Cisco C1000 24port 1G POE
Cisco C1000 24port 1G POE
Cisco C1000 24port 1G POE
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2021–2024 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 1 Overview 1
File Systems 64
Autogenerated File Directories and Files 64
Flash Storage 65
Configuring the Configuration Register for Autoboot 65
Crypto Throughput Licensing 66
Unlicensed Feature: Example 68
LED Indicators 68
Related Documentation 68
How to Install and Upgrade the Software 69
Managing and Configuring a Router to Run Using a Consolidated Package 69
Managing and Configuring a Consolidated Package Using copy and boot Commands 69
Configuring a Router to Boot the Consolidated Package via TFTP Using the boot Command:
Example 70
Managing and Configuring a Router to Run Using Individual Packages 76
Installing Subpackages from a Consolidated Package 76
Installing Subpackages from a Consolidated Package on a Flash Drive 85
How to Install and Upgrade the Software for Cisco IOS XE Everest Release 16.6 85
CHAPTER 8 Control Router Access with Passwords and Privilege Levels 133
CHAPTER 10 Console Port, Telnet, SSH Handling, and Reset Button 157
Restrictions and Notes for Console Port, Telnet, and SSH 157
Console Port Overview 157
Console Port Handling Overview 157
Telnet and SSH Overview 158
Reset Button Overview 158
Information About Reset Button Functionality 158
Prerequisites for Enabling the Reset Button Functionality 159
Restrictions for Reset Button in Controller Mode 160
How to Enable the Reset Button Functionality 160
Example: Enable and Disable the Reset Button Functionality 161
Overview 183
Prerequisites for SELinux 183
Restrictions for SELinux 183
Information About SELinux 183
Supported Platforms 184
Configuring SELinux 184
Configuring SELinux (EXEC Mode) 185
Configuring SELinux (CONFIG Mode) 185
Examples for SELinux 185
SysLog Message Reference 186
Verifying SELinux Enablement 186
Troubleshooting SELinux 187
CHAPTER 16 Configuring Digital Subscriber Line for Small Form-Factor Pluggable Modules 219
CHAPTER 21 Configuring VDSL2 and ADSL2/22 Plus for Cisco C1100 Series ISRs 277
CHAPTER 22 Cisco LTE/5G on Cisco 1000 Series Integrated Services Router 321
CHAPTER 26 Cisco Multimode G.SHDSL EFM-ATM in Cisco ISR 1000 Series Routers 415
CHAPTER 29 Dying Gasp Through SNMP, Syslog, and Ethernet OAM 427
Example 2: Dynamic Security Group Tagging and Security Group ACL 527
Troubleshoot the Security Group Tagging Configuration 528
Feature History for Cisco TrustSec 528
The 4-port platforms are midrange performance managed service provider platforms and enterprise platforms
with the following specifications:
• 4-port integrated front panel switch ports
• VDSL2 and ADSL2/2+ support
• (Optional) PoE on LAN daughter card supporting 2PoE/1PoE+ ports
• (Optional) WLAN support - 802.11ac WAVE 2
• 4G LTE-Advanced support with carrier aggregation
Procedure
Step 1 Configure your terminal emulation software with the following settings:
• 9600 bits per second (bps)
• 8 data bits
• No parity
• No flow control
Step 2 Connect to the CON port using the RJ-45-to-RJ-45 cable and the RJ-45-to-DB-25 DTE adapter or the
RJ-45-to-DB-9 DTE adapter (labeled Terminal).
Procedure
Step 2 (Go to Step 3 if the enable password has not been configured.) At the password prompt, enter your system
password:
Password: enablepass
When your password is accepted, the privileged EXEC mode prompt is displayed.
Router#
You now have access to the CLI in privileged EXEC mode and you can enter the necessary commands to
complete your desired tasks.
Step 3 If you enter the setup command, see “Using Cisco Setup Command Facility” in the “Initial Configuration”
section of the Hardware Installation Guide for the Cisco 1100 Series Integrated Services Router.
