.0.1 The scale profile configuration was moved to admin mode.
The feature profile was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 1
Configuring Profiles on the Cisco ASR 9000 Series Router
Information About Profiles
If the feature profile that you have configured on your router does not support a feature that you have configured,
warning messages are displayed on the console, and the feature does not work. A configured feature profile
takes affect only after you reload all the line cards on the router.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
2 OL-23202-05
Configuring Profiles on the Cisco ASR 9000 Series Router
Relationship Between Scale and Feature Profiles
Other pairs are not recommended. Note that the Layer 3 XL scale profile does not support video monitoring.
Note The scale profile should be configured in the administration configuration. If you previously configured
the L3 scale profile in the global configuration, the following limitations apply:
• If the scale profile is set only in the global configuration, the setting takes affect.
• Scale profile settings in the administration configuration override scale profile settings in the global
configuration.
• Cisco recommends that you configure all scale profile settings in the administration configuration
and remove the global configuration settings. For more information, refer to Removing the Scale
Profile from the Global Configuration, on page 8.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 3
Configuring Profiles on the Cisco ASR 9000 Series Router
Configuring the Scale Profile
SUMMARY STEPS
1. admin
2. configure
3. hw-module profile scale{default | l3 | l3xl}
4. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Example:
RP/0/RSP0/CPU0:router(admin)#
configure
Step 3 hw-module profile scale{default | l3 | l3xl} Specifies the scale profile for the router.
• default—efficient for deployments that require large Layer 2 MAC
Example: tables (up to 512,000 entries) and a relatively small number of Layer 3
RP/0/RSP0/CPU0:router(admin-config)#
hw-module profile routes (less than 512,000).
scale l3xl
• l3—efficient for deployments that require more Layer 3 routes (up to
Sun Nov 14 10:04:27.109 PST
In order to activate this new memory
1 million) and smaller Layer 2 MAC tables (less than 128,000 entries).
resource profile,
you must manually reboot the system. • l3xl—efficient for deployments that require a very large number of
Layer 3 routes (up to 1.3 million) and minimal Layer 2 functionality.
Note that the support for up to 1.3 million routes is split into IPv4
scaled support and IPv4/IPV6 scaled support. You can configure up
to 1.3 million IPv4 routes, or up to 1 million IPv4 routes with 128,000
IPv6 routes.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
4 OL-23202-05
Configuring Profiles on the Cisco ASR 9000 Series Router
Configuring the Feature Profile
Step 5 reload location all Reloads the entire router or all line cards in the chassis. If you are changing
the scale profile to, or from, one of the Layer 3 scale profile values, you
Example: must perform a reload of the entire system before the change is enabled.
RP/0/RSP0/CPU0:router(admin)# reload
location all
Example:
RP/0/RSP0/CPU0:router(admin)# show
running-config
hw-module profile scale
Step 7 show hw-module profile Displays the active scale profile. If the scale profile is different than the
configured profile, the line cards have not been reloaded as required for the
Example: scale profile configuration to take place.
RP/0/RSP0/CPU0:router# show hw-module
profile scale
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 5
Configuring Profiles on the Cisco ASR 9000 Series Router
Configuring the Feature Profile
SUMMARY STEPS
1. admin
2. configure
3. hw-module profile feature{default | l2}
4. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Example:
RP/0/RSP0/CPU0:router(admin)# configure
Step 3 hw-module profile feature{default | l2} Specifies the feature profile for the router.
• default—supports all features except provider backbone bridge
Example: (PBB).
RP/0/RSP0/CPU0:router(admin-config)#
hw-module profile
feature l2 • l2—supports PBB, but does not support IPv6, reverse-path
forwarding (RPF) and netflow.
Wed Dec 8 08:29:54.053 PST
L2 feature profile does NOT support the
following features:
IPv6, RPF, Netflow.
In order to activate this new memory
resource profile,
you must manually reboot the line cards.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
6 OL-23202-05
Configuring Profiles on the Cisco ASR 9000 Series Router
Configuring the Feature Profile
Step 5 reload location {all | node-id} Reloads a line card. Before the feature profile configuration becomes
effective, you must reload all line cards in the router. Use the reload
Example: location node-id command for each line card separately.
RP/0/RSP0/CPU0:router(admin)# reload
location 0/0/cpu0
Example:
RP/0/RSP0/CPU0:router(admin)# show
running-config
hw-module profile feature
Step 7 show hw-module profile feature Displays the active feature profile. If the active profile is different
from the configured profile, the line cards have not been reloaded as
Example: required for the feature profile configuration to take place.
RP/0/RSP0/CPU0:router# show hw-module
profile feature all
What to Do Next
If you see warning messages to the console indicating that the active feature profile does not match the
configured profile, you must reload the affected line card so that the configured profile matches the active
profile.
If you see warning messages to the console indicating that some features do not match the feature profile, you
should either change the feature profile configuration, or remove the non-supported features.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 7
Configuring Profiles on the Cisco ASR 9000 Series Router
Removing the Scale Profile from the Global Configuration
Note If you do not move the scale profile setting to the administration configuration, the configuration in global
configuration mode takes affect.
If the scale profile is configured in both the global configuration and administration configuration, the
setting in the administration configuration takes precedence.
SUMMARY STEPS
DETAILED STEPS
Step 2 Remove the line with the command hw-module profile scale Takes out the profile command that is configured
from the file created in the previous step. in the global configuration.
Example:
RP/0/RSP0/CPU0:router# configure
Step 4 load new-config-file Replaces the running configuration with the edited
file.
Example:
RP/0/RSP0/CPU0:router(config)# load new-config-file
Example:
RP/0/RSP0/CPU0:router(config)# commit replace
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
8 OL-23202-05
Configuring Profiles on the Cisco ASR 9000 Series Router
Additional References
Additional References
Related Documents
Cisco IOS XR master command index Cisco ASR 9000 Series Aggregation Services Router
Commands Master List
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Standard/RFC Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 9
Configuring Profiles on the Cisco ASR 9000 Series Router
Additional References
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/cisco/web/support/index.html
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
10 OL-23202-05
CHAPTER 2
Secure Domain Routers on the Cisco ASR 9000
Series Router
Secure domain routers (SDRs) are a means of dividing a single physical system into multiple logically
separated routers. Cisco ASR 9000 Series Routers are single-shelf routers that only support one SDR—the
owner SDR.
Table 4: Feature History for Secure Domain Routers on Cisco IOS XR Software
Release Modification
Release 3.7.2 This feature was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 11
Secure Domain Routers on the Cisco ASR 9000 Series Router
Information About Configuring Secure Domain Routers
Task ID Requirements
• You must be in a user group associated with a task group that includes the proper task IDs. The command
reference guides include the task IDs required for each command. If you suspect user group assignment
is preventing you from using a command, contact your AAA administrator for assistance.
Note Cisco ASR 9000 Series Routers are single-shelf routers that only support one SDR—the owner SDR.
Related Topics
SDR Access Privileges, on page 12
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
12 OL-23202-05
Secure Domain Routers on the Cisco ASR 9000 Series Router
SDR Access Privileges
• Only users with root-system privileges can access the administration EXEC and administration
configuration modes.
• Users with other access privileges can access features according to their assigned privileges for a specific
SDR.
For more information about AAA policies, see the Configuring AAA Services on the Cisco ASR 9000 Series
Router module of Cisco ASR 9000 Series Aggregation Services Router System Security Configuration Guide.
Related Topics
Root-System Users, on page 13
root-lr Users, on page 13
Other SDR Users, on page 14
Root-System Users
Users with root-system privileges have access to system-wide features and resources. The root-system user
is created during the initial boot and configuration of the router.
The root-system user has the following privileges:
• Access to administration EXEC and administration configuration commands.
• Ability to create other users with similar or lower privileges.
• Complete authority over the chassis.
• Ability to install and activate software packages for the router.
• Ability to view the following admin plane events (owner SDR logging system only):
◦Software installation operations and events.
◦System card boot operations, such as card booting notifications and errors, heartbeat-missed
notifications, and card reloads.
◦Card alphanumeric display changes.
◦Environment monitoring events and alarms.
◦Fabric control events.
◦Upgrade progress information.
root-lr Users
Users with root-lr privileges can log in to an SDR only and perform configuration tasks that are specific to
that SDR. The root-lr group has the following privileges:
• Ability to configure interfaces and protocols.
• Ability to create other users with similar or lower privileges on the SDR.
• Ability to view the resources assigned to their particular SDR.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 13
Secure Domain Routers on the Cisco ASR 9000 Series Router
Designated Shelf Controller (DSC)
• Users with root-lr privileges cannot enter administration EXEC or configuration modes.
• Users with root-lr privileges cannot add or remove nodes from an SDR.
• Users with root-lr privileges cannot create root-system users.
• The highest privilege a non-owner SDR user can have is root-lr.
Note For detailed instructions to add and activate software packages, see the Upgrading and Managing Cisco
IOS XR Software module of the Cisco ASR 9000 Series Aggregation Services Router System Management
Configuration Guide. See also the Software Package Management Commands on Cisco IOS XR Software
module of the Cisco ASR 9000 Series Aggregation Services Router System Management Command
Reference.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
14 OL-23202-05
Secure Domain Routers on the Cisco ASR 9000 Series Router
Additional References
see the Upgrading and Managing Cisco IOS XR Software module of Cisco ASR 9000 Series Aggregation
Services Router System Management Configuration Guide. See also the Software Package Management
Commands on the Cisco ASR 9000 Series Router module of Cisco ASR 9000 Series Aggregation Services
Router System Management Command Reference.
• To access install commands, you must be a member of the root-system user group with access to the
administration EXEC mode.
• Most show install commands can be used in the EXEC mode of an SDR to view the details of the
active packages for that SDR.
Related Topics
Default Configuration of the Router, on page 14
Additional References
The following sections provide references related to SDR configuration.
Related Documents
Cisco IOS XR master command reference Cisco ASR 9000 Series Aggregation Services Router
Commands Master List
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Cisco IOS XR interface configuration commands Cisco ASR 9000 Series Aggregation Services Router
Interface and Hardware Component Command
Reference
Information about AAA policies, including Configuring AAA Services on the Cisco ASR 9000
instructions to create and modify users and username Series Router module of Cisco ASR 9000 Series
access privileges Aggregation Services Router System Security
Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 15
Secure Domain Routers on the Cisco ASR 9000 Series Router
Additional References
MIBs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
16 OL-23202-05
CHAPTER 3
Upgrading and Managing Software on Cisco ASR
9000 Series Router
The Cisco IOS XR software is divided into software packages so that you can select which features run on
your router. This module describes the concepts and tasks necessary to add feature packages, upgrade the
active set of packages, roll back to a previously active set of packages, and perform other related package
management tasks.
For complete descriptions of the commands listed in this module, see Related Documents, on page 68. To
locate documentation for other commands that might appear in the course of performing a configuration
task, search online in Cisco ASR 9000 Series Aggregation Services Router Commands Master List.
Table 5: Feature History for Upgrading and Managing Cisco IOS XR Software
Release Modification
Release 3.7.2 The feature was introduced.
Release 4.0.0 A procedure to upgrade software from Cisco IOS XR Release 3.x was introduced.
See Upgrading to Cisco IOS XR Software Release 4.0, on page 54.
Support for installation commands was removed from EXEC mode.
The ability to install software on a specific SDR was removed.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 17
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Overview of Cisco IOS XR Software Packages
Note Activating a software maintenance upgrade (SMU) does not cause any earlier SMUs or the package to
which the SMU applies to be automatically deactivated.
To downgrade a package, you activate an older version of the package. When the automatic compatibility
checks have been passed, the older version is activated, and the newer version is deactivated.
Note For more information on the features and components included in each package, refer to the release notes.
Note Files with the vm extension are bootable installation files used only to replace all current Cisco IOS XR
software. These files are installed from ROM Monitor mode, which causes significant router downtime.
Cisco Systems recommends installing or upgrading software packages only using PIE files as described
in this document. For more information on vm files, see Cisco ASR 9000 Series Aggregation Services
Router ROM Monitor Guide.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
18 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
PIE Filenames and Version Numbers
SMUs are not an alternative to maintenance releases. They provide quick resolution of immediate issues. All
bugs fixed by SMUs are integrated into the maintenance releases. For information on available SMUs, contact
Cisco Technical Support, as described in Obtaining Technical Assistance in the monthly What’s New in
Cisco Product Documentation.
Note Activating a software maintenance upgrade (SMU) does not cause any earlier SMUs, or the package to
which the SMU applies, to be automatically deactivated.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 19
Upgrading and Managing Software on Cisco ASR 9000 Series Router
PIE Filenames and Version Numbers
Table 6: PIE Filenames, on page 20 shows the filenames for available PIE types.
Component Description
platform Identifies the platform for which the software package
is designed.
• The platform designation is “asr9k.”
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
20 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
PIE Filenames and Version Numbers
Component Description
package_type Identifies the type of package the file supports
(package_type applies only to single-package PIEs).
Package types include:
• mcast—Multicast package
• mgbl—Manageability package
• mpls—MPLS package
• k9sec—Security package
• diags—Diagnostics package
• fpd—Field-programmable device package
• doc—Documentation package
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 21
Upgrading and Managing Software on Cisco ASR 9000 Series Router
PIE Filenames and Version Numbers
Component Description
maintenance Identifies the maintenance release of this package.
• A maintenance release contains a collection of
bug fixes for a package.
• The maintenance release version does not have
to be identical for all software packages
operating on the router, but the major and minor
versions of the maintenance release must match
those of the package being updated.
• A maintenance release does not usually require
a router reboot.
Tip Before copying PIE files to a local storage device, use the dir command to check to see if the required
PIE files are already on the device.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
22 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Information About Package Management
Figure 1: Process to Add, Activate, and Commit Cisco IOS XR Software Packages, on page 23 illustrates
key steps in the package management process.
Figure 1: Process to Add, Activate, and Commit Cisco IOS XR Software Packages
Adding Packages
Use the install add command to unpack the package software files from a PIE file and copy them to the
boot device (usually disk0:) of your router.
From administration EXEC mode, the package software files are added to the boot device of the DSC of the
router, as well as all active and standby Route Processors (RPs) and fabric shelf controllers (SCs) installed
on the router.
Note The disk that holds the unpacked software files is also known as the boot device. By default, flash disk0:
is used as the boot device. To use an alternate storage device, such as flash disk1:, see the Router Recovery
with ROM Monitor module of Cisco ASR 9000 Series Aggregation Services Router ROM Monitor Guide.
Remember that all RSPs in a system must use the same boot device. If the boot device on the primary
RSP is flash disk0:, then the standby RSP must also have a flash disk0:.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 23
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Summary of Package Management
Activating Packages
Software packages remain inactive until activated with the install activate command.
After a package has been added to the router , use the install activate command to activate the package or
SMUs for all valid cards. Information within the package is used to verify compatibility with the target cards
and with the other active software. Actual activation is performed only after the package compatibility and
application programming interface (API) compatibility checks have been passed.
Note Activating a software maintenance upgrade (SMU) does not cause any earlier SMUs, or the package to
which the SMU applies, to be automatically deactivated.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
24 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Upgrading Packages
Note If the system is restarted before the active software set is saved with the install commit command, the
previously committed software set is used.
Related Topics
Rolling Back to a Previous Software Set, on page 65
Upgrading Packages
To upgrade a package that is currently active on your router, add and activate a newer version of the same
package (see Figure 2: Example of a Maintenance Release Package Upgrade, on page 26). The older version
of the software package is deactivated automatically. These actions are permitted only after the package
compatibility checks and API version compatibility checks have been passed.
Deactivated packages are not removed from the router. To remove inactive package files, use the install
remove command.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 25
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Downgrading Packages
Caution Upgrading or downgrading a software package can cause a process to restart or a new process to start.
Use the test option to preview the impact of the package activation.
Related Topics
Deactivating and Removing Cisco IOS XR Software Packages, on page 60
Downgrading Packages
To downgrade a software package, activate an older version on one or more cards for which that package is
already active. The newer version of the same software package is deactivated automatically. These actions
are performed only after the package compatibility checks and API version compatibility checks have been
passed.
Deactivated packages are not removed from the router. To remove inactive package files, use the install
remove command. See the Related Topics section for links to more information.
Related Topics
Deactivating and Removing Cisco IOS XR Software Packages, on page 60
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
26 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Impact of Package Activation and Deactivation
Related Topics
PIE Filenames and Version Numbers, on page 19
Obtaining and Placing Cisco IOS XR Software, on page 31
Note You must address any issues that result from the revised configuration and reapply the configuration, if
necessary.
Tip When activating and deactivating packages, use the test option to test the effects of a command without
impacting the running system. After the activation or deactivation process completes, enter the show
install log command to display the process results.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 27
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Displaying Installation Log Information
To delay the return of the CLI prompt until an installation operation is complete, enter the install command
with the synchronous keyword. For example:
install add disk1:pie-file synchronous
install activate disk0:package synchronous
To determine if an install command is currently running, enter the show install request command.
Tip By default, the install log stores up to 50 entries. Use the clear install log-history command to reset the
number of entries to any value from 0 to 255.
Examples
Install operation 1 started by user 'labuser' at 17:48:51 UTC Sat Jun 03 2009.
install add /disk1:asr9k-diags-p.pie-PD34-06.06.07
/disk1:asr9k-k9sec-p.pie-PD34-06.06.07 /disk1:asr9k-mcast-p.pie-PD34-06.06.07
/disk1:asr9k-mgbl-p.pie-PD34-06.06.07 /disk1:asr9k-mpls-p.pie-PD34-06.06.07
Install operation 1 completed successfully at 17:51:32 UTC Sat Jun 03 2009.
Install logs:
Install operation 1 'install add /disk1:asr9k-diags-p.pie-PD34-06.06.07
/disk1:asr9k-k9sec-p.pie-PD34-06.06.07 /disk1:asr9k-mcast-p.pie-PD34-06.06.07
/disk1:asr9k-mgbl-p.pie-PD34-06.06.07 /disk1:asr9k-mpls-p.pie-PD34-06.06.07'
started by user 'labuser' at 17:48:51 UTC Sat Jun 03 2009.
Info: The following packages are now available to be activated:
Info:
Info: disk0:asr9k-diags-3.7.2.1I
Info: disk0:asr9k-k9sec-3.7.2.1I
Info: disk0:asr9k-mcast-3.7.2.1I
Info: disk0:asr9k-mgbl-3.7.2.1I
Info: disk0:asr9k-mpls-3.7.2.1I
Info:
Install operation 1 completed successfully at 17:51:32 UTC Sat Jun 03 2009.
Install operation 2 started by user 'labuser' at 18:06:32 UTC Sat Jun 03 2009.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
28 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Displaying Installation Log Information
Install logs:
Install operation 2 'install activate disk0:asr9k-diags-3.7.2.1I
disk0:asr9k-k9sec-3.7.2.1I disk0:asr9k-mcast-3.7.2.1I disk0:asr9k-mgbl-3.7.2.1I
disk0:asr9k-mpls-3.7.2.1I' started by user 'labuser' at
18:06:32 UTC Sat Jun 03 2009.
Info: The changes made to software configurations will not be
Info: persistent across system reloads. Use the command 'admin install
Info: commit' to make changes persistent.
Info: Please verify that the system is consistent following the
Info: software change using the following commands:
Info: show system verify
--More--
The following example displays information for a specific install request. Use the detail keyword to display
additional information, including impact to processes and nodes impacted.
Install operation 2 started by user 'labuser' at 18:06:32 UTC Sat Jun 03 2009.
install activate disk0:asr9k-diags-3.7.2.1I disk0:asr9k-k9sec-3.7.2.1I
disk0:asr9k-mcast-3.7.2.1I disk0:asr9k-mgbl-3.7.2.1I disk0:asr9k-mpls-3.7.2.1I
Install operation 2 completed successfully at 18:07:48 UTC Sat Jun 03 2006.
Summary:
Install method: parallel
Summary of changes on nodes 0/1/SP, 0/6/SP, 0/SM0/SP, 0/SM1/SP,
0/SM2/SP, 0/SM3/SP:
Activated: asr9k-diags-3.7.2.1I
No processes affected
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 29
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Package Management Procedures
Install logs:
Install operation 2 'install activate disk0:asr9k-diags-3.7.2.1I
disk0:asr9k-k9sec-3.7.2.1I disk0:asr9k-mcast-3.7.2.1I disk0:asr9k-mgbl-3.7.2.1I
disk0:asr9k-mpls-3.7.2.1I' started by user 'labuser' at 18:06:32 UTC
Sat Jun 03 2006.
Info: The changes made to software configurations will not be
Info: persistent across system reloads. Use the command 'admin install
Info: commit' to make changes persistent.
Info: Please verify that the system is consistent following the
Info: software change using the following commands:
Info: show system verify
Info: install verify packages
Install operation 2 completed successfully at 18:07:48 UTC Sat Jun 03 2006.
Note Review the concepts about package management before performing the tasks described in this module.