Step 4 To exit the console session, enter the exit command:
Router# exit
Procedure
Step 4 By default, the vtys? transport is Telnet. In this case, Telnet is disabled and only SSH is supported:
xxx_lab(config)#line vty 0 4
xxx_lab(config-line)#transport input SSH
Step 5 Create a username for SSH authentication and enable login authentication:
xxx_lab(config)# username jsmith privilege 15 secret 0 p@ss3456
xxx_lab(config)#line vty 0 4
xxx_lab(config-line)# login local
Procedure
Step 1 From your terminal or PC, enter one of the following commands:
• connect host [port] [keyword]
• telnet host [port] [keyword]
Here, host is the router hostname or IP address, port is a decimal port number (23 is the default), and keyword
is a supported keyword. For more information about these commands, see the Cisco IOS Terminal Services
Command Reference document.
Note
If you are using an access server, specify a valid port number, such as telnet 172.20.52.40 2004, in addition
to the hostname or IP address.
The following example shows how to use the telnet command to connect to a router named router:
unix_host% telnet router
Trying 172.20.52.40...
Connected to 172.20.52.40.
Escape character is '^]'.
unix_host% connect
Note
If no password has been configured, press Return.
Step 5 When the enable password is accepted, the privileged EXEC mode prompt is displayed:
Router#
Step 6 You now have access to the CLI in privileged EXEC mode and you can enter the necessary commands to
complete your desired tasks.
Step 7 To exit the Telnet session, use the exit or logout command.
Router# logout
Keyboard Shortcuts
Commands are not case sensitive. You can abbreviate commands and parameters if the abbreviations contain
enough letters to be different from any other currently available commands or parameters.
The following table lists the keyboard shortcuts for entering and editing commands.
Ctrl-B or the Left Arrow key1 Move the cursor back one character.
Ctrl-F or the Right Arrow key1 Move the cursor forward one character.
Command Purpose
Ctrl-P or the Up Arrow key1 Recalls commands in the history buffer, beginning
with the most recent command. Repeat the key
sequence to recall successively older commands.
Command Purpose
Ctrl-N or the Down Arrow key1 Returns to more recent commands in the history buffer
after recalling commands with Ctrl-P or the Up
Arrow key.
Router# show history While in EXEC mode, lists the last few commands
you entered.
1
The arrow keys function only on ANSI-compatible terminals such as VT100s.
Privileged EXEC From user EXEC mode, Router# To return to user EXEC
use the enable command. mode, use the disable
command.
• The IOS process or processes fail, in some scenarios. In other scenarios, the system resets when the IOS
process or processes fail.
• A user-configured access policy was configured using the transport-map command that directs the user
into the diagnostic mode.
• A send break signal (Ctrl-C or Ctrl-Shift-6) was entered while accessing the router, and the router was
configured to enter diagnostic mode when a break signal was sent.
In the diagnostic mode, a subset of the commands that are available in user EXEC mode are made available
to the users. Among other things, these commands can be used to:
• Inspect various states on the router, including the IOS state.
• Replace or roll back the configuration.
• Provide methods of restarting the IOS or other processes.
• Reboot hardware, such as the entire router, a module, or possibly other hardware components.
• Transfer files into or off of the router using remote access methods such as FTP, TFTP, and SCP.
The diagnostic mode provides a more comprehensive user interface for troubleshooting than previous routers,
which relied on limited access methods during failures, such as ROMMON, to diagnose and troubleshoot
Cisco IOS problems. The diagnostic mode commands can work when the Cisco IOS process is not working
properly. These commands are also available in privileged EXEC mode on the router when the router is
working normally.
Getting Help
Entering a question mark (?) at the CLI prompt displays a list of commands available for each command
mode. You can also get a list of keywords and arguments associated with any command by using the
context-sensitive help feature.
To get help that is specific to a command mode, a command, a keyword, or an argument, use one of the
following commands.
Command Purpose
Command Purpose
Command Comment
Router> enable Enter the enable command and password to access
Password: <password>
privileged EXEC commands. You are in privileged
Router#
EXEC mode when the prompt changes to a “ # ”
from the “ > ”, for example, Router> to Router#
Router# configure terminal Enter the configure terminal privileged EXEC
Enter configuration commands, one per line. End
command to enter global configuration mode. You
with CNTL/Z.
Router(config)# are in global configuration mode when the prompt
changes to Router (config)#
Router(config)# interface GigabitEthernet ? Enter interface configuration mode by specifying
<0-0> GigabitEthernet interface number
the interface that you want to configure, using the
Router(config)# interface GigabitEthernet 0/? interface GigabitEthernet global configuration
<0-5> Port Adapter number command.
Router (config)# interface GigabitEthernet 0/0/? Enter ? to display what you must enter next on the
<0-63> GigabitEthernet interface number command line.
Router (config)# interface GigabitEthernet When the <cr> symbol is displayed, you can press
0/0/0? Enter to complete the command.
. <0-71>
You are in interface configuration mode when the
Router(config-if)# prompt changes to Router(config-if)#
Command Comment
Router(config-if)# ? Enter ? to display a list of all the interface
Interface configuration commands:
configuration commands available for the interface.
.
. This example shows only some of the available
. interface configuration commands.
ip Interface Internet
Protocol
config commands
keepalive Enable keepalive
lan-name LAN Name command
llc2 LLC2 Interface Subcommands
Command Comment
Router(config-if)# ip ? Enter the command that you want to configure for
Interface IP configuration subcommands: the interface. This example uses the ip command.
access-group Specify access control
for packets Enter ? to display what you must enter next on the
accounting Enable IP accounting on
this interface
command line. This example shows only some of
address Set the IP address of an the available interface IP configuration commands.
interface
authentication authentication subcommands
Router(config-if)# ip address ? Enter the command that you want to configure for
A.B.C.D IP address the interface. This example uses the ip address
negotiated IP Address negotiated over
PPP command.
Router(config-if)# ip address
Enter ? to display what you must enter next on the
command line. In this example, you must enter an
IP address or the negotiated keyword.
A carriage return (<cr>) is not displayed. Therefore,
you must enter additional keywords or arguments
to complete the command.
Router(config-if)# ip address 172.16.0.1 ? Enter the keyword or argument that you want to
A.B.C.D IP subnet mask use. This example uses the 172.16.0.1 IP address.
Router(config-if)# ip address 172.16.0.1
Enter ? to display what you must enter next on the
command line. In this example, you must enter an
IP subnet mask.
<cr> is not displayed. Therefore, you must enter
additional keywords or arguments to complete the
command.
Command Comment
Router(config-if)# ip address 172.16.0.1 Enter the IP subnet mask. This example uses the
255.255.255.0 ? 255.255.255.0 IP subnet mask.
secondary Make this IP address a
secondary address Enter ? to display what you must enter next on the
<cr>
Router(config-if)# ip address 172.16.0.1
command line. In this example, you can enter the
255.255.255.0 secondary keyword, or you can press Enter.
<cr> is displayed. Press Enter to complete the
command, or enter another keyword.
Router(config-if)# ip address 172.16.0.1 Press Enter to complete the command.
255.255.255.0
Router(config-if)#
Router#factory-reset all
The factory reset operation is irreversible for all operations. Are you sure? [confirm]
*Enter*
*May 12 09:55:45.831: %SYS-5-RELOAD: Reload requested by Exec. Reload Reason: Factory Reset.
It may take a few minutes to save the configuration. After the configuration has been saved, the following
output is displayed:
[OK]
Router#
Example
In this example, a modifier of the show interface command (include protocol) is used to provide only the
output lines in which the expression protocol is displayed:
Router# show interface | include protocol
GigabitEthernet0/0/0 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0/0/1 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0/0/2 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0/0/3 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0 is up, line protocol is up
0 unknown protocol drops
Loopback0 is up, line protocol is up
0 unknown protocol drops
Release notes are intended to be release-specific for the most current release, and the information provided
in these documents may not be cumulative in providing information about features that first appeared in
previous releases. For cumulative feature information, refer to the Cisco Feature Navigator at:
http://www.cisco.com/go/cfn/.
capacity, some spare capacity is reserved for CLI session access. For example, this allows a user to remotely
access a router.