Related Topics
Information About Package Management, on page 23
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
30 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Obtaining and Placing Cisco IOS XR Software
• Clear any inconsistency alarms and remove any failed configurations using the clear configuration
inconsistency command.
An inconsistency alarm is set when there is a failure to restore the configuration; this can occur during
router startup, or when a line card or route switch processor (RSP) card is inserted or removed. If an
inconsistency alarm is set, a message similar to the one in this example is displayed:
RP/0/0/CPU0:May 26 11:58:40.662 : cfgmgr-rp[130]: %MGBL-CONFIGCLI-3
BATCH_CONFIG_FAIL : 28 config(s) failed during startup. To view
failed config(s) use the command - "show configuration failed startup"
When the inconsistency alarm is set, all configuration commit operations fail until the alarm is cleared.
• Although more than one version of a software package can be added to a storage device, only one version
of a package can be active for any card.
• Some packages require the activation or deactivation of other packages.
• The package being activated must be compatible with the current active software set.
Activation is performed only after the package compatibility checks and API version compatibility checks
have been passed. If a conflict is found, an on-screen error message is displayed.
While a software package is being activated, other requests are not allowed to run on any of the impacted
nodes. Package activation is completed when a message similar to this one appears:
Install operation 2 completed successfully at 20:30:29 UTC Mon Nov 14 2005.
Each CLI install request is assigned a request ID, which can be used later to review the events.
The boot device is the local disk on the DSC where Cisco IOS XR software is added and activated. PIE files
should not be stored on this boot device. The default boot device is disk0:. All PIE files should be stored on
flash disk1:.
Transferring Installation Files from a Network File Server to a Local Storage Device
If the Cisco IOS XR software PIE files are located on a remote TFTP, FTP, SFTP, or rcp server, you can copy
the files to a local storage device such as disk1:. When the PIE files are located on a local storage device, the
software packages can be added and activated on the router from that storage device. Table 8: Download
Protocols Supported by Cisco IOS XR Software, on page 32 describes the supported server protocols, and
the CLI syntax used copy files from each server type to the local storage device.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 31
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Obtaining and Placing Cisco IOS XR Software
Tip Cisco IOS XR software PIE files can also be added to the router boot device directly from the remote
server.
Note Consult your system administrator for the location and availability of your network server.
Name Description
Trivial File Transfer Protocol TFTP allows files to be transferred from one computer
to another over a network, usually without the use of
client authentication (for example, username and
password). It is a simplified version of FTP.
Note Some Cisco IOS XR software images may
be larger than 32 MB, and the TFTP services
provided by some vendors may not support
a file this large. If you do not have access to
a TFTP server that supports files larger than
32 MB, download the software image using
FTP or rcp.
File Transfer Protocol FTP is part of the TCP/IP protocol stack and requires
a username and password.
Remote Copy Protocol The rcp protocol uses TCP to ensure the reliable
delivery of data, and rcp downloads require a
usernames.
SSH File Transfer Protocol SFTP is part of the SSHv2 feature in the Security
package and provides for secure file transfers. For
more information, see the Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide.
The router commands listed in Table 9: Commands for Copying Package Files to the Router, on page 33
show how to copy package files to the router using three types of file transfer protocols.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
32 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Obtaining and Placing Cisco IOS XR Software
RP/0/RSP0/CPU0:router# copy
tftp://10.1.1.1/images/comp-
asr9k-mini.pie disk1:
RP/0/RSP0/CPU0:router# copy
ftp://john:secret@10.1.1.1/images/
comp-asr9k-mini.pie disk1:
RP/0/RSP0/CPU0:router# copy
rcp://john@10.1.1.1/images/
comp-asr9k-mini.pie disk1:
Table 10: Command Variables for Copying and Adding Packages from a Network Server, on page 33
describes the command variables for copying packages from a network server.
Table 10: Command Variables for Copying and Adding Packages from a Network Server
Variable Description
hostname_or_ipaddress Host name or IP address of the server that stores the
source file.
username Required for FTP and rcp only and must be a valid
username on the FTP or rcp server.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 33
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
Variable Description
directory-path The specified directory should be a directory under
the home directory of the user. In the rcp and FTP
examples in Table 9: Commands for Copying Package
Files to the Router, on page 33, the file being
downloaded is in a subdirectory called “images” in
the home directory of the user “john.”
Note For FTP and rcp services, directory-path
is the directory relative to the username
home directory. If you want to specify an
absolute path for the directory, you must add
a "/" following the server address.
When the installation files have been transferred to a network file server or the router, you are ready to activate
or upgrade the software.
Note Files with the vm extension are bootable installation files used only to replace all current Cisco IOS XR
software. These files are installed from ROM monitor mode and cause significant router downtime. We
recommend installing or upgrading software packages using PIE files only, as described in this chapter.
See Cisco ASR 9000 Series Aggregation Services Router ROM Monitor Guide for information on installing
from vm files.
Related Topics
Adding and Activating Packages, on page 44
Overview of Cisco IOS XR Software Packages, on page 18
Note Activation is performed only after the automatic package compatibility and API version compatibility
checks have been passed. If a conflict is found, an on-screen error message is displayed.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
34 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
• Review the release notes for important information related to that release and to help determine the
package compatibility with your router configuration.
• Verify that the system is stable and prepared for the software changes.
SUMMARY STEPS
1. admin
2. show diag
3. Update the ROMMON software if necessary.
4. show install active
5. show install pie-info device:package [ brief | detail | verbose ]
6. verify packages
7. exit
8. (Optional) show system verify start
9. (Optional) show system verify [ detail | report ]
10. show clock
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 2 show diag Displays the ROMMON software version for all cards in the system. Verify that
the correct ROMMON software version is installed before upgrading a
Example: Cisco IOS XR software package.
RP/0/RSP0/CPU0:router(admin)# Note See Related Topics for information regarding the required ROM Monitor
show diag (ROMMON) software version.
Step 3 Update the ROMMON software if Updates the ROMMON software. For instructions, see Cisco ASR 9000 Series
necessary. Aggregation Services Router ROM Monitor Guide.
Step 4 show install active Displays the active software on the router for the owner SDR. Use this command
to determine what software should be added, upgraded or downgraded on the
Example: router, and to compare to the active software report after installation operations
are complete.
RP/0/RSP0/CPU0:router(admin)#
show install active Note You can also display the active packages for a specific node, and view
results in detailed or summary mode. See the Software Package
Management Commands on the Cisco ASR 9000 Series Router module
of Cisco ASR 9000 Series Aggregation Services Router System
Management Command Reference for more information.
Step 5 show install pie-info device:package Displays information imbedded in the package. The following keywords provide
[ brief | detail | verbose ] three levels of information:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 35
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
Note Always review the release notes for the software package for important
information related to that release and to help determine the package
compatibility with your router configuration.
Step 6 verify packages Verifies that there are no corrupted software files. The consistency of a previously
installed software set is verified against the package file from which it originated.
Example: This command can be used as a debugging tool to verify the validity of the files
that constitute the packages, to determine if there are any corrupted files. This
RP/0/RSP0/CPU0:router(admin)# command also checks for corruptions of installation state files and MBI image
install verify packages
files. This command is particularly useful when issued after the activation of a
package or upgrading the Cisco IOS XR software to a major release.
Note The install verify packages command can take up to two minutes per
package to process.
Step 7 exit Exits administration EXEC mode and returns to EXEC mode.
Example:
RP/0/RSP0/CPU0:router(admin)#
exit
RP/0/RSP0/CPU0:router# show • detail—Displays additional information at the card and processor level,
system verify including actual numbers.
• report—Displays the same information as the default show system verify
command
Note Although most of the output should display the status “OK,” some
processes may show other output, such as “Warning.” This does not
specifically indicate a problem. Contact your Cisco technical support
representative for more information on the output of this command.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
36 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
Related Topics
Activation and Deactivation Prerequisites, on page 30
Examples
Note For instructions to upgrade the ROM Monitor software, see Cisco ASR 9000 Series Aggregation Services
Router ROM Monitor Guide.
RP/0/RSP0/CPU0:router# admin
RP/0/RSP0/CPU0:router(admin)# show diag
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 37
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
LIU : V1.0
MLANSwitch : V0.0
EOBCSwitch : V2.0
CBC (active partition) : v1.2
CBC (inactive partition) : v1.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
38 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
UDI_VID: V1D
HwRev: V0.0
New Deviation Number: 0
CLEI: IPU3AE0CAA
Board State : IOS XR RUN
PLD: Motherboard: N/A, Processor: 0x8004 (rev: 2.2), Power: N/A
ROMMON: Version 1.0(20081208:174521) [ASR9K ROMMON]
Board FPGA/CPLD/ASIC Hardware Revision:
NP0 : V3.194
NP1 : V3.194
NP2 : V3.194
NP3 : V3.194
XbarInterface : V18.4
Bridge0 : V0.38
Bridge1 : V0.38
CPUCtrl : V0.15
USB : V77.20
PortCtrl : V0.10
PHYCtrl : V0.7
PHY0 : V0.16
PHY1 : V0.16
PHY2 : V0.16
PHY3 : V0.16
PHY4 : V0.16
PHY5 : V0.16
PHY6 : V0.16
PHY7 : V0.16
8 Port Ten Gigabit Ethernet Daughter board : V0.0
CBC (active partition) : v2.2
CBC (inactive partition) : v2.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 39
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
CLEI: ACACACACAC
PLD: Motherboard: N/A, Processor: N/A, Power: N/A
ROMMON:
Board FPGA/CPLD/ASIC Hardware Revision:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
40 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
Note A software activation is performed only after the automatic package compatibility and API version
compatibility checks have been passed. If a conflict is found, an on-screen error message is displayed.
asr9k-mgbl-3.8.0
asr9k-mgbl V3.8.0[00] Manageability Package
Vendor : Cisco Systems
Desc : Manageability Package
Build : Built on Wed May 10 08:04:58 UTC 2006
Source : By edde-bld1 in /vws/aga/production/3.8.0/asr9k/workspace for c28
Card(s): RP, DRP, DRPSC
Restart information:
Default:
parallel impacted processes restart
Components in package asr9k-mgbl-3.8.0, package asr9k-mgbl:
manageability-cwi V[r33x/2] Craft Web Interface related binaries ae
asr9k-feature-ipsla V[r33x/1] IPSLA time stamping feature
doc-asr9k-mgbl V[r33x/2] Contains the man page documentation for asr9ks
--More--
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 41
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
42 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Preparing for Software Installation Operations
The following example shows output from running the show system verify command.
Note Although most of the output should display the status “OK,” some processes may show other output, such
as “Warning.” This does not specifically indicate a problem. Contact your Cisco technical support
representative for more information on the output of this command.
- Verifying LC Status
- Verified LC Status : [OK]
- Verifying QNET Status
Unable to get current LC status info
- Verified QNET Status : [FAIL]
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 43
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
When you need to add and activate two or more of the preceding package types, you should add and activate
them in the order listed above.
Note When adding and activating two or more packages, optional packages can be activated together. Also, if
the operation is a reload, multiple packages can be activated together. For example, five reload SMUs can
be activated together or the Cisco IOS XR Unicast Routing Core Bundle plus the SMUs and optional
packages can be activated together.
For a description of the software management process, see the Related Topics section.
These instructions are also used to downgrade software packages.
Note By default, installation operations are performed asynchronously: the CLI prompt is returned before the
operation is complete, allowing the operator to continue work while the installation is completed in the
background. Use the synchronous keyword at the end of install commands to delay the return of the CLI
prompt until an installation operation is complete. See the Related Topics section for more information.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
44 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
• Verify that the ROMMON version is correct. For instructions on upgrading ROM Monitor, see
Cisco ASR 9000 Series Aggregation Services Router ROM Monitor Guide.
• All packages to be upgraded or added are present on a local storage device (for example a flash disk),
or a network file server.
• Prerequisites for the activation of packages are met as described in the Prerequisites section.
• Complete the procedures described in the Preparing for Software Installation Operations, on page 34
section.
Note To use the automatic FPD upgrade feature, the fpd auto-upgrade command must be enabled in
administration configuration mode.
SUMMARY STEPS
DETAILED STEPS
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 45
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
RP/0/RSP0/CPU0:router# dir disk1: Note Only PIE files can be added and activated using this
procedure.
Step 3 admin Enters administration EXEC mode.
Note Some show install commands can be entered in
Example: EXEC mode on an SDR.
RP/0/RSP0/CPU0:router# admin
Step 4 install add [source source-path | tar] file [activate ] Unpacks a PIE file from local storage device or network server
and adds the package files to the boot device of the router. The
Example: boot device is located on the DSC.
RP/0/RSP0/CPU0:router(admin)# install add • If the source keyword is used, the source-path specifies
disk1:asr9k-mgbl.pie-3.8.30.1i the directory path that is used for multiple filenames in
the same directory.
or
• If the tar keyword is used, all PIE files contained in the
RP/0/RSP0/CPU0:router(admin)# install add source tar file are unpacked.
tftp://10.1.1.1/images/ asr9k-k9sec-p.pie
asr9k-mpls-p.pie asr9k-mcast-p.pie
or The file argument can take any of these formats:
• device filename
RP/0/RSP0/CPU0:router(admin)# install add
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
46 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
Step 6 install activate {id add-id | device package} [test] [location Activates a package that was added to the router. (Skip this
node-id] [pause sw-change] [prompt-level {all | none}] step if the package was activated earlier with the install add
[auto-abort-timer time command.)
• id add-id—Specifies the package using the operation ID
Example: of the install add operation in which you added the
RP/0/RSP0/CPU0:router(admin)# install activate
disk0:asr9k-mini-px-4.3.99 package. The operation ID is provided in the output of
the install add command. You can also use show install
log to display installation operation IDs.
• device:package—Specifies the package by name. Replace
the device:package argument with the name of the boot
device and inactive package, which can be displayed as
described in the previous step.
Note Press ? after a partial package name to display
all possible matches available for activation. If
there is only one match, press [TAB] to fill in
the rest of the package name.
• location node-id—Activates a package for a specific card
(node). To display a list of node IDs for the entire system,
enter the show platform command in administration
EXEC mode. A package cannot be activated on a single
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 47
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
48 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
Example:
RP/0/RSP0/CPU0:router# admin
RP/0/RSP0/CPU0:router# dir disk1: For more information, see the Related Topics section.
Step 14 Upgrade the field-programmable device (FPD) software, if Whenever a Cisco IOS XR software image that supports SPAs
necessary. and SIPs is released, a companion SPA or SIP FPD image is
bundled with the Cisco IOS XR software release. Generally,
the FPD image is not automatically upgraded. You must
manually upgrade the FPD image running on the SPA or SIP
when you upgrade the Cisco IOS XR software image. FPD
versions must be compatible with the Cisco IOS XR software
that is running on the router.
Note If you have enabled the fpd auto-upgrade command
and add and activate the FPD PIE together with the
software installation PIE, the FPD image is
automatically upgraded before the router is rebooted.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 49
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
Related Topics
Obtaining and Placing Cisco IOS XR Software, on page 31
Activation and Deactivation Prerequisites, on page 30
Preparing for Software Installation Operations, on page 34
Information About Package Management, on page 23
Downgrading Packages, on page 26
PIE Filenames and Version Numbers, on page 19
Committing the Active Package Set, on page 52
Examples
The following example shows how to add the contents of a PIE file on a TFTP server to the boot device:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
50 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Adding and Activating Packages
Install operation 5 '(admin) install activate id 4' started by user 'lab' via
CLI at 18:20:17 UTC Thu Jan 03 2009.
Info: This operation will activate the following package:
Info: disk0:asr9k-mpls-3.7.2
Info: Install Method: Parallel Process Restart
The install operation will continue asynchronously.
Info: The changes made to software configurations will not be persistent
Info: across system reloads. Use the command '(admin) install commit' to
Info: make changes persistent.
Info: Please verify that the system is consistent following the software
Info: change using the following commands:
Info: show system verify
Info: install verify packages
Install operation 5 completed successfully at 18:21:30 UTC Thu Jan 03 2009.
Adding and Activating a Package from an FTP File Server with One Command: Example
To add and activate a package with a single command, enter the install add command with the activate
keyword. In the following example, the Manageability PIE located on disk1: is verified, unpacked, and added
to the boot device disk0. Because this operation is performed in administration EXEC mode, the package is
activated for all SDRs in the system.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 51
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Committing the Active Package Set
Tip Before committing a package set, verify that the SDR is operating correctly and is forwarding packets as
expected.
SUMMARY STEPS
1. admin
2. install commit
3. show install committed [detail | summary | verbose] [location node-id]
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
52 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Committing the Active Package Set
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 2 install commit Commits the current set of packages on the router so
that these packages are used if the router is restarted.
Example:
RP/0/RSP0/CPU0:router(admin)# install commit
Step 3 show install committed [detail | summary | verbose] Displays which packages are committed.
[location node-id]
Example:
RP/0/RSP0/CPU0:router(admin)# show install committed
Examples
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 53
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Upgrading to Cisco IOS XR Software Release 4.0
As with the show install active command, the show install committed command may display a composite
package that represents all packages in the Cisco IOS XR Unicast Routing Core Bundle.
SUMMARY STEPS
1. admin
2. install add tftp:// hostname_or_ipaddress / directory-path / mandatory-bundle-pie
3. install add tftp:// hostname_or_ipaddress / directory-path / asr9k-upgrade-p.pie
4. install activate device:mandatory-bundle-pie device:upgrade-package
5. install deactivate device:upgrade-package
6. (Optional) install commit
7. install remove device:upgrade-package
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
54 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Upgrading to Cisco IOS XR Software Release 4.0
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 2 install add tftp:// hostname_or_ipaddress / directory-path / Unpacks the mandatory bundle PIE file from a
mandatory-bundle-pie network server and adds the package file to the boot
device of the router.
Example: Note Refer to the standard procedure to add and
RP/0/RSP0/CPU0:router(admin)# install add activate packages to see other options of
tftp://10.1.1.1/auto/tftpboot/usr/400/asr9k-mini-p.pie PIE file locations and a description of the
various arguments for the install add
command.
Step 3 install add tftp:// hostname_or_ipaddress / directory-path / Unpacks the upgrade PIE file from a network server
asr9k-upgrade-p.pie and adds the package file to the boot device of the
router.
Example:
RP/0/RSP0/CPU0:router(admin)# install add
tftp://10.1.1.1/auto/tftpboot/usr/400/asr9k-upgrade-p.pie
Step 4 install activate device:mandatory-bundle-pie Activates the package that was added to the router
device:upgrade-package together with the upgrade package.
Note The bundle of mandatory packages and the
Example: upgrade bundle are activated together to
RP/0/RSP0/CPU0:router(admin)# install activate perform the successful upgrade from release
disk0:asr9k-mini-p-4.0.0 disk0:asr9k-upgrade-p-4.0.0 3.x to 4.x.
Step 5 install deactivate device:upgrade-package Deactivates the upgrade package on the router. For
specific information regarding the deactivation and
Example: removal of software packages, refer to the general
procedure.
RP/0/RSP0/CPU0:router(admin)# install deactivate
disk0:asr9k-upgrade-p-4.0.0
Example:
RP/0/RSP0/CPU0:router(admin)# install remove
disk0:asr9k-upgrade-p-4.0.0
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 55
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Upgrading to Cisco IOS XR Software Release 4.0
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
56 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Upgrading to Cisco IOS XR Software Release 4.0
Info: started by user 'lab' via CLI at 05:23:24 UTC Fri Jul 09 2010.\ 1% complete:
Info: The operation can still be aborted (ctrl-c for options)
Info: This operation will reload the following nodes in parallel:
Info: 0/RP1/CPU0 (HRP) (SDR: Owner)
Info: 0/SM0/SP (Fabric-SP) (Admin Resource)Proceed with this install operation (y/n)?
[y]|
Info: 1% complete: The operation can still be aborted (ctrl-c for options)
Info: Install Method: Parallel Reload/ 1% complete: The operation can still be aborted
(ctrl-c for options)
Info: The install operation will continue asynchronously.
RP/0/RSP0/CPU0:router(admin)#SP/0/SM0/SP:
Jul 9 05:36:41.152 : insthelper[62]: %INSTALL-INSTHELPER-6-RELOAD_NODE_INFO :
Info: As part of install operation 7 this node (0/SM0/SP) will now reload.
Info: The changes made to software configurations will not be persistent
Info: across system reloads. Use the command '(admin) install commit' to
Info: make changes persistent.
Info: Please verify that the system is consistent following the software
RP/0/RP1/CPU0:Jul 9 05:36:43.962 : instdir[235]:
%INSTALL-INSTMGR-6-INSTALL_OPERATION_COMPLETED_SUCCESSFULLY :
Info: Install operation 7 completed successfully
Info: change using the following commands:
Info: show system verify
Info: install verify packages
Info: Install operation 7 completed successfully at 05:36:43 UTC Fri Jul 09 2010.
rebooting .........................Initializing DDR SDRAM...found 4096 MB
Initializing ECC on bank 0Initializing ECC on bank 1
Initializing ECC on bank 2
Initializing ECC on bank 3
Turning off data cache, using DDR for first time
Initializing NVRAM...Testing a portion of DDR SDRAM ...done
Reading ID EEPROMs ............................