Procedure
The value of minutes sets the amount of time that the CLI waits before timing out. Setting the CLI session
timeout increases the security of a CLI session. Specify a value of 0 for minutes to disable session timeout.
Procedure
Step 2 Enter the line upon which you want to be able to use the lock command.
Router(config)# line console 0
The following is an example of what happens if you answer no to the initial configuration dialog:
Would you like to enter the initial configuration dialog? [yes/no]:no
The enable secret is a password used to protect access to
privileged EXEC and configuration modes. This password, after
entered, becomes encrypted in the configuration.
Enter enable secret:********
Confirm enable secret:********
Would you like to terminate autoinstall? [yes]:yes
.
.
router-1>en
Password:
router-1#sh run | sec enable
enable secret 9 $9$emUzIshVXwlUaE$nTzhgi9STdZKzQc4VJ0kEaCqafjUNdCD7ZUf37SY9qg
After the enable secret is prompted during the first login, you can enter a password and this password is always
masked. If you enter a weak password, the device will prompt again to enter a strong password. For example,
you must use the standard mix of upper-case and lower-case characters, special characters, numbers, and so
on. The device will continue to prompt until you enter a strong password. You should enter the strong secret
password twice for confirming and configuring the device.”
Factory Reset Cisco IOS XE Everest 16.6.1 This feature was introduced.
Secure Factory Reset Cisco IOS XE Dublin 17.11.1a Added the factory-reset all secure
command for C111x.
The factory reset process uses the factory-reset all command to take backup of existing configuration and
resets the router to an earlier fully functional state. The duration of the factory reset process is dependent on
the storage size of the router. It varies from 10 to 30 minutes on a Cisco 1000 Series consolidated platform.
From Cisco IOS XE Dublin 17.11.x release and later, you can use the factory-reset all secure command to
reset the router and securely clear the files stored in the bootflash memory.
There are several memory components in the device(s), as listed for the C111x device as an example in the
following table.
DDR4 SDRAM
• Volatile memory
• No user data exists on DRAM after power-off.
• Sanitization measures not required.
ROMmon
• Non-volatile memory
• Holds user data after power-off.
A factory reset, factory-reset all command, is the most common method used when erasing customer data
from the router’s memory resources. Factory reset clears the current running and startup configuration
information, thereby resetting the router to a fully functional state as it was shipped from the factory.
As of Cisco IOS XE 17.11.1a and later, the factory-reset all secure command will also clear the data held
in ROMmon in the same manner as factory-reset all.
Bootflash/NVRAM
• Non-volatile memory
• Holds user data after power-off.
A factory reset, factory-reset all command, is the most common method used when erasing customer data
from the router’s memory resources. Factory reset clears the current running and startup configuration
information, thereby resetting the router to a fully functional state as it was shipped from the factory.
As of Cisco IOS XE 17.11.1a and later, the factory-reset all secure command to reset the router and securely
clear the files stored in the bootflash/NVRAM.
TAM Flash
• Non-volatile memory
• Holds user data after power-off.
A factory reset command, factory-reset all secure in Cisco IOS XE 17.11.1a and later, unlinks customer data
in the TAM Flash and makes it non-readable by the host.
Afterthe factory reset process is complete, the router reboots to ROMMON mode.
Procedure
The factory reset operation is irreversible for Keeping license usage. Are you sure?
[confirm]
This operation may take 20 minutes or more. Please do not power cycle.
b) Execute the factory-reset all secure command to securely erase all data.
Enter confirm to proceed with the factory reset.
The system displays the following message when you use the factory-reset all secure command:
Router# factory-reset all secure
The factory reset operation is irreversible for securely reset all. Are you sure?
[confirm]
This operation may take hours. Please do not power cycle.
Note If you had Specific License Reservation enabled before you performed the factory reset, use the same license
and enter the same license key that you received from the smart agent.
It is better to upgrade software in a planned period of maintenance when an interruption in service is acceptable.
The router needs to be rebooted for a software upgrade to take effect.
Guestshell Installation
The guestshell is removed from the IOS XE software image from the Cisco IOS XE 17.9 release. If you need
to use guestshell, then you can download it from
https://developer.cisco.com/docs/iox/#!iox-resource-downloads/downloads.
The Guest Shell is a virtualized Linux-based environment, designed to run custom Linux applications, including
Python for automated control and management of Cisco devices. Using the Guest Shell, the user can also
install, update, and operate third-party Linux applications and access the IOS CLI.
The Guest Shell environment is intended for tools, Linux utilities, and manageability rather than networking.
Guest Shell shares the kernel with the host (router) system. Users can access the Linux shell of Guest Shell
and update scripts and software packages in the container rootfs. However, users within the Guest Shell cannot
modify the host file system and processes.
The Guest Shell container is managed using IOx. IOx is Cisco's Application Hosting Infrastructure for Cisco
IOS XE devices. IOx enables hosting of applications and services developed by Cisco, partners, and third-party
developers in network edge devices, seamlessly across diverse and disparate hardware platforms.
With these users in mind, guestshell will be made available as a single tar file which can then be downloaded
and installed on the system like any other IOX application. As a result, there won't be any increase in the size
of the universal release image.
Note Day 0 guestshell provisioning will not work with this approach.
Once guestshell has been deployed successfully, standard guestshell commands such as guestshell enable,
guestshell run bash, and guestshell run python3 should work.
The following resource talks about running python scripts using guestshell:
https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/prog/configuration/178/b_178_programmability_cg/m_
178_prog_eem_python.html
The output should contain one or more lines with the Product Name “ISR900_Containers”. If the device does
not have container keys programmed on it, then you will not be able to install guest shell.
You will see an error like the following:
*Aug 26 15:47:21.484: %IOSXE-3-PLATFORM: R0/0: IOx: App signature verification failed with
non-zero exit code
*Aug 26 15:47:21.588: %IM-6-INSTALL_MSG: R0/0: ioxman: app-hosting: Install failed: App
package signature (package.sign)
verification failed for package manifest file package.mf. Re-sign the application and then
deploy again.
The guest shell tar file is published along with the IOS-XE image for a given release. More information can
be found here:https://developer.cisco.com/docs/iox/#!iox-resource-downloads/downloads
Licensing
Cisco Software Licensing
Cisco software licensing consists of processes and components to activate Cisco IOS software feature sets by
obtaining and validating Cisco software licenses.
You can enable licensed features and store license files in the bootflash of your router. Licenses pertain to
consolidated packages, technology packages, or individual features.
An evaluation license is automatically converted to a Right to Use model after 60 days and this license is valid
permanently. The conversion to a permanent license applies only to evaluation licenses. For other features
supported on your router, you must purchase a permanent license.
See the "Configuring the Cisco IOS Software Activation Feature" chapter of the Software Activation
Configuration Guide, Cisco IOS XE Release 3S.
Consolidated Packages
One of the following two consolidated packages (images) is preinstalled on the router:
• universalk9—Contains the ipbasek9 base package and the securityk9, uck9, and appxk9 technology
packages.
• universalk9_npe—Contains the ipbasek9 base package and the securityk9_npe, uck9, and appxk9
technology packages. This image has limited crypto functionality.
Note The terms super package and image also refer to a consolidated package.
Many features within the consolidated package are contained in the ipbasek9 base package. The license key
for the ipbasek9 package is activated by default.
Technology Packages
Technology packages contain software features within a consolidated package. To use different sets of features,
enable the licenses of selected technology packages. You can enable the licenses for any combination of
technology packages.
Each technology package has an evaluation license that converts to a Right to Use (RTU) license after 60
days and is then valid permanently.
The following is a list of technology packages:
Note In Cisco 1000 Series Integrated Series Routers, although L2TPv2 sessions comes up without appxk9, you
need the appxk9 license for the traffic to go through the sessions. You also need the appxk9 license to apply
the QoS policies to the L2TPv2 sessions.
securityk9
The securityk9 technology package includes all crypto features, including IPsec, SSL/SSH, Firewall, and
Secure VPN.