Initializing SQUID ...
Initializing PCI ...PCI0 device[1]: Vendor ID 0x10eePCI0 device[1]: Device ID 0x300ePCI1
device[1]:
Device ID 0x1100PCI1 device[1]: Vendor ID 0x1013PCI1 device[2]: Device ID 0x680PCI1 device[2]:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 57
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Upgrading to Cisco IOS XR Software Release 4.0
- Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph(c) (1) (ii) of the Rights in Technical
Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco IOS XR Software for the Cisco XR Router, Version 4.0.0 Copyright (c) 2010 by Cisco
Systems, Inc.
Jul 09 05:39:21.334 : Install (Node Preparation): Booting with software activated by previous
install
operation,errno=2
RP/0/RP1/CPU0Jul 9 05:44:45.941: syslogd_helper: [89]: dsc_event_handler: Got SysMgr dSC
event : 1
RP/0/RP1/CPU0:Jul 9 05:45:11.354 : shelfmgr[306]: %PLATFORM-SHELFMGR-3-POWERDOWN_RESET :
Node 0/2/SP is powered off due to admin power off request ios con0/RP1/CPU0 is now available
Press RETURN to get started.
RP/0/RP1/CPU0:Jul 9 05:45:27.453 : instdir[216]:
%INSTALL-INSTMGR-4-ACTIVE_SOFTWARE_COMMITTED_INFO :
The currently active software is not committed. If the system reboots then the committed
software will be used.
Use 'install commit' to commit the active software. SYSTEM CONFIGURATION IN PROCESS
The startup configuration for this device is presently loading.
This may take a few minutes. You will be notified upon completion.
Please do not attempt to reconfigure the device until this process is complete.
User Access VerificationUsername: labPassword:
RP/0/RSP0/CPU0:router# admin
Fri Jul 9 05:45:55.941 UTC
RP/0/RSP0/CPU0:router(admin)# show platform
RP/0/RP1/CPU0:ios(admin)#
RP/0/RP1/CPU0:Jul 9 05:46:08.411 : instdir_lr[217]:
%INSTALL-INSTMGR-4-ACTIVE_SOFTWARE_COMMITTED_INFO :
The currently active software is not committed. If the system reboots then the committed
software will be used.
Use 'install commit' to commit the active software.
RP/0/RP1/CPU0:Jul 9 05:50:40.918 : placed[283]: LR-PLANE-READY DECLARATIONSYSTEM
CONFIGURATION COMPLETED
RP/0/RP1/CPU0:Jul 9 05:50:57.293 : ifmgr[213]: %PKT_INFRA-LINK-3-UPDOWN :
Interface MgmtEth0/RP1/CPU0/0, changed state to Down
RP/0/RP1/CPU0:Jul 9 05:50:57.313 : ifmgr[213]: %PKT_INFRA-LINK-3-UPDOWN :
Interface MgmtEth0/RP1/CPU0/0, changed state to Up
RP/0/RSP0/CPU0:router(admin)# show platform
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
58 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Upgrading to Cisco IOS XR Software Release 4.0
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 59
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Deactivating and Removing Cisco IOS XR Software Packages
Related Topics
Activation and Deactivation Prerequisites, on page 30
Adding and Activating Packages, on page 44
Deactivating and Removing Cisco IOS XR Software Packages, on page 60
Note Activating a software maintenance upgrade (SMU) does not cause any earlier SMUs or
the package to which the SMU applies to be automatically deactivated.
• When an earlier version of a package is activated, the newer version is deactivated automatically. See
Related Topics for more information.
• A specific package is deactivated using the install deactivate command. This command turns off the
package features for a card or card type.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
60 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Deactivating and Removing Cisco IOS XR Software Packages
• FPD versions must be compatible with the Cisco IOS XR software that is running on the router; if an
incompatibility exists between an FPD version and the Cisco IOS XR software, the device with the
field-programmable gate array (FPGA) may not operate properly until the incompatibility is resolved.
For information on FPDs, including instructions to upgrade FPD images, see the Upgrading FPD Cisco
IOS XR Software module of Cisco ASR 9000 Series Aggregation Services Router Interface and Hardware
Component Configuration Guide.
SUMMARY STEPS
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 3 install deactivate { id add-id | device : Deactivates a package on all SDRs a router.
package } [ location node-id ][ test ] [
pause sw-change ] • To deactivate all packages that were added in one or more specific install
add operations, or specify packages by name, use the id add-id keyword
and argument. The operation ID of an install add operation is indicated
Example: in the syslog displayed during the operation and in the output of the
RP/0/RSP0/CPU0:router(admin)# install
deactivate show install log command.
disk0:asr9k-diags-3.7.2
• Use the location node-id keyword and argument to deactivate the
package for a specific node, if supported.
• Use the pause sw-change keywords to pause the operation after
preparatory checks and before the configuration is locked for the actual
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 61
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Deactivating and Removing Cisco IOS XR Software Packages
Note Press ? after a partial package name to display all possible matches
available for deactivation. If there is only one match, press [TAB]
to fill in the rest of the package name.
When a package is deactivated for an SDR from administration
EXEC mode, a notification message appears on the console for that
SDR, with information on the impact of the deactivation.
Step 4 show install inactive summary (Optional)
Displays the inactive packages on the router.
Example:
RP/0/RSP0/CPU0:router(admin)# show
install inactive summary
Example:
RP/0/RSP0/CPU0:router(admin)# exit
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
62 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Deactivating and Removing Cisco IOS XR Software Packages
Note Although most of the output should display the status “OK,” some
processes may show other output, such as “Warning.” This does not
specifically indicate a problem. Contact your Cisco technical support
representative for more information on the output of this command.
Step 9 admin Enters administration EXEC mode.
Example:
RP/0/RSP0/CPU0:router# admin
Related Topics
Adding and Activating Packages, on page 44
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 63
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Deactivating and Removing Cisco IOS XR Software Packages
Examples
In the following examples, a package is deactivated from the router. The changes are committed and the
inactive package is removed from the router.
Default Profile:
SDRs:
Owner
Inactive Packages:
disk0:asr9k-diags-3.7.2
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
64 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Rolling Back to a Previous Software Set
Note Rollback operations can be performed by running the command in administration EXEC or EXEC mode.
RP/0/RSP0/CPU0:router# admin
RP/0/RSP0/CPU0:router(admin)# show install rollback ?
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 65
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Displaying the Active Packages Associated with a Rollback Point
In this example, the rollback points are 0 and 2. The rollback point with the highest number is the current
software point. For example, if the last installation operation was operation 3 (activating the MPLS package)
then the highest rollback point is 3, which is the same as the current software (MPLS package activated).
To easily identify specific rollback points, you can assign a label or description to a rollback point using the
install label command.
You can enter the command in either administration EXEC mode or EXEC mode.
You can enter the command in either administration EXEC mode or EXEC mode.
Note For more information on the command options, see the Software Package Management Commands on
Cisco IOS XR Software module of Cisco ASR 9000 Series Aggregation Services Router System
Management Command Reference.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
66 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Rolling Back to a Specific Rollback Point
In the following example, the system is rolled back to noncommitted rollback point 8:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 67
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Additional References
Additional References
The following sections provide references related to software package management on Cisco IOS XR software.
Related Documents
Cisco IOS XR getting started material Cisco ASR 9000 Series Aggregation Services Router
Getting Started Guide
Cisco IOS XR master command index Cisco ASR 9000 Series Aggregation Services Router
Commands Master List
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
68 OL-23202-05
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Additional References
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 69
Upgrading and Managing Software on Cisco ASR 9000 Series Router
Additional References
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
70 OL-23202-05
CHAPTER 4
Configuring Disk Mirroring on the Cisco ASR 9000
Series Router
This module describes the process to configure disk mirroring in Cisco IOS XR software.
For complete descriptions of the commands listed in this module, see Related Documents, on page 81. To
locate documentation for other commands that might appear in the course of performing a configuration
task, search online in Cisco ASR 9000 Series Aggregation Services Router Commands Master List.
Table 11: Feature History for Disk Mirroring for Cisco IOS XR Software
Release Modification
Release 3.7.2 Disk mirroring was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 71
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Information About Disk Mirroring
• The secondary storage device must be the same size or larger than the designated primary storage device.
• The secondary storage device must be partitioned.
Note The primary partition on the secondary storage device must be large enough to contain all data on the
primary boot device. This can be an issue if the primary boot device has not yet been partitioned. For
example, in the situation where both the primary boot device and the secondary storage device are 1 GB
in size, the primary boot device contains 950 MB of data, and the secondary storage device is already
partitioned to 800 MB in the primary partition and 200 MB in the secondary partition. In such a case, the
950 MB of data from the primary boot device does not fit on the secondary storage device because of the
partition. Such a configuration is rejected and an error is displayed. You need to replace the secondary
storage device with a higher capacity device. For information about disk partition sizes, see Related Topics.
Note Although compactflash: can be used as the secondary device on a Performance Route Processor (PRP–2),
there is an issue with the ROM Monitor not being able to boot the minimum boot image (MBI) from the
secondary device if the device is not disk0: or disk1:. In such a situation, you would need to go into
ROMMON mode and boot the PRP-2 manually using the MBI on the compactflash:.
Related Topics
Information About Disk Mirroring, on page 72
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
72 OL-23202-05
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
How to Enable Disk Mirroring
SUMMARY STEPS
DETAILED STEPS
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 73
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Enabling Disk Mirroring
Example:
RP/0/RSP0/CPU0:router# configure
Step 4 mirror location node-id Primary-device Enables disk mirroring of the primary-device to the secondary-device
Secondary-device .
If the primary boot device is not partitioned, the following occurs:
Example:
RP/0/RSP0/CPU0:router(config)# mirror • The contents of the primary device are replicated to the secondary
location 0/ rsp0/cpu0 disk0:disk1: device
• Control of the mirroring server switches to the secondary storage
device.
• The primary device is partitioned.
• Data is replicated back to the primary boot device.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
74 OL-23202-05
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Replacing the Secondary Mirroring Device
Step 7 mirror verify location node-id Verifies disk synchronization for disk mirroring on an RSP node.
Example:
RP/0/RSP0/CPU0:router# mirror verify
location 0/ rsp0/cpu0
SUMMARY STEPS
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# mirror pause
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 75
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Replacing the Primary Mirroring Device
Example:
RP/0/RSP0/CPU0:router# unmount disk1:
Example:
RP/0/RSP0/CPU0:router# format disk1: partition
Step 7 show media [location node-id] Verifies that the device is formatted. The output should
display the device that you formatted.
Example:
RP/0/RSP0/CPU0:router# show media
Example:
RP/0/RSP0/CPU0:router# mirror resume
Step 9 show mirror [location node-id] Verifies that mirroring has restarted. In the output, the
Current Mirroring State should be Syncing.
Example: It can take 15 to 30 minutes for the mirroring process to
RP/0/RSP0/CPU0:router# show mirror complete. The exact time depends on the number of
packages or files on the boot device. When the mirroring
is complete, the Current Mirroring State should be
Redundant.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
76 OL-23202-05
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Replacing the Primary Mirroring Device
SUMMARY STEPS
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Step 3 mirror location node-id Primary-device Swaps the device roles such that the primary mirroring device now
Secondary-device becomes the secondary device and the secondary mirroring device
becomes the primary device.
Example:
RP/0/RSP0/CPU0:router(config)# mirror
location 0/
RSP0
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 77
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Replacing the Primary Mirroring Device
/CPU0 disk1:disk0:
Step 5 show mirror [location node-id] Verifies that the primary device is now the secondary device and
vice versa. In the output, if disk0: was the primary disk that you
Example: want to replace, it should now be listed as the secondary device.
Example:
RP/0/RSP0/CPU0:router# mirror pause
Step 7 show mirror Verifies that mirroring has paused. In the output, the Current
Mirroring State should be paused.
Example:
RP/0/RSP0/CPU0:router# show mirror
Step 8 unmount secondary-device [location node-id] Unmounts the secondary device which is the device that you want
to replace. Initially, this was the primary device.
Example:
RP/0/RSP0/CPU0:router# unmount disk1:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
78 OL-23202-05
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Replacing the Primary Mirroring Device
Example:
RP/0/RSP0/CPU0:router# mirror resume
Step 13 show mirror [location node-id] Verifies that mirroring has restarted. In the output, the Current
Mirroring State should be Syncing.
Example: It can take 15 to 30 minutes for the mirroring process to complete.
RP/0/RSP0/CPU0:router# show mirror The exact time depends on the number of packages or files on the
boot device. When the mirroring is complete, the Current Mirroring
State should be Redundant.
Example:
RP/0/RSP0/CPU0:router# configure
Step 15 mirror location node-id Primary-device Swaps the device roles back so that the newly inserted device
Secondary-device becomes the primary device.
Example:
RP/0/RSP0/CPU0:router(config)# mirror
location 0/
RSP0
/CPU0 disk0:disk1:
Step 16 show mirror [location node-id] Verifies that the new device is now the primary device.
Example:
RP/0/RSP0/CPU0:router# show mirror
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 79
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Configuration Examples for Enabling Disk Mirroring
This operation will destroy all data on "disk1:" and partition device.
Continue? [confirm] y
configure
mirror location 0/0/cpu0 disk0:disk1:
commit
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
80 OL-23202-05
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Additional References
Additional References
The following sections provide references related to disk mirroring configuration.
Related Documents
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Cisco IOS XR command master list Cisco ASR 9000 Series Aggregation Services Router
Commands Master List
Cisco IOS XR boot commands Boot Commands on the Cisco ASR 9000 Series
Router module of Cisco ASR 9000 Series
Aggregation Services Router System Management
Command Reference
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 81
Configuring Disk Mirroring on the Cisco ASR 9000 Series Router
Additional References
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
82 OL-23202-05
CHAPTER 5
Software Entitlement on the Cisco ASR 9000
Series Router
Cisco IOS XR software contains all the supported features for a given release. Before the introduction of
software entitlement on Cisco IOS XR software, you could freely activate all available software packages
on your network devices and could enable all the bundled features. To enable the pay-as-you-grow
model—where you pay only for the features that you need today—but can upgrade when necessary while
keeping your investment safe, software entitlement has been introduced. Licensing enables you to purchase
individual software features and upgrade hardware capacity in a safe and reliable way.
For complete descriptions of the commands listed in this module, see Related Documents, on page 93. To
locate documentation for other commands that might appear in the course of performing a configuration
task, search online in Cisco ASR 9000 Series Aggregation Services Router Commands Master List.
Release Modification
Release 3.9.0 The software entitlement feature was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 83
Software Entitlement on the Cisco ASR 9000 Series Router
Information About Cisco IOS XR Software Entitlement
G.709
If a G.709 license is available, G.709 can be enabled on 10-Gigabit Ethernet interfaces on the following
line cards:
• 2-port 10 Gigabit Ethernet / 20-port Gigabit Ethernet line card
• 8-port 10 Gigabit Ethernet line card
• 24-port 10 Gigabit Ethernet line card
• 36-port 10 Gigabit Ethernet line card
• 4-port 10 Gigabit Ethernet modular port adapter
• 2-port 10 Gigabit Ethernet modular port adapter
Refer to the Configuring Dense Wavelength Division Multiplexing Controllers on the Cisco ASR 9000
Series Router module in Cisco ASR 9000 Series Aggregation Services Router Interface and Hardware
Component Configuration Guide.
Video Monitoring
Video monitoring can be enabled for the Cisco ASR 9000 chassis by using a video monitoring license.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
84 OL-23202-05
Software Entitlement on the Cisco ASR 9000 Series Router
Types of Licenses
Types of Licenses
The following types of licenses are currently defined:
• Permanent licenses—Licenses that enable a designated feature permanently, as long as the license resides
on the router.
• Evaluation or metered licenses—Licenses that enable a feature for a limited period of time. The feature
stops working immediately on license expiry. If multiple evaluation licenses are added for the same
feature, the expiry period is counted from when the first evaluation license is added to the router.
Chassis-Locked Licenses
Licenses are locked to a unique device identifier (UDI). The UDI is comprised of the chassis serial number,
along with an additional identifier. The complete set of UDI information can be displayed using the show
license udi command. The license manager parses the user-provided license and verifies that it is valid for
the chassis it is running on and determines if the license is being readded.
Slot-Based Licenses
Feature licenses are allocated to router slots and not cards. Therefore, if a card is replaced, the existing license
is applied to the newly inserted card. For example, if you have eight licenses for Layer 3 VPN in the system,
you can configure Layer 3 VPN features on any eight cards in the router, and the licenses are allocated to the
slots within which the cards are installed. If a card is removed from one of these licensed slots, say slot 3, and
entered into an empty slot with no license, say slot 5, the license remains with slot 3 and the feature cannot
be activated on slot 5 with the permanent license entered earlier by the user. In this case, you can release the
license to the appropriate license pool by removing the configuration of the card (while it is inserted), or by
using the license move slot command. When you configure the feature on slot 5, the license is checked out.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 85
Software Entitlement on the Cisco ASR 9000 Series Router
Features that Require Licenses After a Software Image Upgrade
You must acquire either an evaluation license or a permanent license in order to continue using any features
that require a license.
During an install activate operation, if the installation fails to acquire a license (through the license manager)
for a package that requires licensing then the install operation is allowed but a warning message similar to
the following is displayed:
If you activate an SMU whose corresponding package requires a license but a license was not acquired
successfully, then the install operation is allowed but a warning message similar to the following is displayed:
Install operation 8 started by user 'lab' via CLI at 14:59:46 PST Wed Nov 25 2009.
(admin) install activate id 7
Install operation 8 completed successfully at 15:02:13 PST Wed Nov 25 2009.
Install logs:
Install operation 8 '(admin) install activate id 7' started by user 'lab'
via CLI at 14:59:46 PST Wed Nov 25 2009.
Info: This operation will activate the following packages:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
86 OL-23202-05
Software Entitlement on the Cisco ASR 9000 Series Router
How to Configure Cisco IOS XR Software Entitlement
Info: disk0:comp-asr9k-4.0.0.3P.CSCee40001-1.0.0
Info: disk0:comp-asr9k-4.0.0.3P.CSCee30001-1.0.0
Info: disk0:comp-asr9k-4.0.0.3P.CSCee20001-1.0.0
Info: disk0:comp-asr9k-4.0.0.3P.CSCee10001-1.0.0
Info: The following SMUs are not being activated as they do not apply to
Info: any packages on the router:
Info:
Info: disk0:asr9k-diags-supp-4.0.0.3P.CSCee30001-1.0.0
Info: disk0:asr9k-fpd-4.0.0.3P.CSCee40001-1.0.0
Info:
Warning: There is no valid license found for package 'disk0:asr9k-mcast-supp-4.0.0.3P'
Related Topics
Adding a License for a New Feature, on page 87
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 87
Software Entitlement on the Cisco ASR 9000 Series Router
Adding a License for a New Feature
SUMMARY STEPS
1. admin
2. show license udi
3. http://www.cisco.com/go/license
4. Copy the license to your TFTP server.
5. admin
6. license add license-name [ sdr sdr-name ]
7. configure
8. license license-name location {all | node-id}
9. exit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 2 show license udi Displays the UDI of the chassis. This consists of a product
identifier (PID), serial number (S/N), and operation identifier
Example: (Operation ID).
Step 3 http://www.cisco.com/go/license Go to the license tool on Cisco.com. You must log in to the site
before you can access the license tool. Follow the instructions for
product license registration. You are required to enter the feature
PAK and the chassis UDI to acquire the license.
Note If you are installing a permanent license, you should have
received the PAK when you purchased the feature. If you
are installing an evaluation license, your sales
representative should provide you with the PAK.
Step 4 Copy the license to your TFTP server. You will be issued a license. You can copy the license and store
it on your computer, or alternatively, you can request that the
license be sent to you in an e-mail. When you have received the
license, copy it to a TFTP server that is accessible by your router.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
88 OL-23202-05
Software Entitlement on the Cisco ASR 9000 Series Router
Backing Up Licenses
Example:
RP/0/RSP0/CPU0:router# admin
Step 6 license add license-name [ sdr sdr-name ] Adds the license to the SDR license pool. By default, the license
is added to the owner SDR license pool.
Example:
RP/0/RSP0/CPU0:router(admin)# license add
tftp://192.10.10.10/mylicenses/lc40g_lic
Example:
RP/0/RSP0/CPU0:router(admin)# configure
Step 8 license license-name location {all | node-id} Binds the license to the slot where it is to be used.
Example:
RP/0/RSP0/CPU0:router(admin-config)#
license A9K-ADV-OPTIC-LIC
location 0/0/CPU0
Example:
RP/0/RSP0/CPU0:router(admin)# exit
What to Do Next
To use the feature associated with the added license, you must configure it on your router. To configure
Layer 3 VPN, see the Implementing MPLS Layer 3 VPNs on Cisco IOS XR Software module in Cisco ASR 9000
Series Aggregation Services Router MPLS Configuration Guide.
To verify that your Layer 3 VPN configuration is operational, use the show rsi interface all global command.
Backing Up Licenses
When your router is configured with the licenses that you require, you should perform this task to back up all
licenses. Backing up licenses makes it easier to restore them if there is a problem.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 89
Software Entitlement on the Cisco ASR 9000 Series Router
Backing Up Licenses
SUMMARY STEPS
1. admin
2. license backup backup-file
3. show license backup backup-file
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 2 license backup backup-file Backs up all licenses on the router to a backup file in
the specified location. The backup file can be a local
Example: file or a remote file on a TFTP or RCP server.
RP/0/RSP0/CPU0:router(admin)# license backup
disk1:/license_back
Step 3 show license backup backup-file Displays the contents of the backup file.
Example:
Examples
The following example shows sample output from the show license backup command.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
90 OL-23202-05
Software Entitlement on the Cisco ASR 9000 Series Router
Restoring Licenses
Restoring Licenses
If your licenses become corrupted, and you have previously created a backup of your licenses, you can perform
this task to restore the licenses to your router.
SUMMARY STEPS
1. admin
2. show license backup backup-file
3. license restore backup-file
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 91
Software Entitlement on the Cisco ASR 9000 Series Router
Troubleshooting License Issues after a Software Upgrade
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 2 show license backup backup-file Displays the contents of the backup file. You should verify
the contents of the backup file before you restore your
Example: licenses.
RP/0/RSP0/CPU0:router(admin)# show license
backup disk1:/license_back
Step 3 license restore backup-file Restores all licenses on the router from a backup file in the
specified location. This can be a local file, or a remote file
Example: on a TFTP or RCP server.
RP/0/RSP0/CPU0:router(admin)# license restore
disk1:/license_back
Examples
This example shows sample output from the license restore command.
To solve this issue, configure the license command in administration EXEC mode. This binds the
A9K-ADV-OPTIC-LIC license to the slot on which you are using the license. For example:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
92 OL-23202-05
Software Entitlement on the Cisco ASR 9000 Series Router
Additional References
Additional References
The following sections provide references related to Cisco IOS XR software entitlement.
Related Documents
Layer 2 VPN configuration Implementing MPLS Layer 2 VPNs module of Cisco ASR 9000
Series Aggregation Services Router MPLS Configuration Guide
Layer 3 VPN configuration Implementing MPLS Layer 3 VPNs on the Cisco ASR 9000 Series
Router module of Cisco ASR 9000 Series Aggregation Services
Router MPLS Configuration Guide
Cisco IOS XR software commands Cisco ASR 9000 Series Aggregation Services Router Commands
Master List
Information on getting started with Cisco ASR 9000 Series Aggregation Services Router Getting
Cisco IOS XR software Started Guide
Information about user groups and task Configuring AAA Services on the Cisco ASR 9000 Series Router
IDs module of Cisco ASR 9000 Series Aggregation Services Router
System Security Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 93
Software Entitlement on the Cisco ASR 9000 Series Router
Additional References
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
94 OL-23202-05
CHAPTER 6
Managing the Router Hardware
This chapter describes the command-line interface (CLI) techniques and commands used to manage and
configure the hardware components of a router running the Cisco IOS XR software.
For complete descriptions of the commands listed in this module, see Additional References, on page 123.
To locate documentation for other commands that might appear in the course of performing a configuration
task, search online in Cisco ASR 9000 Series Aggregation Services Router Commands Master List.
Table 14: Feature History for Managing Router Hardware with Cisco IOS XR Software
Release Modification
Release 3.7.2 This feature was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 95
Managing the Router Hardware
Prerequisites for Managing Router Hardware
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
96 OL-23202-05
Managing the Router Hardware
Displaying SDR Hardware Version Information
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 97
Managing the Router Hardware
Displaying SDR Hardware Version Information
UDI_VID: V1D
HwRev: V0.0
New Deviation Number: 0
CLEI:
Board State : IOS XR RUN
PLD: Motherboard: N/A, Processor: 0x8004 (rev: 2.2), Power: N/A
ROMMON: Version 1.0(20081208:174521) [ASR9K ROMMON]
Board FPGA/CPLD/ASIC Hardware Revision:
NP0 : V3.194
NP1 : V3.194
NP2 : V3.194
NP3 : V3.194
XbarInterface : V18.4
Bridge0 : V0.38
Bridge1 : V0.38
CPUCtrl : V0.15
USB : V77.20
PHY0 : V0.16
PHY1 : V0.16
PHY2 : V0.16
PHY3 : V0.16
PortCtrl : V0.10
PHYCtrl : V0.7
4 Port Ten Gigabit Ethernet Daughter board : V0.0
CBC (active partition) : v2.2
CBC (inactive partition) : v2.1
In the following example, the show diag command displays information for a single node:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
98 OL-23202-05
Managing the Router Hardware
Displaying System Hardware Version Information
Note If you enter the show diag command in EXEC mode, the software displays only the hardware assigned
to the SDR to which you are connected.
The syntax for the show diag command in administration EXEC mode is:
show diag [node-id | chassis | details | fans | memory | power-supply | summary]
Tip For information on the software version, use the show version command.
In the following example, the show diag command displays information for all nodes in the system:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 99
Managing the Router Hardware
Displaying System Hardware Version Information
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
100 OL-23202-05
Managing the Router Hardware
Displaying System Hardware Version Information
NP2 : V3.194
NP3 : V3.194
XbarInterface : V18.4
Bridge0 : V0.38
Bridge1 : V0.38
CPUCtrl : V0.15
USB : V77.20
PortCtrl : V0.10
PHYCtrl : V0.7
PHY0 : V0.16
PHY1 : V0.16
PHY2 : V0.16
PHY3 : V0.16
PHY4 : V0.16
PHY5 : V0.16
PHY6 : V0.16
PHY7 : V0.16
8 Port Ten Gigabit Ethernet Daughter board : V0.0
CBC (active partition) : v2.2
CBC (inactive partition) : v2.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 101
Managing the Router Hardware
Displaying Software and Hardware Information
PID: A9K-3KW-AC
UDI_VID: V00
HwRev: V0.0
New Deviation Number: 0
CLEI: ACACACACAC
PLD: Motherboard: N/A, Processor: N/A, Power: N/A
ROMMON:
Board FPGA/CPLD/ASIC Hardware Revision:
In the following example, the show diag command displays information for a single system component:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
102 OL-23202-05
Managing the Router Hardware
Displaying SDR Node IDs and Status
2 Management Ethernet
12 TenGigE
40 GigabitEthernet
219k bytes of non-volatile configuration memory.
975M bytes of compact flash card.
33994M bytes of hard disk.
1605616k bytes of disk0: (Sector size 512 bytes).
1605616k bytes of disk1: (Sector size 512 bytes).
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 103
Managing the Router Hardware
Displaying Router Node IDs and Status
The node-id appears in the rack/slot/module notation, and the node-id components are as follows:
• rack —In a single-shelf system the rack number is always “0.”
• slot —Number of the physical slot in which the card is installed.
• module —Subslot number of a system hardware component.
Table 15: Node ID Components, on page 104 summarizes the node-id for each type of card.
Card Type (the card to Rack (always “0”) Slot (the physical slot in Module (the entity on the
which your are issuing which the card is card that is the target of
commands) installed) the command)
Route switch processor 0 RSP0 and RSP1 CPU0
40-Port Gigabit Ethernet 0-255 4-7 (6-slot chassis) 0-X (SFP and XFP
Line Card module number on the
0–7 (10-slot chassis)
line card)
8-Port 10-Gigabit
Ethernet Line Card
4-Port 10-Gigabit
Ethernet Line Card
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
104 OL-23202-05
Managing the Router Hardware
Displaying Router Environment Information
The node-id appears in the rack/slot/module notation, and the node-id components are as follows:
• rack —In a single-shelf system the rack number is always “0.”
• slot —Number of the physical slot in which the card is installed.
• module —Subslot number of a system hardware component.
Table 15: Node ID Components, on page 104 summarizes the node-id argument for each type of card.
Temperature Information
---------------------------------------------
0/1/*
host 31.5 39.5
0/RSP0/*
host 26.6 36.6
0/4/*
host 29.8 38.8
0/6/*
host 32.7 42.0
0/FT0/*
host 27.2 28.2
0/FT1/*
host 27.4 30.2
Voltage Information
---------------------------------------------
0/1/*
host IBV 10647 n/a
host 5.0V 4929 n/a
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 105
Managing the Router Hardware
Displaying Router Environment Information
0/RSP0/*
host 0.75VTT 749 n/a
host 0.9VTT_A 910 n/a
host 0.9VTT_B 904 n/a
host IBV 10586 n/a
host 5.0V 5013 n/a
host VP3P3_CAN 3277 n/a
host 3.3V 3299 n/a
host 2.5V 2518 n/a
host 1.8VB 1807 n/a
host 1.2VA 1205 n/a
host 1.2VB 1202 n/a
host 1.05V 1047 n/a
host 1.2VD 1205 n/a
host 1.8VA 1811 n/a
host 1.5V 1496 n/a
host 1.9V 1887 n/a
0/4/*
host IBV 10627 n/a
host 5.0V 4917 n/a
host VP3P3_CAN 3279 n/a
host 3.3V 3296 n/a
host 2.5V 2522 n/a
host 1.8VB 1805 n/a
host 1.2VB 1188 n/a
host 1.8VA 1796 n/a
host 0.9VB 881 n/a
host 1.2V_LDO_BRG0 1192 n/a
host 1.2V_LDO_BRG1 1195 n/a
host 1.8VC 1806 n/a
host 1.5VB 1510 n/a
host 1.5VA 1503 n/a
host 1.1V(1.05V_CPU) 1048 n/a
host 0.75VA 753 n/a
host 0.75VB_0.75VC 757 n/a
host 1.1VB 1105 n/a
host 1.2V_TCAM0 1003 n/a
host 1.2V_TCAM1 1000 n/a
host 1.0V_Bridge_LDO 997 n/a
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
106 OL-23202-05
Managing the Router Hardware
Displaying Router Environment Information
0/6/*
host IBV 10628 n/a
host 5.0V 4893 n/a
host VP3P3_CAN 3281 n/a
host 3.3V 3297 n/a
host 2.5V 2524 n/a
host 1.8VB 1804 n/a
host 1.2VB 1204 n/a
host 1.8VA 1795 n/a
host 0.9VB 881 n/a
host 1.2V_LDO_BRG0 1194 n/a
host 1.2V_LDO_BRG1 1193 n/a
host 1.8VC 1815 n/a
host 1.5VB 1495 n/a
host 1.5VA 1503 n/a
host 1.1V(1.05V_CPU) 1052 n/a
host 0.75VA 752 n/a
host 0.75VB_0.75VC 749 n/a
host 1.1VB 1001 n/a
host 1.2V_TCAM0 999 n/a
host 1.2V_TCAM1 1002 n/a
host 1.0V_Bridge_LDO 995 n/a
host 1.0VB 1050 n/a
host 0.75VD_and_0.75VE 752 n/a
host 1.2V_TCAM2 1002 n/a
host 1.2V_TCAM3 995 n/a
host 1.5VC 1502 n/a
host 1.8VD 1802 n/a
host 1.1VC 1101 n/a
host ZARLINK_3.3V 3273 n/a
host ZARLINK_1.8V 1804 n/a
host 1.2V_DB 1200 n/a
host 3.3V_DB 3314 n/a
host 2.5V_DB 2496 n/a
host 1.5V_DB 1496 n/a
host 1.8V_DB 1824 n/a
host 5.0V_XFP_DB 5004 n/a
host 1.2VB_DB 1227 n/a
LED Information
---------------------------------------------
0/RSP0/*
host Critical-Alarm Off
host Major-Alarm Off
host Minor-Alarm Off
host ACO Off
Fan Information
---------------------------------------------
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 107
Managing the Router Hardware
Displaying RP Redundancy Status
0/FT0/*
3510 3510 3510 3540 3510 3570 3480 3570 3510 3510
3510 3510
0/FT1/*
3540 3510 3450 3540 3480 3600 3480 3450 3540 3540
3480 3540
0/PM0/*
host PM 3000
0/PM1/*
host PM 3000
0/PM2/*
host PM 3000
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
108 OL-23202-05
Managing the Router Hardware
Displaying Field-Programmable Device Compatibility
===================================== ==========================================
Existing Field Programmable Devices
==========================================
HW Current SW Upg/
Location Card Type Version Type Subtype Inst Version Dng?
============ ======================== ======= ==== ======= ==== =========== ====
0/RSP0/CPU0 A9K-RSP-4G 4.8 lc fpga3 0 1.13 No
lc fpga1 0 1.5 No
lc fpga2 0 1.14 No
lc cbc 0 1.2 No
lc fpga4 0 1.6 No
lc rommon 0 1.0 No
--------------------------------------------------------------------------------
0/RSP0/CPU0 ASR-9010-FAN 1.0 lc cbc 1 4.0 No
--------------------------------------------------------------------------------
0/RSP0/CPU0 ASR-9010-FAN 1.0 lc cbc 2 4.0 No
--------------------------------------------------------------------------------
0/1/CPU0 A9K-40GE-B 1.0 lc fpga1 0 0.38 No
lc fpga2 0 0.8 No
lc cbc 0 2.2 No
lc cpld1 0 0.15 No
lc rommon 0 1.0 No
--------------------------------------------------------------------------------
0/1/CPU0 A9K-40GE-B 1.0 lc fpga1 1 0.38 No
--------------------------------------------------------------------------------
0/4/CPU0 A9K-8T/4-B 1.0 lc fpga1 0 0.38 No
lc fpga2 0 0.10 No
lc cbc 0 2.2 No
lc cpld2 0 0.7 No
lc cpld1 0 0.15 No
lc cpld3 0 0.3 No
lc rommon 0 1.0 No
lc fpga3 0 14.42 No
--------------------------------------------------------------------------------
0/4/CPU0 A9K-8T/4-B 1.0 lc fpga1 1 0.38 No
--------------------------------------------------------------------------------
0/6/CPU0 A9K-4T-B 1.0 lc fpga1 0 0.38 No
lc fpga2 0 0.10 No
lc cbc 0 2.2 No
lc cpld2 0 0.7 No
lc cpld1 0 0.15 No
lc cpld3 0 0.3 No
lc rommon 0 1.0 No
lc fpga3 0 14.42 No
--------------------------------------------------------------------------------
0/6/CPU0 A9K-4T-B 1.0 lc fpga1 1 0.38 No
--------------------------------------------------------------------------------
The following example shows how to display FPD compatibility for a specific module in the router:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 109
Managing the Router Hardware
Displaying Field-Programmable Device Compatibility
Field Description
Location Location of the module in the rack/slot/module
notation.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
110 OL-23202-05
Managing the Router Hardware
RSP Redundancy and Switchover
Field Description
Upg/Dng? Specifies whether an FPD upgrade or downgrade is
required. A downgrade is required in rare cases when
the version of the FPD image has a higher major
revision than the version of the FPD image in the
current Cisco IOS XR software package.
Figure 3: Redundant Set of RSPs Installed in Slots RSP0 and RSP1 in an 8-Slot Chassis
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 111
Managing the Router Hardware
Determining the Active RP in a Redundant Pair
RP/0/RSP1/CPU0:router#
In this example, the prompt indicates that you are communicating with the active RSP in slot RSP1. See
Cisco ASR 9000 Series Aggregation Services Router Getting Started Guide for a complete description
of the CLI prompt.
• Enter the show redundancy command in EXEC mode to display a summary of the active and standby
RSP status. For example:
RP/0/RSP0/CPU0:router(admin)# show redundancy
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
112 OL-23202-05
Managing the Router Hardware
Automatic Switchover
Command Description
show redundancy Displays the redundancy status of the RSPs. This
command also displays the boot and switch-over
history for the RSPs.
show platform Displays the status for node, including the redundancy
status of the RSP cards. In EXEC mode, this
command displays status for the nodes assigned to
the SDR. In administration EXEC mode, this
command displays status for all nodes in the system.
Automatic Switchover
Automatic switchover from the active RSP to the standby RSP occurs only if the active RSP encounters a
serious system error, such as the loss of a mandatory process or a hardware failure. When an automatic
switchover occurs, the RSPs respond as follows:
• If a standby RSP is installed and “ready” for switchover, the standby RSP becomes the active RSP. The
original active RSP attempts to reboot.
• If the standby RSP is not in “ready” state, then both RSPs reboot. The first RSP to boot successfully
assumes the role of active RSP.
Caution You should not use the reload command to force an RSP switchover because the result could be a
significant loss of router operations. Instead, use the redundancy switchover command to fail over to
the standby RSP, then use the hw-module location node-id reload command to reload the new standby
RSP.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 113
Managing the Router Hardware
Manual Switchover
Related Topics
Reloading, Shutting Down, or Power Cycling a Node, on page 115
Manual Switchover
You can force a manual switchover from the active RSP to the standby RSP using the redundancy switchover
command.
If a standby RSP is installed and ready for switchover, the standby RSP becomes the active RSP. The original
active RSP becomes the standby RSP. In the following example, partial output for a successful redundancy
switchover operation is shown:
In the preceding example, the Telnet connection is lost when the previously active RP resets. To continue
management of the router, you must connect to the newly activated RP as shown in the following example:
Username: xxxxx
Password: xxxxx
Last switch-over Sat Apr 15 12:26:47 2009: 1 minute ago
RP/0/RSP1/CPU0:router#
If the standby RSP is not in “ready” state, the switchover operation is not allowed. In the following example,
partial output for a failed redundancy switchover attempt is shown:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
114 OL-23202-05
Managing the Router Hardware
Communicating with a Standby RP
Command Description
hw-module location node-id power disable This command administratively turns the power off
for a node. It is entered in administration
configuration mode. The changes do not take effect
until you enter the commit command.
To power on a node, use the no form of this
command.
Note This command cannot be used to disable
power on the RSP from which the command
is entered.
hw-module location node-id reload This command works in EXEC mode and reloads the
Cisco IOS XR software on a specific node or all
nodes. To specify all nodes, enter the all keyword
in place of the node-id argument. The node reloads
with the current running configuration and active
software set for that node.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 115
Managing the Router Hardware
Reloading the Active RSP
Command Description
hw-module shutdown location node-id This command must be entered in administration
configuration mode and administratively shuts down
the specified node. Nodes that are shut down still have
power but cannot load or operate Cisco IOS XR
software.
To return a node to the up state, use the no form of
this command.
Note This command cannot be used to shut down
the RSP from which the command is entered.
reload Causes the active RSP to reload the Cisco IOS XR
software according to the configuration register
setting (for example, 0x0 to enter ROMMON
bootstrap mode and 0x2102 to reload the RSP to
EXEC mode). The reload command can be entered
in EXEC or administration EXEC modes, and you
can see additional options by entering the reload ?
command. See the Reloading the Active RSP , on
page 116 for more information.
show variables boot Displays the configuration register setting for the
router.
• Use this command in administration EXEC
mode to see the variables for both RSPs.
• The configuration register setting determines
how the router boots during a system reset. The
most common configuration register settings
are:
◦0x2102: The active RSP loads the
Cisco IOS XR software and default
configuration on the next system boot.
After logging in, the user can access
EXEC mode.
◦0x0: The active RSP enters the bootstrap
ROM Monitor (rommon B1>) on the next
system boot.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
116 OL-23202-05
Managing the Router Hardware
Reloading the Active RSP
This section contains instructions to reload the Cisco IOS XR software and return to EXEC mode. For
instructions to use the reload command for entering ROM Monitor bootstrap mode, see Cisco ASR 9000
Series Aggregation Services Router ROM Monitor Guide.
Caution Because the reload command causes the active RSP to go off line and either reload the Cisco IOS XR
software or enter ROM Monitor mode, the router experiences a loss of service unless a redundant standby
RSP is installed and in “ready” state. To display the status of the standby RSP, use the show redundancy
command in EXEC mode.
SUMMARY STEPS
1. show redundancy
2. admin
3. show variables boot
4. (Optional) config-register 0x2102
5. admin
6. reload
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Note For instructions on how to enter ROM Monitor bootstrap mode, see
Cisco ASR 9000 Series Aggregation Services Router ROM Monitor
Guide.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 117
Managing the Router Hardware
Flash Disk Recovery
RP/0/RSP0/CPU0:router(admin)#
config-register 0x2102
Example:
RP/0/RSP0/CPU0:router# admin
Step 6 reload Reloads the active RSP according to the configuration register setting.
• If the setting is 0x2102, then the RSP reloads the Cisco IOS XR software.
Example:
• If the standby RSP is in “ready” redundancy state, the router switches
RP/0/RSP0/CPU0:router# reload
over to the standby RSP.
• If a standby RSP is not installed or not in a “ready” state, the router
experiences a loss of service while the active RSP is reloading the
Cisco IOS XR software.