The securityk9_npe package (npe = No Payload Encryption) includes all the features in the securityk9
technology package without the payload-encryption functionality. This is to fulfill export restriction
requirements. The securityk9_npe package is available only in the universalk9_npe image. The difference
in features between the securityk9 package and the securityk9_npe package is therefore the set of
payload-encryption-enabling features such as IPsec and Secure VPN.
uck9
The Unified Communications technology package is required to enable Cisco Unified Border Element (Cisco
UBE) functionality. To use Cisco UBE features, you will require session licenses and a Security technology
package to secure the media.
appxk9
The appxk9 technology package contains Application Experience features, which are similar to the features
in the DATA package of the Cisco Integrated Services Routers Generation 2 routers. For more information,
see: http://www.cisco.com/c/en/us/products/collateral/cloud-systems-management/
software-activation-on-integrated-services-routers-isr/white_paper_c11_556985.html#wp9000791.
There are many features in the appxk9 package, including MPLS, PfR, L2/L3 VPN, Broadband, and AVC.
Use the show license feature command to view the license features that are enabled. In the following example,
the securityk9 and the uck9 packages are not enabled.
LED Indicators
For information on LEDs on the router, see "LED Indicators" in the "Overview" section of the Hardware
Installation Guide for the Cisco 4000 Series Integrated Services Routers.
For information on LEDs on the SSD Carrier Card NIM, see "Overview of the SSD Carrier Card NIM
(NIM-SSD)" in the "Installing and Upgrading Internal Modules and FRUs" section of the Hardware Installation
Guide for the Cisco 4000 Series Integrated Services Routers.
Related Documentation
For further information on software licenses, see Software Activation on Cisco Integrated Services Routers
and Cisco Integrated Service Routers G2.
For further information on obtaining and installing feature licenses, see Configuring the Cisco IOS Software
Activation Feature.
Note Do not use these procedures if you also need to install any optional subpackages or plan to upgrade individual
subpackages. See Managing and Configuring a Router to Run Using Individual Packages, on page 36.
• Managing and Configuring a Consolidated Package Using copy and boot Commands, on page 32
• Configuring a Router to Boot the Consolidated Package via TFTP Using the boot Command: Example,
on page 33
Managing and Configuring a Consolidated Package Using copy and boot Commands
To upgrade a consolidated package, copy the consolidated package to the bootflash: directory on the router
using the copy command. After making this copy of the consolidated package, configure the router to boot
using the consolidated package file.
The following example shows the consolidated package file being copied to the bootflash: file system via
TFTP. The config register is then set to boot using boot system commands, and the boot system commands
instruct the router to boot using the consolidated package stored in the bootflash: file system. The new
configuration is then saved using the copy running-config startup-config command, and the system is then
reloaded to complete the process.
Router# dir bootflash:
Directory of bootflash:/
11 drwx 16384 Dec 4 2007 04:32:46 -08:00 lost+found
86401 drwx 4096 Dec 4 2007 06:06:24 -08:00 .ssh
14401 drwx 4096 Dec 4 2007 06:06:36 -08:00 .rollback_timer
28801 drwx 4096 Mar 18 2008 17:31:17 -07:00 .prst_sync
43201 drwx 4096 Dec 4 2007 04:34:45 -08:00 .installer
!!!!!!!
[OK - 208904396 bytes]
208904396 bytes copied in 330.453 secs (632176 bytes/sec)
Router# dir bootflash:
Directory of bootflash:/
11 drwx 16384 Dec 4 2007 04:32:46 -08:00 lost+found
86401 drwx 4096 Dec 4 2007 06:06:24 -08:00 .ssh
14401 drwx 4096 Dec 4 2007 06:06:36 -08:00 .rollback_timer
28801 drwx 4096 Mar 18 2008 17:31:17 -07:00 .prst_sync
43201 drwx 4096 Dec 4 2007 04:34:45 -08:00 .installer
12 -rw- 208904396 May 28 2008 16:17:34 -07:00
isr4400-universalk9.03.10.00.S.153-3.S-ext.SPA.bin
928862208 bytes total (503156736 bytes free)
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# boot system flash bootflash:isr4400-universalk9.03.10.00.S.153-3.S-ext.SPA.bin
Router(config)# config-reg 0x2102
Router(config)# exit
Router# show run | include boot
boot-start-marker
boot system flash bootflash:isr4400-universalk9.03.10.00.S.153-3.S-ext.SPA.bin
boot-end-marker
Router# copy run start
Destination filename [startup-config]?