#########################################################
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco IOS XR Software for the Cisco XR Cisco ASR 9000 Series Router-mbirp,
Copyright (c) 2009 by Cisco Systems, Inc.
Unable to mount /disk0:, filesystem is corrupted.
Check fsck log at /tmp/chkfs_fd0.log
init: special_commands:wait for disk0: failed
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
118 OL-23202-05
Managing the Router Hardware
Using Controller Commands to Manage Hardware Components
If this occurs, then the flash disk is automatically reformatted and the Cisco IOS XR software is restored to
the flash disk.
Note If the flash disk is badly damaged and cannot be reformatted, the disk must be replaced.
If the corrupted flash disk is the DSC, then the router fails over to the standby DSC. If no standby DSC
is installed, then the system fails to boot.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 119
Managing the Router Hardware
Removing and Replacing Cards
Variable Description
filesystem Specifies the memory device to format. The supported
file systems are:
• bootflash:
• compactflash:
• configflash:
• harddisk:
• harddiska:
• disk0:
• disk1:
In the following example, the format command is used to format the hard disk:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
120 OL-23202-05
Managing the Router Hardware
Removing Line Cards
running-config command. The following example shows how the configuration appears when a card is
removed:
Building configuration...
hostname router
router ospf 3269
area 0
interface POS0/3/0/0
cost 20
!
interface preconfigure POS0/3/0/0
ipv4 address 10.10.50.1 255.255.255.0
!
interface preconfigure POS0/3/0/1
description POS0/3/0/1
shutdown
!
interface preconfigure POS0/3/0/2
description POS0/3/0/2
shutdown
!
interface preconfigure POS0/3/0/3
description POS0/3/0/3
shutdown
!
In this example, the line card in slot 3 is removed, and the interface configuration for all four interfaces changes
to “interface preconfigure.” However, the “router ospf” reference to a slot 3 interface does not change. If you
replace a line card with another line card that uses the same media type and port count, the configuration
becomes active on the replacement card.
To remove the configuration for a slot after a card is removed, use the no interface preconfigure command
to remove all interface configuration statements for that card in the running configuration. In addition, search
the configuration for any references to the removed interfaces, such as the “router ospf” reference to slot 3 in
the preceding example.
To remove the configuration for a slot when a card is installed, use the no interface command to remove
all interface configuration statements for that card in the running configuration. In addition, search the
configuration for any references to the removed interfaces.
Each line card supports a specific media type (Packet over SONET/SDH [POS] or Ethernet, for example) and
port count. If you replace a line card with one that supports a different media type or port count, you should
review the configuration and revise it to support the replacement line card.
Replacing a Line Card with the Same Media Type and Port Count
When you replace a line card or PLIM with a card that is of the same media type and has the same port count
as the replaced card, the guidelines in the Removing Line Cards , on page 120 apply. Because the replacement
card is of the same media type and port count, no special procedures are required for card removal and
replacement.
Replacing a Line Card with the Same Media Type and a Different Port Count
When you replace a line card with a card that is of the same media type with a different port count, the
guidelines in Removing Line Cards , on page 120 apply.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 121
Managing the Router Hardware
Upgrading the CPU Controller Bits
If the new card has a greater port count than the replaced card, the configuration applies to the corresponding
lower port numbers, and the ports that did not exist on the replaced card have no configuration and come up
in the shutdown state.
If the new card supports fewer ports, the existing configuration for the corresponding number of ports on the
new card set is applied. The previous configuration for the removed ports remains in interface preconfigure
state, as shown in the following example:
Building configuration...
hostname rtp-gsr1
interface POS0/3/0/0
ipv4 address 10.10.50.1 255.255.255.0
!
interface preconfigure POS0/3/0/1
description POS0/3/0/1
shutdown
!
interface preconfigure POS0/3/0/2
description POS0/3/0/2
shutdown
!
interface preconfigure POS0/3/0/3
description POS0/3/0/3
shutdown
!
In the preceding example, a four-port card has been replaced with a single-port card. The configuration from
port 1 on the four-port card is applied to the single port on the replacement card, and the remaining port
configurations change to “interface preconfigure.” To remove the configuration for the missing interfaces, use
the no interface preconfigure command. In addition, search for and remove any configuration references
to the removed interfaces.
Whenever you replace a line card with the same media type and a different port count, review the running
configuration in the router and revise the configuration as necessary.
SUMMARY STEPS
1. admin
2. upgrade cpuctrlbits {all | location node-id}
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
122 OL-23202-05
Managing the Router Hardware
Examples
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Step 2 upgrade cpuctrlbits {all | location node-id} Upgrades the CPU controller bits on all nodes in the router.
Use the location node-id keyword and argument to upgrade
Example: the CPU controller bits on a specific node.
RP/0/RSP0/CPU0:router(admin)# upgrade
cpuctrlbits all
Examples
The following example shows how to upgrade the CPU controller bits on all nodes in a router:
RP/0/RSP0/CPU0:router# admin
RP/0/RSP0/CPU0:router(admin)# upgrade cpucrtlbits all
Please do not power cycle, reload the router or reset any nodes until all upgrades are
completed.
Please check the syslog to make sure that all nodes are upgraded successfully.
If you need to perform multiple upgrades, please wait for current upgrade to be completed
before proceeding to another upgrade. Failure to do so may render the cards under upgrade
to be unusable.
Additional References
The following sections provide references related to hardware management on Cisco IOS XR software.
Related Documents
Cisco IOS XR hardware documentation See Cisco Carrier Routing System Install and
Upgrade Guides at:
http://www.cisco.com/en/US/products/ ps5763/
prod_installation_guides_list.html
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 123
Managing the Router Hardware
Additional References
Cisco IOS XR command master list Cisco ASR 9000 Series Aggregation Services
Router Commands Master List
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
124 OL-23202-05
Managing the Router Hardware
Additional References
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 125
Managing the Router Hardware
Additional References
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
126 OL-23202-05
CHAPTER 7
Upgrading FPD on the Cisco ASR 9000 Series
Router
In general terms, field-programmable devices (FPDs) are hardware devices implemented on router cards
that support separate software upgrades. A field-programmable gate array (FPGA) is a type of programmable
memory device that exists on most hardware components of the router. The term FPD has been introduced
to collectively and generically describe any type of programmable hardware device on SIPs and shared port
adapters (SPAs), including FPGAs and the read-only memory monitor (ROMMON). Cisco IOS XR software
provides the Cisco FPD upgrade feature to manage the upgrade of FPD images on SIPs and SPAs.
This chapter describes the information that you must know to verify image versions and to perform an
upgrade for SPA or SIP FPD images when incompatibilities arise.
For complete descriptions of the FPD commands listed in this module, see Related Documents, on page
145. To locate documentation for other commands that might appear in the course of performing a configuration
task, search online in Cisco ASR 9000 Series Aggregation Services Router Commands Master List.
Table 20: Feature History for Upgrading FPD Software on Cisco IOS XR Software
Release Modification
Release 3.9.0 Support for FPD upgrades was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 127
Upgrading FPD on the Cisco ASR 9000 Series Router
Prerequisites for FPD Image Upgrades
Related Topics
show hw-module fpd Command Output: Example, on page 132
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
128 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
How to Upgrade FPD Images
Note Although the FPD upgrade is performed during the install operation, there is no install commit performed.
Therefore, once the FPD has been upgraded, if the image is rolled back to the original version, the FPD
version is not downgraded to the previous version.
Note In all cases where the automatic FPD upgrade is not performed, you must perform a manual FPD upgrade
using the upgrade hw-module fpd command.
In the event that there is an FPD incompatibility with your card, you may receive an error message. If you
upgrade to a newer version of the Cisco IOS XR software and there is an FPD incompatibility, you receive
the following message:
LC/0/1/CPU0:Dec 23 16:33:47.945 : spa_192_jacket_v2[203]: %PLATFORM-UPGRADE_FPD-4-DOWN_REV
: spa fpga2 instance 0 is down-rev (V0.6), upgrade to (V1.0). Use the "upgrade hw-module
fpd" CLI in admin mode.
If the FPD image on the card is newer then what is required by the currently running Cisco IOS XR software
image on the router, you receive the following error message:
LC/0/1/CPU0:Dec 23 16:33:47.955 : spa_192_jacket_v2[203]: %PLATFORM-UPGRADE_FPD-4-UP_REV :
spa fpga instance 1 is severely up-rev (V2.1), downgrade to (V1.6). Use the "upgrade hw-module
fpd" CLI in admin mode.
You should perform the FPD upgrade procedure if you receive such messages. Cards may not function properly
if FPD incompatibilities are not resolved.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 129
Upgrading FPD on the Cisco ASR 9000 Series Router
How to Upgrade FPD Images
• The FPD upgrade procedure is performed while the card is online. At the end of the procedure the card
must be reloaded before the FPD upgrade is complete. To automatically reload the card, you can use
the hw-module reload command during your next maintenance window. The upgrade procedure is not
complete until the card is reloaded.
• During the FPD upgrade, you must not do the following:
◦Reload, perform an online insertion and removal (OIR) of a line card (LC), or power down the
chassis. Doing so may cause the node to enter an unusable state.
◦Press Ctrl-C if the console appears to hang without any output. Doing so may abort the upgrade.
• If you are not sure whether a card requires an FPD upgrade, you can install the card and use the
show hw-module fpd command to determine if the FPD image on the card is compatible with the
currently running Cisco IOS XR software release.
SUMMARY STEPS
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# admin
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
130 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
How to Upgrade FPD Images
Step 4 upgrade hw-module fpd {all | fpga-type} Upgrades all the current FPD images that must be upgraded on the specified
[force] location [all | node-id] card with new images.
Before continuing to the next step, wait for confirmation that the FPD upgrade
Example: has successfully completed. Status messages, similar to these, are displayed
RP/0/RSP0/CPU0:router(admin)# upgrade to the screen until the FPD upgrade is completed:
hw-module fpd
all force location 0/3/1
. FPD upgrade started.
. FPD upgrade in progress..
.
FPD upgrade in progress..
Successfully upgraded 1 FPD for
SPA-2XOC48POS/RPR FPD upgrade sent to location xxxx
on location 0/3/1 FPD upgrade sent to location yyyy
FPD upgrade in progress..
FPD upgrade finished for location xxx
FPD upgrade in progress..
FPD upgrade finished for location yyyy
FPD upgrade completed.
The “FPD upgrade in progress.” message is printed every minute. These logs
are information logs, and as such, are displayed if the logging console
informational command is configured.
If Ctrl-C is pressed while the FPD upgrade is in progress, the following
warning message is displayed:
If you confirm that you want to abort the FPD upgrade procedure, this message
is displayed:
Note If your card supports multiple FPD images, you can use the show
fpd package admin command to determine what specific image to
upgrade in the upgrade hw-module fpd command.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 131
Upgrading FPD on the Cisco ASR 9000 Series Router
Configuration Examples for FPD Image Upgrade
Example:
RP/0/RSP0/CPU0:router(admin)# exit
RP/0/RSP0/CPU0:router# hw-module
location 0/3/cpu0 reload
Step 7 show platform Verifies that the FPD image on the card has been successfully upgraded by
displaying the status of all cards in the system.
Example:
RP/0/RSP0/CPU0:router# show platform
===================================== ==========================================
Existing Field Programmable Devices
==========================================
HW Current SW Upg/
Location Card Type Version Type Subtype Inst Version Dng?
============ ======================== ======= ==== ======= ==== =========== ====
0/RSP0/CPU0 A9K-RSP-4G 4.8 lc fpga3 0 1.13 No
lc fpga1 0 1.5 No
lc fpga2 0 1.14 No
lc cbc 0 1.2 No
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
132 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
show hw-module fpd Command Output: Example
lc fpga4 0 1.6 No
lc rommon 0 1.0 No
--------------------------------------------------------------------------------
0/RSP0/CPU0 ASR-9010-FAN 1.0 lc cbc 1 4.0 No
--------------------------------------------------------------------------------
0/RSP0/CPU0 ASR-9010-FAN 1.0 lc cbc 2 4.0 No
--------------------------------------------------------------------------------
0/1/CPU0 A9K-40GE-B 1.0 lc fpga1 0 0.38 No
lc fpga2 0 0.8 No
lc cbc 0 2.2 No
lc cpld1 0 0.15 No
lc rommon 0 1.0 No
--------------------------------------------------------------------------------
0/1/CPU0 A9K-40GE-B 1.0 lc fpga1 1 0.38 No
--------------------------------------------------------------------------------
0/4/CPU0 A9K-8T/4-B 1.0 lc fpga1 0 0.38 No
lc fpga2 0 0.10 No
lc cbc 0 2.2 No
lc cpld2 0 0.7 No
lc cpld1 0 0.15 No
lc cpld3 0 0.3 No
lc rommon 0 1.0 No
lc fpga3 0 14.42 No
--------------------------------------------------------------------------------
0/4/CPU0 A9K-8T/4-B 1.0 lc fpga1 1 0.38 No
--------------------------------------------------------------------------------
0/6/CPU0 A9K-4T-B 1.0 lc fpga1 0 0.38 No
lc fpga2 0 0.10 No
lc cbc 0 2.2 No
lc cpld2 0 0.7 No
lc cpld1 0 0.15 No
lc cpld3 0 0.3 No
lc rommon 0 1.0 No
lc fpga3 0 14.42 No
--------------------------------------------------------------------------------
0/6/CPU0 A9K-4T-B 1.0 lc fpga1 1 0.38 No
--------------------------------------------------------------------------------
The following example shows how to display FPD compatibility for a specific module in the router:
Field Description
Location Location of the module in the rack/slot/module
notation.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 133
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
Field Description
HW Version Hardware model version for the module.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
134 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
=============================== ================================================
Field Programmable Device Package
================================================
SW Min Req Min Req
Card Type FPD Description Type Subtype Version SW Ver HW Vers
==================== ========================== ==== ======= =========== ======== =========
A9K-40GE-B Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-4T-B Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-8T/4-B Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-2T20GE-B Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-40GE-E Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 135
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
----------------------------------------------------------------------------------------------
A9K-4T-E Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-8T/4-E Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-2T20GE-E Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-8T-B Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
136 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
----------------------------------------------------------------------------------------------
A9K-16T/8-B Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-16T/8-B Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-8T-E Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-16T/8-E Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
----------------------------------------------------------------------------------------------
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 137
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
A9K-16T/8-E Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-40GE-L Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-4T-L Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-8T/4-L Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-2T20GE-L Can Bus Ctrl (CBC) LC2 lc cbc 2.02 0.0 0.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
138 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
----------------------------------------------------------------------------------------------
A9K-8T-L Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-16T/8-L Can Bus Ctrl (CBC) LC3 lc cbc 6.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-SIP-700 Can Bus Ctrl (CBC) LC5 lc cbc 3.05 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-SIP-500 Can Bus Ctrl (CBC) LC5 lc cbc 3.05 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-RSP-2G Can Bus Ctrl (CBC) RSP2 lc cbc 1.02 0.0 0.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 139
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
----------------------------------------------------------------------------------------------
A9K-RSP-4G Can Bus Ctrl (CBC) RSP2 lc cbc 1.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-RSP-8G Can Bus Ctrl (CBC) RSP2 lc cbc 1.02 0.0 0.1
----------------------------------------------------------------------------------------------
ASR-9010-FAN Can Bus Ctrl (CBC) FAN lc cbc 4.00 0.0 0.1
----------------------------------------------------------------------------------------------
ASR-9006-FAN Can Bus Ctrl (CBC) FAN lc cbc 5.00 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-BPID2-10-SLOT Can Bus Ctrl (CBC) BP2 lc cbc 7.103 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-BPID2-6-SLOT Can Bus Ctrl (CBC) BP2 lc cbc 7.103 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-ISM-100 Can Bus Ctrl (CBC) LC6 lc cbc 18.05 0.0 0.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
140 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
----------------------------------------------------------------------------------------------
A9K-8T-B CPUCtrl LC3 lc cpld1 1.02 0.0 0.1
----------------------------------------------------------------------------------------------
A9K-8T-E CPUCtrl LC3 lc cpld1 1.02 0.0 0.1
----------------------------------------------------------------------------------------------
SPA-4XT3/E3 SPA E3 Subrate FPGA spa fpga2 1.04 0.0 0.0
----------------------------------------------------------------------------------------------
SPA-2XT3/E3 SPA E3 Subrate FPGA spa fpga2 1.04 0.0 0.0
----------------------------------------------------------------------------------------------
SPA-4XCT3/DS0 SPA T3 Subrate FPGA spa fpga2 0.11 0.0 0.100
----------------------------------------------------------------------------------------------
SPA-1XCHOC48/DS3 SPA I/O FPGA spa fpga2 1.00 0.0 0.49
----------------------------------------------------------------------------------------------
SPA-2XCHOC12/DS0 SPA FPGA2 swv1.00 spa fpga2 1.00 0.0 0.0
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 141
Upgrading FPD on the Cisco ASR 9000 Series Router
show fpd package Command Output: Example
----------------------------------------------------------------------------------------------
SPA-8XOC12-POS SPA FPGA swv1.0 spa fpga1 1.00 0.0 0.5
----------------------------------------------------------------------------------------------
SPA-8XCHT1/E1 SPA I/O FPGA spa fpga1 2.08 0.0 0.0
----------------------------------------------------------------------------------------------
SPA-2XOC48POS/RPR SPA FPGA swv1.0 spa fpga1 1.00 0.0 0.0
----------------------------------------------------------------------------------------------
SPA-8XOC3-POS SPA FPGA swv1.0 spa fpga1 1.00 0.0 0.5
----------------------------------------------------------------------------------------------
SPA-10X1GE-V2 SPA FPGA swv1.10 spa fpga1 1.10 0.0 0.0
----------------------------------------------------------------------------------------------
SPA-5X1GE-V2 SPA FPGA swv1.10 spa fpga1 1.10 0.0 0.0
----------------------------------------------------------------------------------------------
SPA-1X10GE-L-V2 SPA FPGA swv1.9 spa fpga1 1.09 0.0 0.0
----------------------------------------------------------------------------------------------
SPA-4XOC3-POS-V2 SPA FPGA swv1.0 spa fpga1 1.00 0.0 0.5
----------------------------------------------------------------------------------------------
SPA-1X10GE-WL-V2 SPA FPGA swv1.9 spa fpga1 1.09 0.0 0.0
----------------------------------------------------------------------------------------------
Field Description
Card Type Module part number.
FPD Description Description of all FPD images available for the SPA.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
142 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
upgrade hw-module fpd Command Output: Example
Field Description
Min Req SW Vers Minimum required FPD image software version to operate
the card. Version 0.0 indicates that a minimum required image
was not programmed into the card.
Min Req HW Vers Minimum required hardware version for the associated FPD
image. A minimum hardware requirement of version 0.0
indicates that all hardware can support this FPD image
version.
Note In the show fpd package command output, the “subtype” column shows the FPDs that correspond with
each SPA image. To upgrade a specific FPD with the upgrade hw-module fpd command, replace the
fpga-type argument with the appropriate FPD from the “subtype” column, as shown in the following
example:
RP/0/RSP0/CPU0:router# admin
RP/0/RSP0/CPU0:router(admin)# upgrade hw-module fpd fpga force location 0/1/cpu0
% RELOAD REMINDER: - The upgrade operation of the target module will not interrupt its
normal
operation. However, for the changes to take effect, the target module
will need to be manually reloaded after the upgrade operation. This can
be accomplished with the use of "hw-module <target> reload" command.
- If automatic reload operation is desired after the upgrade, please use
the "reload" option at the end of the upgrade command.
- The output of "show hw-module fpd location" command will not display
correct version information after the upgrade if the target module is
not reloaded.
Continue? [confirm] y
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 143
Upgrading FPD on the Cisco ASR 9000 Series Router
show platform Command Output: Example
Successfully upgrade fpga subtype image for for this card on location 0/1/CPU0
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
144 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
Performing a SPA FPD Recovery Upgrade
When a SPA is in the failed state, it may not register itself with the FPD upgrade mechanism. In this case,
you do not see the SPA listed when you use the show hw-module fpd command. To verify the state of a
SPA, use the show hw-module subslot error command and the show hw-module subslot status command.
RP/0/RSP0/CPU0:router# admin
RP/0/RSP0/CPU0:router(admin)# upgrade hw-module fpd fpga force location 0/3/0
Note Performing a SPA FPD recovery upgrade as well as using the force keyword with the upgrade
hw-module fpd command works only if the SPA has power. If the SPA is in the SHUT, NPWR state
(you can determine the state by checking the output of the show platform command), the upgrade in
general, as well as the force keyword,will not work.
Additional References
The following sections provide references related to FPD software upgrade.