Building configuration...
[OK]
Router# reload
Configuring a Router to Boot the Consolidated Package via TFTP Using the boot Command: Example
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#boot system tftp://10.81.116.4/rtp-isr4400-54/isr4400.bin
Router(config)#config-register 0x2102
Router(config)#exit
Router# show run | include boot
boot-start-marker
boot system tftp://10.81.116.4/rtp-isr4400-54/isr4400.bin
boot-end-marker
license boot level adventerprise
Router# copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
Router# reload
Proceed with reload? [confirm]
Sep 13 17:42:54.445 R0/0: %PMAN-5-EXITACTION: Process manager is exiting: process exit with
Key Sectors:(Primary,GOOD),(Backup,GOOD),(Revocation,GOOD)
Size of Primary = 2288 Backup = 2288 Revocation = 300
IP_ADDRESS: 172.18.42.119
IP_SUBNET_MASK: 255.255.255.0
DEFAULT_GATEWAY: 172.18.42.1
TFTP_SERVER: 10.81.116.4
TFTP_FILE: rtp-isr4400-54/isr4400.bin
TFTP_MACADDR: a4:4c:11:9d:ad:97
TFTP_VERBOSE: Progress
TFTP_RETRY_COUNT: 18
TFTP_TIMEOUT: 7200
TFTP_CHECKSUM: Yes
ETHER_PORT: 0
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>
Router>
Router>enable
Router# show version
Cisco IOS XE Software, Version BLD_V154_3_S_XE313_THROTTLE_LATEST_20140527_070027-ext
Cisco IOS Software, ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Experimental Version
15.4(20140527:095327)
v154_3_s_xe313_throttle-BLD-BLD_V154_3_S_XE313_THROTTLE_LATEST_20140527_070027-ios 156]
licensed under the GNU General Public License ("GPL") Version 2.0. The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Procedure
Step 5 request platform software package Expands the software image from the TFTP
expand file URL-to-consolidated-package server (URL-to-consolidated-package) into the
to URL-to-directory-name directory used to save the image
(URL-to-directory-name), which was created
Example:
in Step 4.
Router# request platform software
package expand file
bootflash:isr4400-universalk9-NIM.bin to
bootflash:mydir
Step 8 show version installed Displays the version of the newly installed
software.
Example:
Router# show version installed
Package: Provisioning File, version: n/a,
status: active
Examples
The initial part of the example shows the consolidated package, isr4400-universalk9.164422SSA.bin,
being copied to the TFTP server. This is a prerequisite step. The remaining part of the example shows
the consolidated file, packages.conf, being booted.
Router# copy tftp:isr4400/isr4400-universalk9.164422SSA.bin bootflash:
Address or name of remote host []? 192.0.2.1
Destination filename [isr4400-universalk9.164422SSA.bin]?
Accessing tftp://192.0.2.1/isr4400/isr4400-universalk9.164422SSA.bin...
Loading isr4400/isr4400-universalk9.164422SSA.bin from 192.0.2.1 (via GigabitEthernet0):
!!!!!!!!
[OK - 410506248 bytes]
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
to bootflash:isr4400-universalk9.dir1
Verifying parameters
Validating package type
Copying package files
SUCCESS: Finished expanding all-in-one software package.
Router# reload
Proceed with reload? [confirm]
Procedure
How to Install and Upgrade the Software for Cisco IOS XE Denali Release 16.3
To install or upgrade the software, use one of the following methods to use the software from a consolidated
package or an individual package. Also see Overview section.
• Managing and Configuring a Router to Run Using a Consolidated Package section
Note When the device boots up for first time and if the device requires an upgrade, the entire boot process may
take several minutes. This process will be longer than a normal boot due to the ROMMON upgrade.