Related Documents
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 145
Upgrading FPD on the Cisco ASR 9000 Series Router
Additional References
Initial system bootup and configuration information Cisco ASR 9000 Series Aggregation Services Router
for a router using the Cisco IOS XR Software. Getting Started Guide
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
146 OL-23202-05
Upgrading FPD on the Cisco ASR 9000 Series Router
Additional References
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 147
Upgrading FPD on the Cisco ASR 9000 Series Router
Additional References
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
148 OL-23202-05
CHAPTER 8
Configuring Manageability on Cisco ASR 9000
Series Router
This module describes the configuration required to enable the Extensible Markup Language (XML) agent
services. The XML Parser Infrastructure provides parsing and generation of XML documents with Document
Object Model (DOM), Simple Application Programming Interface (API) for XML (SAX), and Document
Type Definition (DTD) validation capabilities:
• DOM allows customers to programmatically create, manipulate, and generate XML documents.
• SAX supports user-defined functions for XML tags.
• DTD allows for validation of defined document types.
Table 23: Feature History for Configuring Manageability on Cisco IOS XR Software
Release 3.9.0 The ability to enable XML requests over Secure Socket Layer (SSL) was introduced.
The ability to configure an idle timeout for the XML agent was introduced.
Release 4.0.0 The ability to configure a dedicated agent to receive and send messages via a specified
VPN routing and forwarding (VRF) instance was introduced.
The ability to control CPU time used by the XML agent was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 149
Configuring Manageability on Cisco ASR 9000 Series Router
Information About XML Manageability
DETAILED STEPS
Step 2 iteration on size iteration-size Configures the iteration size for large XML agent responses in
KBytes. The default is 48.
Example:
RP/0/RSP0/CPU0:router:router(config-xml-agent)#
iteration on size 500
Step 3 session timeout timeout Configures an idle timeout for the XML agent in minutes. By
default, there is no timeout.
Example:
RP/0/RSP0/CPU0:router:router(config-xml-agent)#
session timeout 5
Step 4 throttle {memory size | process-rate tags} Configures the XML agent processing capabilities.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
150 OL-23202-05
Configuring Manageability on Cisco ASR 9000 Series Router
Configuration Examples for Manageability
Step 5 vrf { default | vrf-name} [access-list access-list-name] Configures the dedicated agent or SSL agent to receive and
send messages via the specified VPN routing and forwarding
Example: (VRF) instance.
RP/0/RSP0/CPU0:router:router(config-xml-agent)#
vrf my-vrf
The following example illustrates how to remove access to VRF2 from the dedicated agent:
The following example shows how to configure the XML SSL agent to receive and send messages through
VRF1, VRF2 and the default VRF:
The following example removes access for VRF2 from the dedicated XML agent:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 151
Configuring Manageability on Cisco ASR 9000 Series Router
Additional References
Additional References
The following sections provide references related to configuring manageability on Cisco IOS XR software.
Related Documents
Information about user groups and task IDs Configuring AAA Services on Cisco IOS XR Software
module of Cisco ASR 9000 Series Aggregation
Services Router System Security Configuration Guide
Standard/RFC Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
152 OL-23202-05
Configuring Manageability on Cisco ASR 9000 Series Router
Additional References
Technical Assistance
Description Link
The Cisco Support website provides extensive online http://www.cisco.com/cisco/web/support/index.html
resources, including documentation and tools for
troubleshooting and resolving technical issues with
Cisco products and technologies.
To receive security and technical information about
your products, you can subscribe to various services,
such as the Product Alert Tool (accessed from Field
Notices), the Cisco Technical Services Newsletter,
and Really Simple Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website
requires a Cisco.com user ID and password.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 153
Configuring Manageability on Cisco ASR 9000 Series Router
Additional References
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
154 OL-23202-05
CHAPTER 9
Implementing NTP on the Cisco ASR 9000 Series
Router
Network Time Protocol (NTP) is a protocol designed to time-synchronize devices within a network.
Cisco IOS XR software implements NTPv4. NTPv4 retains backwards compatibility with the older versions
of NTP, including NTPv3 and NTPv2 but excluding NTPv1, which has been discontinued due to security
vulnerabilities.
This module describes the tasks you need to implement NTP on the Cisco IOS XR software.
For more information about NTP on the Cisco IOS XR software and complete descriptions of the NTP
commands listed in this module, see Related Documents, on page 175. To locate documentation for other
commands that might appear in the course of running a configuration task, search online in Cisco ASR 9000
Series Aggregation Services Router Commands Master List.
Table 24: Feature History for Implementing NTP on Cisco IOS XR Software
Release Modification
Release 3.7.2 This feature was introduced.
Release 3.9.0 Support was added for IPv6 addresses, VRFs, multicast-based associations, and burst
and iburst modes for poll-based associations.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 155
Implementing NTP on the Cisco ASR 9000 Series Router
Prerequisites for Implementing NTP on Cisco IOS XR Software
In a LAN environment, NTP can be configured to use IP broadcast messages. As compared to polling, IP
broadcast messages reduce configuration complexity, because each machine can simply be configured to send
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
156 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
How to Implement NTP on Cisco IOS XR Software
or receive broadcast or multicast messages. However, the accuracy of timekeeping is marginally reduced
because the information flow is one-way only.
An NTP broadcast client listens for broadcast messages sent by an NTP broadcast server at a designated IPv4
address. The client synchronizes the local clock using the first received broadcast message.
The time kept on a machine is a critical resource, so we strongly recommend that you use the security features
of NTP to avoid the accidental or malicious setting of incorrect time. Two mechanisms are available: an access
list-based restriction scheme and an encrypted authentication mechanism.
When multiple sources of time (VINES, hardware clock, manual configuration) are available, NTP is always
considered to be more authoritative. NTP time overrides the time set by any other method.
Note No specific command enables NTP; the first NTP configuration command that you issue enables NTP.
You can configure the following types of poll-based associations between the router and other devices (which
may also be routers):
• Client mode
• Symmetric active mode
The client and the symmetric active modes should be used when NTP is required to provide a high level of
time accuracy and reliability.
When a networking device is operating in the client mode, it polls its assigned time serving hosts for the
current time. The networking device then picks a host from all the polled time servers to synchronize with.
Because the relationship that is established in this case is a client-host relationship, the host does not capture
or use any time information sent by the local client device. This mode is most suited for file-server and
workstation clients that are not required to provide any form of time synchronization to other local clients.
Use the server command to individually specify the time-serving hosts that you want your networking device
to consider synchronizing with and to set your networking device to operate in the client mode.
When a networking device is operating in the symmetric active mode, it polls its assigned time-serving hosts
for the current time and it responds to polls by its hosts. Because this is a peer-to-peer relationship, the host
also retains time-related information about the local networking device that it is communicating with. This
mode should be used when there are several mutually redundant servers that are interconnected via diverse
network paths. Most stratum 1 and stratum 2 servers on the Internet today adopt this form of network setup.
Use the peer command to individually specify the time-serving hosts that you want your networking device
to consider synchronizing with and to set your networking device to operate in the symmetric active mode.
When the router polls several other devices for the time, the router selects one device with which to synchronize.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 157
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring Poll-Based Associations
Note To configure a peer-to-peer association between the router and another device, you must also configure
the router as a peer on the other device.
You can configure multiple peers and servers, but you cannot configure a single IP address as both a peer
and a server at the same time.
To change the configuration of a specific IP address from peer to server or from server to peer, use the
no form of the peer or server command to remove the current configuration before you perform the
new configuration. If you do not remove the old configuration before performing the new configuration,
the new configuration does not overwrite the old configuration.
SUMMARY STEPS
1. configure
2. ntp
3. server ip-address [version number] [key key-id] [minpoll interval] [maxpoll interval] [source type
interface-path-id] [prefer] [burst] [iburst]
4. peer ip-address [version number] [key key-id] [minpoll interval] [maxpoll interval] [source type
interface-path-id] [prefer]
5. Use one of the following commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Step 3 server ip-address [version number] [key key-id] Forms a server association with another system. This step can be
[minpoll interval] [maxpoll interval] [source type repeated as necessary to form associations with multiple devices.
interface-path-id] [prefer] [burst] [iburst]
Example:
RP/0/RSP0/CPU0:router(config-ntp)# server
172.16.22.44
minpoll 8 maxpoll 12
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
158 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring Broadcast-Based NTP Associates
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 159
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring Broadcast-Based NTP Associates
Use the broadcast client command to set your networking device to listen for NTP broadcast packets
propagated through a network. For broadcast client mode to work, the broadcast server and its clients must
be located on the same subnet. The time server that is transmitting NTP broadcast packets must be enabled
on the interface of the given device using the broadcast command.
Use the broadcast command to set your networking device to send NTP broadcast packets.
Note No specific command enables NTP; the first NTP configuration command that you issue enables NTP.
SUMMARY STEPS
1. configure
2. ntp
3. (Optional) broadcastdelay microseconds
4. interface type interface-path-id
5. broadcast client
6. broadcast [destination ip-address] [key key-id] [version number]
7. Use one of the following commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
160 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring Broadcast-Based NTP Associates
Example:
RP/0/RSP0/CPU0:router(config-ntp)#
interface POS 0/1/0/0
Step 5 broadcast client Configures the specified interface to receive NTP broadcast packets.
Note Go to Step 6, on page 161 to configure the interface to send
Example: NTP broadcast packets.
RP/0/RSP0/CPU0:router(config-ntp-int)#
broadcast client
Step 6 broadcast [destination ip-address] [key key-id] Configures the specified interface to send NTP broadcast packets.
[version number] Note Go to Step 5, on page 161 to configure the interface to
receive NTP broadcast packets.
Example:
RP/0/RSP0/CPU0:router(config-ntp-int)#
broadcast
destination 10.50.32.149
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 161
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring NTP Access Groups
Note No specific command enables NTP; the first NTP configuration command that you issue enables NTP.
The access list-based restriction scheme allows you to grant or deny certain access privileges to an entire
network, a subnet within a network, or a host within a subnet.
The access group options are scanned in the following order, from least restrictive to most restrictive:
1 peer—Allows time requests and NTP control queries and allows the system to synchronize itself to a
system whose address passes the access list criteria.
2 serve—Allows time requests and NTP control queries, but does not allow the system to synchronize itself
to a system whose address passes the access list criteria.
3 serve-only—Allows only time requests from a system whose address passes the access list criteria.
4 query-only—Allows only NTP control queries from a system whose address passes the access list criteria.
If the source IP address matches the access lists for more than one access type, the first type is granted. If no
access groups are specified, all access types are granted to all systems. If any access groups are specified,
only the specified access types are granted.
For details on NTP control queries, see RFC 1305 (NTP version 3).
SUMMARY STEPS
1. configure
2. ntp
3. access-group{peer | query-only | serve | serve-only} access-list-name
4. Use one of the following commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
162 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring NTP Authentication
Example:
RP/0/RSP0/CPU0:router(config-ntp)#
access-group peer access1
Note No specific command enables NTP; the first NTP configuration command that you issue enables NTP.
The encrypted NTP authentication scheme should be used when a reliable form of access control is required.
Unlike the access-list-based restriction scheme that is based on IP addresses, the encrypted authentication
scheme uses authentication keys and an authentication process to determine if NTP synchronization packets
sent by designated peers or servers on a local network are deemed as trusted, before the time information that
it carries along is accepted.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 163
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring NTP Authentication
The authentication process begins from the moment an NTP packet is created. A message authentication code
(MAC) is computed using the MD5 Message Digest Algorithm and the MAC is embedded into an NTP
synchronization packet. The NTP synchronization packet together with the embedded MAC and key number
are transmitted to the receiving client. If authentication is enabled and the key is trusted, the receiving client
computes the MAC in the same way. If the computed MAC matches the embedded MAC, the system is
allowed to sync to the server that uses this key in its packets.
After NTP authentication is properly configured, your networking device only synchronizes with and provides
synchronization to trusted time sources.
SUMMARY STEPS
1. configure
2. ntp
3. authenticate
4. authentication-key key-number md5 [clear | encrypted] key-name
5. trusted-key key-number
6. Use one of the following commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Example:
RP/0/RSP0/CPU0:router(config-ntp)#
authenticate
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
164 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Disabling NTP Services on a Specific Interface
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 165
Implementing NTP on the Cisco ASR 9000 Series Router
Disabling NTP Services on a Specific Interface
SUMMARY STEPS
1. configure
2. ntp
3. Use one of the following commands:
• no interface type interface-path-id
• interface type interface-path-id disable
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Step 3 Use one of the following commands: Disables NTP services on the specified interface.
• no interface type interface-path-id
• interface type interface-path-id disable
Example:
RP/0/RSP0/CPU0:router(config-ntp)# no
interface pos 0/0/0/1
or
RP/0/RSP0/CPU0:router(config-ntp)# interface
POS 0/0/0/1 disable
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
166 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring the Source IP Address for NTP Packets
Note No specific command enables NTP; the first NTP configuration command that you issue enables NTP.
SUMMARY STEPS
1. configure
2. ntp
3. source type interface-path-id
4. Use one of the following commands:
• end
• commit
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 167
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring the System as an Authoritative NTP Server
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Step 3 source type interface-path-id Configures an interface from which the IP source address is taken.
Note This interface is used for the source address for all packets sent to all
Example: destinations. If a source address is to be used for a specific association,
RP/0/RSP0/CPU0:router(config-ntp)# use the source keyword in the peer or server command shown
source POS 0/0/0/1 in Configuring Poll-Based Associations, on page 157.
Step 4 Use one of the following commands: Saves configuration changes.
• end • When you issue the end command, the system prompts you to commit
changes:
• commit
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
168 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Configuring the System as an Authoritative NTP Server
Note No specific command enables NTP; the first NTP configuration command that you issue enables NTP.
SUMMARY STEPS
1. configure
2. ntp
3. master stratum
4. Use one of the following commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 169
Implementing NTP on the Cisco ASR 9000 Series Router
Updating the Hardware Clock
Note No specific command enables NTP; the first NTP configuration command that you issue enables NTP.
SUMMARY STEPS
1. configure
2. ntp
3. update-calendar
4. Use one of the following commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
170 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Verifying the Status of the External Reference Clock
Example:
RP/0/RSP0/CPU0:router(config)# ntp
Step 3 update-calendar Configures the router t o update its system calendar from the software clock
at periodic intervals.
Example:
RP/0/RSP0/CPU0:router(config-ntp)#
update-calendar
SUMMARY STEPS
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 171
Implementing NTP on the Cisco ASR 9000 Series Router
Configuration Examples for Implementing NTP
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# show ntp associations
Step 2 show ntp status [location node-id] Displays the status of NTP.
Example:
RP/0/RSP0/CPU0:router# show ntp status
Examples
The following is sample output from the show ntp associations command:
The following is sample output from the show ntp status command:
ntp
server 10.0.2.1 minpoll 5 maxpoll 7
peer 192.168.22.33
server 172.19.69.1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
172 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Configuration Examples for Implementing NTP
ntp
interface GigabitEthernet 0/2/0/0
broadcast client
exit
broadcastdelay 2
The following example shows an NTP server configuration where Gigabit Ethernet interface 0/2/0/2 is
configured to be a broadcast server:
ntp
interface GigabitEthernet 0/2/0/2
broadcast
ntp
peer 10.1.1.1
peer 10.1.1.1
peer 10.2.2.2
peer 10.3.3.3
peer 10.4.4.4
peer 10.5.5.5
peer 10.6.6.6
peer 10.7.7.7
peer 10.8.8.8
access-group peer peer-acl
access-group serve serve-acl
access-group serve-only serve-only-acl
access-group query-only query-only-acl
exit
ipv4 access-list peer-acl
10 permit ip host 10.1.1.1 any
20 permit ip host 10.8.8.8 any
exit
ipv4 access-list serve-acl
10 permit ip host 10.4.4.4 any
20 permit ip host 10.5.5.5 any
exit
ipv4 access-list query-only-acl
10 permit ip host 10.2.2.2 any
20 permit ip host 10.3.3.3 any
exit
ipv4 access-list serve-only-acl
10 permit ip host 10.6.6.6 any
20 permit ip host 10.7.7.7 any
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 173
Implementing NTP on the Cisco ASR 9000 Series Router
Configuration Examples for Implementing NTP
exit
ntp
authenticate
authentication-key 2 md5 encrypted 06120A2D40031D1008124
authentication-key 3 md5 encrypted 1311121E074110232621
trusted-key 3
server 10.3.32.154 key 3
peer 10.32.154.145 key 2
ntp
interface GigabitEthernet0/2/0/0
disable
exit
authentication-key 2 md5 encrypted 06120A2D40031D1008124
authentication-key 3 md5 encrypted 1311121E074110232621
authenticate
trusted-key 3
server 10.3.32.154 key 3
peer 10.32.154.145 key 2
ntp
authentication-key 2 md5 encrypted 06120A2D40031D1008124
authentication-key 3 md5 encrypted 1311121E074110232621
authenticate
trusted-key 3
server 10.3.32.154 key 3
peer 10.32.154.145 key 2
source MgmtEth0/0/CPU0/0
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
174 OL-23202-05
Implementing NTP on the Cisco ASR 9000 Series Router
Additional References
ntp
master 6
ntp
server 10.3.32.154
update-calendar
Additional References
The following sections provide references related to implementing NTP on Cisco IOS XR software.
Related Documents
Cisco IOS XR NTP commands NTP Commands on module of Cisco ASR 9000
Series Aggregation Services Router System
Management Command Reference
Information about getting started with Cisco IOS XR Cisco ASR 9000 Series Aggregation Services Router
Software Getting Started Guide
Cisco IOS XR master command index Cisco ASR 9000 Series Aggregation Services Router
Commands Master List
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 175
Implementing NTP on the Cisco ASR 9000 Series Router
Additional References
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFCs Title
RFC 1059 Network Time Protocol, Version 1: Specification and Implementation
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
176 OL-23202-05
CHAPTER 10
Implementing Physical and Virtual Terminals on
the Cisco ASR 9000 Series Router
Line templates define standard attribute settings for incoming and outgoing transport over physical and
virtual terminal lines (vtys). Vty pools are used to apply template settings to ranges of vtys.
Note Before creating or modifying the vty pools, enable the telnet server using the telnet server command in
global configuration mode. See Cisco ASR 9000 Series Aggregation Services Router IP Addresses and
Services Configuration Guide and Cisco ASR 9000 Series Aggregation Services Router IP Addresses and
Services Command Reference for more information.
This module describes the new and revised tasks you need to implement physical and virtual terminals on
your Cisco IOS XR network.
For more information about physical and virtual terminals on the Cisco IOS XR software and complete
descriptions of the terminal services commands listed in this module, see Related Documents, on page 187.
To locate documentation for other commands that might appear in the course of running a configuration
task, search online in Cisco ASR 9000 Series Aggregation Services Router Commands Master List.
Table 25: Feature History for Implementing Physical and Virtual Templates on Cisco IOS XR Software
Release Modification
Release 3.7.2 This feature was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 177
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Prerequisites for Implementing Physical and Virtual Terminals
Line Templates
The following line templates are available in the Cisco IOS XR software.
• Default line template—The default line template that applies to a physical and virtual terminal lines.
• Console line template—The line template that applies to the console line.
• User-defined line templates—User-defined line templates that can be applied to a range of virtual terminal
lines.
After you specify a template with the line command, the router enters line template configuration mode
where you can set the terminal attributes for the specified line. This example shows how to specify the attributes
for the console:
From line template configuration mode, use the online help feature ( ? ) to view all available options. Some
useful options include:
• absolute-timeout—Specifies a timeout value for line disconnection.
• escape-character—Changes the line escape character.
• exec-timeout—Specifies the EXEC timeout.
• length—Sets the number of lines displayed on the screen.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
178 OL-23202-05
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Line Template Guidelines
Attributes not defined in the console template, or any virtual template, are taken from the default template.
The default settings for the default template are described for all commands in line template configuration
mode in the Terminal Services Commands on the Cisco ASR 9000 Series Router module in Cisco ASR 9000
Series Aggregation Services Router System Management Command Reference.
Note Before creating or modifying the vty pools, enable the telnet server using the telnet server command in
global configuration mode. See Cisco ASR 9000 Series Aggregation Services Router IP Addresses and
Services Configuration Guide and Cisco ASR 9000 Series Aggregation Services Router IP Addresses and
Services Command Reference for more information.
Terminal Identification
The physical terminal lines for the console port is identified by its location, expressed in the format of
rack/slot/module , on the active or standby route processor (RP) where the respective console port resides.
For virtual terminals, physical location is not applicable; the Cisco IOS XR software assigns a vty identifier
to vtys according to the order in which the vty connection has been established.
vty Pools
Each virtual line is a member of a pool of connections using a common line template configuration. Multiple
vty pools may exist, each containing a defined number of vtys as configured in the vty pool. The Cisco IOS XR
software supports the following vty pools by default:
• Default vty pool—The default vty pool consists of five vtys (vtys 0 through 4) that each reference the
default line template.
• Default fault manager pool—The default fault manager pool consists of six vtys (vtys 100 through 105)
that each reference the default line template.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 179
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
How to Implement Physical and Virtual Terminals on Cisco IOS XR Software
In addition to the default vty pool and default fault manager pool, you can also configure a user-defined vty
pool that can reference the default template or a user-defined template.
When configuring vty pools, follow these guidelines:
• The vty range for the default vty pool must start at vty 0 and must contain a minimum of five vtys.
• The vty range from 0 through 99 can reference the default vty pool.
• The vty range from 5 through 99 can reference a user-defined vty pool.
• The vty range from 100 is reserved for the fault manager vty pool.
• The vty range for fault manager vty pools must start at vty 100 and must contain a minimum of six vtys.
• A vty can be a member of only one vty pool. A vty pool configuration will fail if the vty pool includes
a vty that is already in another pool.
• If you attempt to remove an active vty from the active vty pool when configuring a vty pool, the
configuration for that vty pool will fail.
SUMMARY STEPS
1. configure
2. line {console | default}
3. Configure the terminal attribute settings for the specified template using the commands in line template
configuration mode.
4. Use one of the following commands:
• end
• commit
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
180 OL-23202-05
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Modifying Templates
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Step 2 line {console | default} Enters line template configuration mode for the specified line template.
• console —Enters line template configuration mode for the console
Example: template.
RP/0/RSP0/CPU0:router(config)# line
console • default —Enters line template configuration mode for the default
or line template.
RP/0/RSP0/CPU0:router(config)# line
default
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 181
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Creating and Modifying vty Pools
SUMMARY STEPS
1. configure
2. telnet {ipv4 | ipv6} server max-servers limit
3. line template template-name
4. Configure the terminal attribute settings for the specified line template using the commands in line template
configuration mode.
5. exit
6. vty-pool {default | pool-name | eem} first-vty last-vty [line-template {default | template-name}]
7. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Step 2 telnet {ipv4 | ipv6} server max-servers limit Specifies the number of allowable Telnet servers. Up to 100 Telnet servers
are allowed.
Example: Note By default no Telnet servers are allowed. You must configure this
RP/0/RSP0/CPU0:router(config)# telnet command in order to enable the use of Telnet servers.
Step 3 line template template-name Enters line template configuration mode for a user-defined template.
Example:
RP/0/RSP0/CPU0:router(config)# line
template 1
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
182 OL-23202-05
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Creating and Modifying vty Pools
Step 6 vty-pool {default | pool-name | eem} first-vty Creates or modifies vty pools.
last-vty [line-template {default |
template-name}] • If you do not specify a line template with the line-template keyword,
a vty pool defaults to the default line template.
Example: • default —Configures the default vty pool.
RP/0/RSP0/CPU0:router(config)# vty-pool ◦The default vty pool must start at vty 0 and must contain a
default 0 5 line-template default
minimum of five vtys (vtys 0 through 4).
or ◦You can resize the default vty pool by increasing the range of
vtys that compose the default vty pool.
RP/0/RSP0/CPU0:router(config)# vty-pool
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 183
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Monitoring Terminals and Terminal Sessions
SUMMARY STEPS
1. (Optional) show line [aux location node-id | console location node-id | vty number]
2. (Optional) show terminal
3. (Optional) show users
DETAILED STEPS
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
184 OL-23202-05
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Configuration Examples for Implementing Physical and Virtual Terminals
line console
exec-timeout 0 0
escape-character 0x5a
session-limit 10
disconnect-character 0x59
session-timeout 100
transport input telnet
transport output telnet
In this configuration example, the following terminal attributes are applied to the console line template:
• The EXEC time out for terminal sessions is set to 0 minutes, 0 seconds. Setting the EXEC timeout to 0
minutes and 0 seconds disables the EXEC timeout function; thus, the EXEC session for the terminal
session will never time out.
• The escape character is set to the 0x5a hexadecimal value (the 0x5a hexadecimal value translates into
the “Z” character).
• The session limit for outgoing terminal sessions is set to 10 connections.
• The disconnect character is set to 0x59 hexadecimal value (the 0x59 hexadecimal character translates
into the “Y” character).
• The session time out for outgoing terminal sessions is set to 100 minutes (1 hour and 40 minutes).
• The allowed transport protocol for incoming terminal sessions is Telnet.
• The allowed transport protocol for outgoing terminal sessions is Telnet.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 185
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Configuration Examples for Implementing Physical and Virtual Terminals
To verify that the terminal attributes for the console line template have been applied to the console, use the
show line command:
In this example, the following terminal attributes override the default line template default terminal attribute
settings:
• The EXEC timeout for terminal sessions is set to 0 minutes and 0 seconds. Setting the EXEC timeout
to 0 minutes and 0 seconds disables the EXEC timeout function; thus, the EXEC session for the terminal
session will never time out (the default EXEC timeout for the default line template is 10 minutes).
• The width of the terminal screen for the terminals referencing the default template is set to 512 characters
(the default width for the default line template is 80 characters).
• The length, the number of lines that will display at one time on the terminal referencing the default
template, is set to 512 lines (the default length for the default line template is 24 lines).
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
186 OL-23202-05
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Additional References
exit
vty-pool pool1 5 50 line-template test2
Configuring a User-Defined Template to Reference the Fault Manager vty Pool: Example
This configuration example shows how to configure a user-defined line template (named test3 in this example)
for vtys and to configure the line template test to reference the fault manager vty pool:
line template test3
width 110
length 100
session-timeout 100
exit
vty-pool eem 100 106 line-template test3
Additional References
The following sections provide references related to implementing physical and virtual terminals on
Cisco IOS XR software.
Related Documents
Cisco IOS XR command master index Cisco ASR 9000 Series Aggregation Services Router
Commands Master List
Information about getting started with Cisco IOS XR Cisco ASR 9000 Series Aggregation Services Router
software Getting Started Guide
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 187
Implementing Physical and Virtual Terminals on the Cisco ASR 9000 Series Router
Additional References
MIBs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
188 OL-23202-05
CHAPTER 11
Implementing SNMP on the Cisco ASR 9000
Series Router
Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message
format for communication between SNMP managers and agents. SNMP provides a standardized framework
and a common language used for the monitoring and management of devices in a network.
This module describes the new and revised tasks you need to implement SNMP on your Cisco IOS XR
network.
For detailed conceptual information about SNMP on the Cisco IOS XR software and complete descriptions
of the SNMP commands listed in this module, see Related Documents, on page 217. For information on
specific MIBs, refer to Cisco ASR 9000 Series Aggregation Services Routers MIB Specifications Guide. To
locate documentation for other commands that might appear in the course of performing a configuration
task, search online in Cisco ASR 9000 Series Aggregation Services Router Commands Master List.
Table 26: Feature History for Implementing SNMP on Cisco IOS XR Software
Release Modification
Release 3.7.2 This feature was introduced.
Release 3.9.0 Support was added for 3DES and AES encryption.
The ability to preserve ENTITY-MIB and
CISCO-CLASS-BASED-QOS-MIB data was added.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 189
Implementing SNMP on the Cisco ASR 9000 Series Router
Prerequisites for Implementing SNMP
SNMP Manager
The SNMP manager is the system used to control and monitor the activities of network hosts using SNMP.
The most common managing system is called a network management system (NMS). The term NMS can be
applied to either a dedicated device used for network management, or the applications used on such a device.
A variety of network management applications are available for use with SNMP. These features range from
simple command-line applications to feature-rich graphical user interfaces (such as the CiscoWorks 2000 line
of products).
SNMP Agent
The SNMP agent is the software component within the managed device that maintains the data for the device
and reports these data, as needed, to managing systems. The agent and MIB reside on the router. To enable
the SNMP agent, you must define the relationship between the manager and the agent.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
190 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
SNMP Notifications
MIB
The Management Information Base (MIB) is a virtual information storage area for network management
information, which consists of collections of managed objects. Within the MIB there are collections of related
objects, defined in MIB modules. MIB modules are written in the SNMP MIB module language, as defined
in STD 58, RFC 2578, RFC 2579, and RFC 2580. Note that individual MIB modules are also referred to as
MIBs; for example, the Interfaces Group MIB (IF-MIB) is a MIB module within the MIB on your system.
The SNMP agent contains MIB variables whose values the SNMP manager can request or change through
Get or Set operations. A manager can get a value from an agent or store a value into that agent. The agent
gathers data from the MIB, the repository for information about device parameters and network data. The
agent can also respond to manager requests to get or set data.
Figure 4: Communication Between an SNMP Agent and Manager, on page 191 illustrates the communications
relationship between the SNMP manager and agent. A manager can send the agent requests to get and set
MIB values. The agent can respond to these requests. Independent of this interaction, the agent can send
unsolicited notifications (traps) to the manager to notify the manager of network conditions.
Related Topics
Additional References, on page 217
SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications do
not require that requests be sent from the SNMP manager. On Cisco IOS XR software, unsolicited
(asynchronous) notifications can be generated only as traps. Traps are messages alerting the SNMP manager
to a condition on the network. Notifications can indicate improper user authentication, restarts, the closing of
a connection, loss of connection to a neighbor router, or other significant events.
Note Inform requests (inform operations) are not supported in Cisco IOS XR software.
Traps are less reliable than informs because the receiver does not send any acknowledgment when it receives
a trap. The sender cannot determine if the trap was received. An SNMP manager that receives an inform
request acknowledges the message with an SNMP response protocol data unit (PDU). If the manager does
not receive an inform request, it does not send a response. If the sender never receives a response, the inform
request can be sent again. Thus, informs are more likely to reach their intended destination.
However, traps are often preferred because informs consume more resources in the router and in the network.
Unlike a trap, which is discarded as soon as it is sent, an inform request must be held in memory until a
response is received or the request times out. Also, traps are sent only once, and an inform may be retried
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 191
Implementing SNMP on the Cisco ASR 9000 Series Router
SNMP Versions
several times. The retries increase traffic and contribute to a higher overhead on the network. Thus, traps and
inform requests provide a trade-off between reliability and resources.
In this illustration, the agent router sends a trap to the SNMP manager. Although the manager receives the
trap, it does not send any acknowledgment to the agent. The agent has no way of knowing that the trap reached
its destination.
Figure 5: Trap Received by the SNMP Manager
In this illustration, the agent sends a trap to the manager, but the trap does not reach the manager. Because
the agent has no way of knowing that the trap did not reach its destination, the trap is not sent again. The
manager never receives the trap.
Figure 6: Trap Not Received by the SNMP Manager
SNMP Versions
Cisco IOS XR software supports the following versions of SNMP:
• Simple Network Management Protocol Version 1 (SNMPv1)
• Simple Network Management Protocol Version 2c (SNMPv2c)
• Simple Network Management Protocol Version 3 (SNMPv3)
Both SNMPv1 and SNMPv2c use a community-based form of security. The community of managers able to
access the agent MIB is defined by an IP address access control list and password.
SNMPv2c support includes a bulk retrieval mechanism and more detailed error message reporting to
management stations. The bulk retrieval mechanism supports the retrieval of tables and large quantities of
information, minimizing the number of round-trips required. The SNMPv2c improved error handling support
includes expanded error codes that distinguish different kinds of error conditions; these conditions are reported
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
192 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
SNMP Versions
through a single error code in SNMPv1. Error return codes now report the error type. Three kinds of exceptions
are also reported: no such object exceptions, no such instance exceptions, and end of MIB view exceptions.
SNMPv3 is a security model. A security model is an authentication strategy that is set up for a user and the
group in which the user resides. A security level is the permitted level of security within a security model. A
combination of a security model and a security level will determine which security mechanism is employed
when an SNMP packet is handled. See Table 28: SNMP Security Models and Levels, on page 194 for a list
of security levels available in SNMPv3. The SNMPv3 feature supports RFCs 3411 to 3418.
You must configure the SNMP agent to use the version of SNMP supported by the management station. An
agent can communicate with multiple managers; for this reason, you can configure the Cisco IOS-XR software
to support communications with one management station using the SNMPv1 protocol, one using the SNMPv2c
protocol, and another using SMNPv3.
Table 27: SNMPv1, v2c, and v3 Feature Support, on page 193 identifies other key SNMP features supported
by the SNMP v1, v2c, and v3.
Authentication No No Yes
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 193
Implementing SNMP on the Cisco ASR 9000 Series Router
SNMP Versions
Three security models are available: SNMPv1, SNMPv2c, and SNMPv3. The security model combined with
the security level determine the security mechanism applied when the SNMP message is processed.
Table 28: SNMP Security Models and Levels, on page 194 identifies what the combinations of security models
and levels mean.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
194 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
SNMPv3 Benefits
Use of 3DES and AES encryption standards requires that the security package (k9sec) be installed. For
information on installing software packages, see Upgrading and Managing Cisco IOS XR Software.
SNMPv3 Benefits
SNMPv3 provides secure access to devices by providing authentication, encryption and access control. These
added security benefits secure SNMP against the following security threats:
• Masquerade—The threat that an SNMP user may assume the identity of another SNMP user to perform
management operations for which that SNMP user does not have authorization.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 195
Implementing SNMP on the Cisco ASR 9000 Series Router
SNMPv3 Costs
• Message stream modification—The threat that messages may be maliciously reordered, delayed, or
replayed (to an extent that is greater than can occur through the natural operation of a subnetwork service)
to cause SNMP to perform unauthorized management operations.
• Disclosure—The threat that exchanges between SNMP engines could be eavesdropped. Protecting
against this threat may be required as a matter of local policy.
In addition, SNMPv3 provides access control over protocol operations on SNMP managed objects.
SNMPv3 Costs
SNMPv3 authentication and encryption contribute to a slight increase in the response time when SNMP
operations on MIB objects are performed. This cost is far outweighed by the security advantages provided
by SNMPv3.
Table 29: Order of Response Times from Least to Greatest, on page 196 shows the order of response time
(from least to greatest) for the various security model and security level combinations.
SNMPv3 noAuthNoPriv
SNMPv3 authNoPriv
SNMPv3 authPriv
SNMPv3 authorizes management operations only by configured users and encrypts SNMP messages.
USM uses two authentication protocols:
• HMAC-MD5-96 authentication protocol
• HMAC-SHA-96 authentication protocol
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
196 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
IP Precedence and DSCP Support for SNMP
USM uses Cipher Block Chaining (CBC)-DES (DES-56) as the privacy protocol for message encryption.
MIB Views
For security reasons, it is often valuable to be able to restrict the access rights of some groups to only a subset
of the management information within the management domain. To provide this capability, access to a
management object is controlled through MIB views, which contain the set of managed object types (and,
optionally, the specific instances of object types) that can be viewed.
Access Policy
Access policy determines the access rights of a group. The three types of access rights are as follows:
• read-view access—The set of object instances authorized for the group when objects are read.
• write-view access—The set of object instances authorized for the group when objects are written.
• notify-view access—The set of object instances authorized for the group when objects are sent in a
notification.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 197
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring SNMPv3
Configuring SNMPv3
This task explains how to configure SNMPv3 for network management and monitoring.
Note No specific command enables SNMPv3; the first snmp-server global configuration command that you
issue enables SNMPv3. Therefore, the sequence in which you issue the snmp-server commands for this
task does not matter.
SUMMARY STEPS
1. configure
2. (Optional) snmp-server engineid local engine-id
3. snmp-server view view-name oid-tree {included | excluded}
4. snmp-server group name {v1 | v2c | v3 {auth | noauth | priv}} [read view] [write view] [notify view]
[access-list-name]
5. snmp-server user username groupname {v1 | v2c | v3 [auth {md5 | sha} {clear | encrypted}
auth-password [priv des56 {clear | encrypted} priv-password]]} [access-list-name]
6. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
198 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring SNMPv3
Example:
RP/0/RSP0/CPU0:router(config)# snmp-server view
Step 4 snmp-server group name {v1 | v2c | v3 {auth | noauth Configures a new SNMP group or a table that maps SNMP
| priv}} [read view] [write view] [notify view] users to SNMP views.
[access-list-name]
Example:
RP/0/RSP0/CPU0:router(config)# snmp-server group
Step 5 snmp-server user username groupname Configures a new user to an SNMP group.
{v1 | v2c | v3 [auth {md5 | sha} {clear | encrypted}
auth-password [priv des56 {clear | encrypted}
priv-password]]} [access-list-name]
Example:
RP/0/RSP0/CPU0:router(config)# snmp-server user
noauthuser group_name v3
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 199
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring SNMP Trap Notifications
Note You can omit Step 2, on page 198 to Step 4, on page 199 if you have already completed the steps
documented under the Configuring SNMPv3, on page 198 task.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
200 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring SNMP Trap Notifications
SUMMARY STEPS
1. configure
2. (Optional) snmp-server engineid local engine-id
3. snmp-server group name {v1 | v2c | v3 {auth | noauth | priv}} [read view] [write view] [notify view]
[access-list-name]
4. snmp-server user username groupname {v1 | v2c | v3 [auth {md5 | sha} {clear | encrypted}
auth-password [priv des56 {clear | encrypted} priv-password]]} [access-list-name]
5. snmp-server host address [traps] [version {1 | 2c | 3 [auth | noauth | priv]}] community-string [udp-port
port] [notification-type]
6. snmp-server traps [notification-type]
7. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Step 3 snmp-server group name {v1 | v2c | v3 {auth | noauth Configures a new SNMP group or a table that maps SNMP users
| priv}} [read view] [write view] [notify view] to SNMP views.
[access-list-name]
Example:
RP/0/RSP0/CPU0:router(config)# snmp-server
group
group_name v3 noauth read view_name1 write
view_name2
Step 4 snmp-server user username groupname Configures a new user to an SNMP group.
{v1 | v2c | v3 [auth {md5 | sha} {clear | encrypted}
auth-password [priv des56 {clear | encrypted}
priv-password]]} [access-list-name]
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 201
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring SNMP Trap Notifications
Example:
RP/0/RSP0/CPU0:router(config)# snmp-server user
noauthuser group_name v3
Step 5 snmp-server host address [traps] [version {1 | 2c | 3 Specifies SNMP trap notifications, the version of SNMP to use,
[auth | noauth | priv]}] community-string [udp-port the security level of the notifications, and the recipient (host) of
port] [notification-type] the notifications.
Example:
RP/0/RP0/CPU0:router(config)# snmp-server host
12.26.25.61 traps version 3
noauth userV3noauth
Step 6 snmp-server traps [notification-type] Enables the sending of trap notifications and specifies the type
of trap notifications to be sent.
Example: • If a trap is not specified with the notification-type
RP/0/RP0/CPU0:router(config)# snmp-server traps
bgp argument, all supported trap notifications are enabled on
the router. To display which trap notifications are available
on your router, enter the snmp-server traps ? command.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
202 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Setting the Contact, Location, and Serial Number of the SNMP Agent
Setting the Contact, Location, and Serial Number of the SNMP Agent
This task explains how to set the system contact string, system location string, and system serial number of
the SNMP agent.
Note The sequence in which you issue the snmp-server commands for this task does not matter.
SUMMARY STEPS
1. configure
2. (Optional) snmp-server contact system-contact-string
3. (Optional) snmp-server location system-location
4. (Optional) snmp-server chassis-id serial-number
5. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 203
Implementing SNMP on the Cisco ASR 9000 Series Router
Defining the Maximum SNMP Agent Packet Size
Note The sequence in which you issue the snmp-server commands for this task does not matter.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
204 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Defining the Maximum SNMP Agent Packet Size
SUMMARY STEPS
1. configure
2. (Optional) snmp-server packetsize byte-count
3. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 205
Implementing SNMP on the Cisco ASR 9000 Series Router
Changing Notification Operation Values
Note The sequence in which you issue the snmp-server commands for this task does not matter.
SUMMARY STEPS
1. configure
2. (Optional) snmp-server trap-source type interface-path-id
3. (Optional) snmp-server queue-length length
4. (Optional) snmp-server trap-timeout seconds
5. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
206 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Setting IP Precedence and DSCP Values
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 207
Implementing SNMP on the Cisco ASR 9000 Series Router
Setting IP Precedence and DSCP Values
SUMMARY STEPS
1. configure
2. Use one of the following commands:
• snmp-server ipv4 precedence value
• snmp-server ipv4 dscp value
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Step 2 Use one of the following commands: Configures an IP precedence or IP DSCP value for SNMP traffic.
• snmp-server ipv4 precedence value
• snmp-server ipv4 dscp value
Example:
RP/0/RSP0/CPU0:router(config)#
snmp-server dscp 24
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
208 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring MIB Data to be Persistent
SUMMARY STEPS
DETAILED STEPS
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 209
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring LinkUp and LinkDown Traps for a Subset of Interfaces
Step 5 snmp-server ifindex persist Enables ifIndex persistence globally on all Simple
Network Management Protocol (SNMP) interfaces.
Example:
RP/0/RSP0/CPU0:router(config)# snmp-server ifindex
persist
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
210 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring LinkUp and LinkDown Traps for a Subset of Interfaces
SUMMARY STEPS
1. configure
2. snmp-server interface subset subset-number regular-expression expression
3. notification linkupdown disable
4. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Step 2 snmp-server interface subset subset-number Enters snmp-server interface mode for the interfaces identified by
regular-expression expression the regular expression.
The subset-number argument identifies the set of interfaces, and
Example: also assigns a priority to the subset in the event that an interface is
RP/0/RSP0/CPU0:router(config)# snmp-server included in more than one subset. Lower numbers have higher
interface subset 10 priority and their configuration takes precedent over interface
regular-expression subsets with higher numbers.
"^Gig[a-zA-Z]+[0-9/]+\."
RP/0/RSP0/CPU0:router(config-snmp-if-subset)# The expression argument must be entered surrounded by double
quotes.
Refer to the Understanding Regular Expressions, Special
Characters, and Patterns module in Cisco ASR 9000 Series
Aggregation Services Router Getting Started Guide for more
information regarding regular expressions.
Step 3 notification linkupdown disable Disables linkUp and linkDown traps for all interfaces being
configured. To enable previously disabled interfaces, use the no
Example: form of this command.
RP/0/RSP0/CPU0:router(config-snmp-if-subset)#
notification linkupdown disable
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 211
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring LinkUp and LinkDown Traps for a Subset of Interfaces
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
212 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuration Examples for Implementing SNMP
Note After the engine ID has been configured, the SNMP agent restarts.
config
show snmp engineid
Creating a View
There are two ways to create a view:
• You can include the object identifier (OID) of an ASN.1 subtree of a MIB family from a view by using
the included keyword of the snmp-server view command.
• You can exclude the OID subtree of the ASN.1 subtree of a MIB family from a view by using the
excluded keyword of the snmp-server view command.
This example shows how to create a view that includes the sysName (1.3.6.1.2.1.1.5) object:
config
snmp-server view view_name 1.3.6.1.2.1.1.5 included
This example shows how to create a view that includes all the OIDs of a system group:
config
snmp-server view view_name 1.3.6.1.2.1.1 included
This example shows how to create a view that includes all the OIDs under the system group except the sysName
object (1.3.6.1.2.1.1.5), which has been excluded:
config
snmp-server view view_name 1.3.6.1.2.1.1 included
snmp-server view view_name 1.3.6.1.2.1.1.5 excluded
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 213
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring SNMPv3: Examples
Creating Groups
If you do not explicitly specify a notify, read, or write view, the Cisco IOS XR software uses the v1 default
(1.3.6.1). This example shows how to create a group that utilizes the default view:
The following configuration example shows how to create a group that has read access to all the OIDs in the
system except the sysUpTime object (1.3.6.1.2.1.1.3), which has been excluded from the view applied to the
group, but write access only to the sysName object (1.3.6.1.2.1.1.5):
!
snmp-server view view_name1 1.3.6.1.2.1.1 included
snmp-server view view_name1 1.3.6.1.2.1.1.3 excluded
snmp-server view view_name2 1.3.6.1.2.1.1.5 included
snmp-server group group_name v3 auth read view_name1 write view_name2
!
Verifying Groups
This example shows how to verify the attributes of configured groups:
!
snmp-server view view_name1 1.3.6.1.2.1.1 included
snmp-server group group_name v3 noauth read view_name write view-name
!
This example shows how to create a noAuthNoPriv user with read and write view access to a system group:
config
snmp-server user noauthuser group_name v3
Note The user must belong to a noauth group before a noAuthNoPriv user can be created.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
214 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring SNMPv3: Examples
This example shows how to verify the attributes that apply to the SNMP user:
!
snmp-server view view_name 1.3.6.1.2.1.1 included
snmp group group_name v3 priv read view_name write view_name
!
This example shows how to create authNoPriv user with read and write view access to a system group:
Note Because the group is configured at a security level of Auth, the user must be configured as “auth” at a
minimum to access this group (“priv” users could also access this group). The authNoPriv user configured
in this group, authuser, must supply an authentication password to access the view. In the example,
auth_passwd is set as the authentication password string. Note that clear keyword is specified before the
auth_passwd password string. The clear keyword indicates that the password string being supplied is
unencrypted.
This example shows how to verify the attributes that apply to SNMP user:
!
snmp view view_name 1.3.6.1.2.1.1 included
snmp group group_name v3 priv read view_name write view_name
!
This example shows how to create an authPriv user with read and write view access to a system group:
config
snmp-server user privuser group_name v3 auth md5 clear auth_passwd priv des56 clear
priv_passwd
Note Because the group has a security level of Priv, the user must be configured as a “priv” user to access this
group. In this example, the user, privuser, must supply both an authentication password and privacy
password to access the OIDs in the view.
This example shows how to verify the attributes that apply to the SNMP user:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 215
Implementing SNMP on the Cisco ASR 9000 Series Router
Configuring Trap Notifications: Example
Note The default User Datagram Protocol (UDP) port is 161. If you do not a specify a UDP port with the
udp-port keyword and port argument, then the configured SNMP trap notifications are sent to port 161.
!
snmp-server host 10.50.32.170 version 2c userv2c udp-port 2345
snmp-server host 10.50.32.170 version 3 auth userV3auth udp-port 2345
snmp-server host 10.50.32.170 version 3 priv userV3priv udp-port 2345
snmp-server host 10.50.32.170 version 3 noauth userV3noauth udp-port 2345
snmp-server user userv2c groupv2c v2c
snmp-server user userV3auth groupV3auth v3 auth md5 encrypted 140F0A13
snmp-server user userV3priv groupV3priv v3 auth md5 encrypted 021E1C43 priv des56 encrypted
1110001C
snmp-server user userV3noauth groupV3noauth v3 LROwner
snmp-server view view_name 1.3 included
snmp-server community public RW
snmp-server group groupv2c v2c read view_name
snmp-server group groupV3auth v3 auth read view_name
snmp-server group groupV3priv v3 priv read view_name
snmp-server group groupV3noauth v3 noauth read view_name
!
This example shows how to verify the configuration SNMP trap notification recipients host, the recipients of
SNMP trap notifications. The output displays the following information:
• IP address of the configured notification host
• UDP port where SNMP notification messages are sent
• Type of trap configured
• Security level of the configured user
• Security model configured
config
show snmp host
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
216 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Setting an IP Precedence Value for SNMP Traffic: Example
configure
snmp-server ipv4 precedence 7
exit
configure
snmp-server ipv4 dscp 45
exit
Additional References
The following sections provide references related to Implementing SNMP on Cisco IOS XR software.
Related Documents
Getting started with Cisco IOS XR software Cisco ASR 9000 Series Aggregation Services Router
Getting Started Guide
Information about user groups and task IDs Configuring AAA Services on the Cisco ASR 9000
Series Router module of Cisco ASR 9000 Series
Aggregation Services Router System Security
Configuration Guide
Cisco IOS XR Quality of Service Cisco ASR 9000 Series Aggregation Services Router
Modular Quality of Service Configuration Guide
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 217
Implementing SNMP on the Cisco ASR 9000 Series Router
Additional References
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFCs Title
RFC 3411 An Architecture for Describing Simple Network
Management Protocol (SNMP) Management
Frameworks
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
218 OL-23202-05
Implementing SNMP on the Cisco ASR 9000 Series Router
Additional References
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 219
Implementing SNMP on the Cisco ASR 9000 Series Router
Additional References
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
220 OL-23202-05
CHAPTER 12
Implementing CDP on the Cisco ASR 9000 Series
Router
Cisco Discovery Protocol (CDP) is a media- and protocol-independent protocol that runs on all
Cisco-manufactured equipment including routers, bridges, access and communication servers, and switches.
Using CDP, you can view information about all the Cisco devices that are directly attached to the device.
This module describes the new and revised tasks you need to implement CDP on your Cisco IOS XR network.
For more information about CDP on the Cisco IOS XR software and complete descriptions of the CDP
commands listed in this module, refer to Related Documents, on page 230. To locate documentation for other
commands that might appear in the course of running a configuration task, search online in Cisco ASR 9000
Series Aggregation Services Router Commands Master List.
Table 30: Feature History for Implementing CDP on Cisco IOS XR Software
Release Modification
Release 3.7.2 This feature was introduced.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 221
Implementing CDP on the Cisco ASR 9000 Series Router
Information About Implementing CDP
TLV Definition
Device-ID TLV Identifies the device name in the form of a character string.
Address TLV Contains a list of network addresses of both receiving and sending
devices.
Port-ID TLV Identifies the port on which the CDP packet is sent.
Capabilities TLV Describes the functional capability for the device in the form of a
device type; for example, a switch.
Version TLV Contains information about the software release version on which the
device is running.
Platform TLV Describes the hardware platform name of the device, for example,
Cisco 4500.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
222 OL-23202-05
Implementing CDP on the Cisco ASR 9000 Series Router
How to Implement CDP on Cisco IOS XR Software
TLV Definition
VTP Management Domain TLV Advertises the system’s configured VTP management domain
name-string. Used by network operators to verify VTP domain
configuration in adjacent network nodes.
Native VLAN TLV Indicates, per interface, the assumed VLAN for untagged packets on
the interface. CDP learns the native VLAN for an interface. This
feature is implemented only for interfaces that support the
IEEE 802.1Q protocol.
Full/Half Duplex TLV Indicates status (duplex configuration) of CDP broadcast interface.
Used by network operators to diagnose connectivity problems between
adjacent network elements.
SUMMARY STEPS
1. configure
2. cdp
3. interface type interface-path-id
4. cdp
5. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 223
Implementing CDP on the Cisco ASR 9000 Series Router
Modifying CDP Default Settings
Example:
RP/0/RSP0/CPU0:router(config)# cdp
Example:
RP/0/RSP0/CPU0:router(config)#
interface pos 0/0/0/1
Example:
RP/0/RSP0/CPU0:router(config-if)# cdp
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
224 OL-23202-05
Implementing CDP on the Cisco ASR 9000 Series Router
Modifying CDP Default Settings
SUMMARY STEPS
1. configure
2. cdp advertise v1
3. cdp holdtime seconds
4. cdp timer seconds
5. Use one of these commands:
• end
• commit
DETAILED STEPS
Example:
RP/0/RSP0/CPU0:router# configure
Step 2 cdp advertise v1 Configures CDP to use only version 1 (CDPv1) in communicating with neighboring
devices.
Example: • By default, when CDP is enabled, the router sends CDPv2 packets. CDP also
RP/0/RSP0/CPU0:router(config)# sends and receives CDPv1 packets if the device with which CDP is interacting
cdp advertise v1 does not process CDPv2 packets.
• In this example, the router is configured to send and receive only CDPv1
packets.
Step 3 cdp holdtime seconds Specifies the amount of time that the receiving networking device will hold a CDP
packet sent from the router before discarding it.
Example: • By default, when CDP is enabled, the receiving networking device holds a
RP/0/RSP0/CPU0:router(config)# CDP packet for 180 seconds before discarding it.
cdp holdtime 30
Note The CDP hold time must be set to a higher number of seconds than
the time between CDP transmissions, which is set with the cdp
timer command.
• In this example, the value of hold-time for the seconds argument is set to
30.
Step 4 cdp timer seconds Specifies the frequency at which CDP update packets are sent.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 225
Implementing CDP on the Cisco ASR 9000 Series Router
Monitoring CDP
• Use the commit command to save the configuration changes to the running
configuration file, and remain within the configuration session.
Monitoring CDP
This task shows how to monitor CDP.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
226 OL-23202-05
Implementing CDP on the Cisco ASR 9000 Series Router
Monitoring CDP
SUMMARY STEPS
DETAILED STEPS
Step 2 show cdp interface [type interface-path-id | location node-id] Displays information about the interfaces on which
CDP is enabled.
Example:
RP/0/RSP0/CPU0:router# show cdp interface pos
0/0/0/1
Step 3 show cdp neighbors [type interface-path-id | location Displays detailed information about neighboring
node-id] [detail] devices discovered using CDP.
Example:
RP/0/RSP0/CPU0:router# show cdp neighbors
Step 4 show cdp traffic [location node-id] Displays information about the traffic gathered between
devices using CDP.
Example:
RP/0/RSP0/CPU0:router# show cdp traffic
Examples
The following is sample output for the show cdp neighbors command:
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 227
Implementing CDP on the Cisco ASR 9000 Series Router
Monitoring CDP
The following is sample output for the show cdp neighbors command. In this example, the optional type
instance arguments are used in conjunction with the detail optional keyword to display detailed information
about a CDP neighbor. The output includes information on both IPv4 and IPv6 addresses.
-------------------------
Device ID: uut-user
SysName : uut-user
Entry address(es):
IPv4 address: 1.1.1.1
IPv6 address: 1::1
IPv6 address: 2::2
Platform: cisco 12008/GRP, Capabilities: Router
Interface: POS0/4/0/3
Port ID (outgoing port): POS0/2/0/3
Holdtime : 177 sec
Version :
Cisco IOS XR Software, Version 0.0.0[Default]
Copyright (c) 2005 by cisco Systems, Inc.
advertisement version: 2
The following is sample output for the show cdp entry command. In this example, the optional entry
argument is used to display entry information related to a specific CDP neighbor.
advertisement version: 2
-------------------------
Device ID: router2
SysName : router2
Entry address(es):
Platform: cisco 12008/GRP, Capabilities: Router
Interface: POS0/4/0/0
Port ID (outgoing port): POS0/4/0/1
Holdtime : 145 sec
Version :
Cisco IOS XR Software, Version 0.48.0[Default]
Copyright (c) 2004 by cisco Systems, Inc.
advertisement version: 2
The following is sample output for the show cdp interface command. In this example, CDP information
related to Packet over SONET/SDH (POS) interface 0/4/0/0 is displayed.
POS0/4/0/0 is Up
Encapsulation HDLC
Sending CDP packets every 60 seconds
Holdtime is 180 seconds
The following is sample output for the show cdp traffic command:
CDP counters :
Packets output: 194, Input: 99
Hdr syntax: 0, Chksum error: 0, Encaps failed: 0
No memory: 0, Invalid packet: 0, Truncated: 0
CDP version 1 advertisements output: 0, Input: 0
CDP version 2 advertisements output: 194, Input: 99
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
228 OL-23202-05
Implementing CDP on the Cisco ASR 9000 Series Router
Configuration Examples for Implementing CDP
The following is sample output for the show cdp traffic command. In this example, the optional location
keyword and node-id argument are used to display information about the traffic gathered between devices
using CDP from the specified node.
CDP counters :
Packets output: 16, Input: 13
Hdr syntax: 0, Chksum error: 0, Encaps failed: 0
No memory: 0, Invalid packet: 0, Truncated: 0
CDP version 1 advertisements output: 0, Input: 0
CDP version 2 advertisements output: 16, Input: 13
Unrecognize Hdr version: 0, File open failed: 0
cdp
interface POS0/3/0/0
cdp
cdp timer 20
cdp holdtime 30
cdp advertise v1
The following example shows how to use the show cdp command to verify the CDP global settings:
Additional References
The following sections provide references related to implementing CDP on Cisco IOS XR software.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 229
Implementing CDP on the Cisco ASR 9000 Series Router
Additional References
Related Documents
Cisco IOS XR commands Cisco ASR 9000 Series Aggregation Services Router
Commands Master List
Getting started with Cisco IOS XR Software Cisco ASR 9000 Series Aggregation Services Router
Getting Started Guide
Information about user groups and task IDs Configuring AAA Services on Cisco IOS XR Software
module of Cisco ASR 9000 Series Aggregation
Services Router System Security Configuration Guide
Standards
Standards Title
No new or modified standards are supported by this —
feature, and support for existing standards has not
been modified by this feature.
MIBs
RFCs
RFCs Title
No new or modified RFCs are supported by this —
feature, and support for existing RFCs has not been
modified by this feature.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
230 OL-23202-05
Implementing CDP on the Cisco ASR 9000 Series Router
Additional References
Technical Assistance
Description Link
The Cisco Technical Support website contains http://www.cisco.com/cisco/web/support/index.html
thousands of pages of searchable technical content,
including links to products, technologies, solutions,
technical tips, and tools. Registered Cisco.com users
can log in from this page to access even more content.
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 231
Implementing CDP on the Cisco ASR 9000 Series Router
Additional References
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
232 OL-23202-05
INDEX
A D
access-group command 162, 163 Designated Shelf Controller, See DSC
admin configure command 4, 6, 35, 49, 53, 63, 88, 89, 90, 92, 117, 118, drives, formatting 119
123, 130 DSC 14
admin-config submode, See admin configure command definition 14
asdf 5
authenticate command 164
authentication-key command 164
F
field programmable device (FPD) images 45, 49
B field programmable devices 127
See FPD images 127
broadcast client command 160, 161 File Transfer Protocol (FTP) 32
broadcast command 160, 161 format command 119
broadcastdelay command 160 formatting drives 119
FPD images 45, 49, 127, 128, 130, 131, 132, 144, 145
troubleshooting 144, 145
upgrade 131, 132
C verifying 132
CDP 222, 223, 224, 226 description 127
enabling 223 displaying 130, 131
functional overview 222 default information 131
modifying default settings 224 minimum and current versions 130
monitoring 226 overview for SPAs 128
cdp (global) command 223, 224 upgrade 131, 132
cdp (interface) command 223, 224 FPGA 128
cdp advertise v1 command 225 devices, methods of upgrading 128
cdp holdtime command 225 FTP 32
cdp timer command 225
Cisco IOS XR Software Selector tool 31
committing packages 52 H
config-register command 117, 118
controllers command 119 hardware 96
copy ftp command 33 displaying status 96
copy rcp command 33 hw-module reload command 130, 132
copy tftp command 33
CPU controller bits 122
I
install activate command 45, 47, 54, 55
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 IN-1
Index
N R
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
IN-2 OL-23202-05
Index
RFC 3418, Management Information Base (MIB) for the Simple SNMP (Simple Network Management Protocol) 190, 191, 192,
Network Management Protocol (SNMP) 218 193, 194, 195, 196, 198, 200
rollback 25, 65, 67 manager, description 190
packages 25, 65, 67 agent, description 190
displaying rollback points 65 MIB, description 191
introduction 25 trap notifications 200
last committed set 67 configuring 200
rolling back to points 67 versions 192, 193, 194, 195, 196, 198
ROM Monitor mode 18 security models and levels 194
RP reload 113 SNMPv1,v2c, and v3 comparison 193
SNMPv3 benefits 195
SNMPv3 costs 196
SNMPv3, configuring 198
S snmp-server chassis-id command 203, 204
sample output 132, 134, 143, 144 snmp-server contact command 203
server command 158 snmp-server enable traps command 201, 202
SFTP 32 snmp-server engineid local command 198, 201
show cdp command 225, 226 snmp-server group command 198, 199, 201
show cdp entry command 227 snmp-server host command 201, 202
show cdp interface command 227 snmp-server ipv4 dscp command 208
show cdp neighbors command 227 snmp-server ipv4 precedence command 208
show cdp traffic command 227 snmp-server location command 203, 204
show clock command 35, 37 snmp-server packetsize command 205
show controllers command 119 snmp-server queue-length command 206
show diag command 96, 99 snmp-server trap source command 206
show environment command 105 snmp-server trap-timeout command 206, 207
show fpd package command 130, 131, 134 snmp-server user command 198, 199, 201
show hw-module fpd command 130, 132 snmp-server view command 198, 199
show hw-module subslot command 130, 132 software packages 19, 23, 25, 26, 27, 30, 31, 52, 67
show install active command 35 activation 27, 30
show install pie-info command 35 impact on system 27
show install rollback command 65, 66 prerequisites 30
show interfaces command 120 Cisco IOS XR Software Selector tool 31
show line command 184 committing 52
show platform command 104, 144 deactivation 27, 30
administration EXEC mode 104 impact on system 27
show redundancy command 108, 117 prerequisites 30
show running-config command 120 downgrading 26
show snmp command 198, 200 impact of version changes 26
show snmp engineid command 198, 200 management overview 23
show snmp group command 198, 200 rollback 67
show snmp host command 201, 203 SMUs 19
show snmp users command 198, 200 upgrading 25
show snmp view command 198, 200 version numbers 19
show system verify command 35, 36, 45, 49, 61, 62 source command 167, 168
show terminal command 184, 185 SPA (shared port adapter) 128, 129
show users command 184, 185 See also FPD images
show variables boot command 117 See also FPD images 128
show version command 102 See also FPD images
shutting down a node 115 SSH File Transfer Protocol 32
SMU 19
filenames 19
version numbers 19
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
OL-23202-05 IN-3
Index
T V
TFTP 32 virtual terminals 178, 179, 180, 182
trap notifications 191 default line template 178, 180
Trivial File Transfer Protocol (TFTP) 32 description 178
trusted-key command 164, 165 modifying 180
line template configuration submode 178
description 178
user-defined line templates 178
U description 178
update-calendar command 170, 171 vty pools 179, 182
upgrade cpuctrlbits command 122, 123 description 179
upgrade hw-module fpd command 130, 131, 143 creating 182
modifying 182
vm files 18
Cisco ASR 9000 Series Aggregation Services Router System Management Configuration Guide, Release 4.0
IN-4 OL-23202-05