Key Sectors:(Primary,GOOD),(Backup,GOOD),(Revocation,GOOD)
Size of Primary = 2288 Backup = 2288 Revocation = 300
IP_ADDRESS: 172.18.42.119
IP_SUBNET_MASK: 255.255.255.0
DEFAULT_GATEWAY: 172.18.42.1
TFTP_SERVER: 10.81.116.4
TFTP_FILE: rtp-isr4400-54/isr4400.bin
TFTP_MACADDR: a4:4c:11:9d:ad:97
TFTP_VERBOSE: Progress
TFTP_RETRY_COUNT: 18
TFTP_TIMEOUT: 7200
TFTP_CHECKSUM: Yes
ETHER_PORT: 0
To make the new ROMMON permanent, you must restart the RP.
ROMMON upgrade successful. Rebooting for upgrade to take effect.
Expected hash:
ddaf35a193617abacc417349ae204131
12e6fa4e89a97ea20a9eeee64b55d39a
2192992a274fc1a836ba3c23a3feebbd
454d4423643ce80e2a9ac94fa54ca49f
Obtained hash:
ddaf35a193617abacc417349ae204131
12e6fa4e89a97ea20a9eeee64b55d39a
2192992a274fc1a836ba3c23a3feebbd
454d4423643ce80e2a9ac94fa54ca49f
ROM:Sha512 Self Test Passed
Self Tests Latency: 418 msec
Rom image verified correctly
Expected hash:
DDAF35A193617ABACC417349AE204131
12E6FA4E89A97EA20A9EEEE64B55D39A
2192992A274FC1A836BA3C23A3FEEBBD
454D4423643CE80E2A9AC94FA54CA49F
Obtained hash:
DDAF35A193617ABACC417349AE204131
12E6FA4E89A97EA20A9EEEE64B55D39A
2192992A274FC1A836BA3C23A3FEEBBD
454D4423643CE80E2A9AC94FA54CA49F
Sha512 Self Test Passed
Rom image verified correctly
IP_ADDRESS: 172.18.42.119
IP_SUBNET_MASK: 255.255.255.0
DEFAULT_GATEWAY: 172.18.42.1
TFTP_SERVER: 10.81.116.4
TFTP_FILE: rtp-isr4400-54/isr4400.bin
TFTP_MACADDR: a4:4c:11:9d:ad:97
TFTP_VERBOSE: Progress
TFTP_RETRY_COUNT: 18
TFTP_TIMEOUT: 7200
TFTP_CHECKSUM: Yes
ETHER_PORT: 0
Expected hash:
DDAF35A193617ABACC417349AE204131
12E6FA4E89A97EA20A9EEEE64B55D39A
2192992A274FC1A836BA3C23A3FEEBBD
454D4423643CE80E2A9AC94FA54CA49F
Obtained hash:
DDAF35A193617ABACC417349AE204131
12E6FA4E89A97EA20A9EEEE64B55D39A
2192992A274FC1A836BA3C23A3FEEBBD
454D4423643CE80E2A9AC94FA54CA49F
Sha512 Self Test Passed
Found package arch type ARCH_i686_TYPE
Found package FRU type FRU_RP_TYPE
Calculating SHA-1 hash...Validate package: SHA-1 hash:
calculated 8B082C48:35C23C9E:8A091441:D6FACEE6:B5111533
expected 8B082C48:35C23C9E:8A091441:D6FACEE6:B5111533
Image validated
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Note Read the Release Notes document pertaining to the consolidated package to verify that the firmware within
the consolidated package is compatible with the version of Cisco IOS XE software that is currently installed
on a router.
Procedure
Step 5 request platform software package Expands the software image from the TFTP
expand file URL-to-consolidated-package server (URL-to-consolidated-package) into the
to URL-to-directory-name directory used to save the image
(URL-to-directory-name), which was created
Example:
in the Step 4.
Router# request platform software
package expand file
bootflash:isr4400-universalk9-NIM.bin to
bootflash:mydir
Examples
The initial part of the following example shows the consolidated package,
isr4400-universalk9.164422SSA.bin, being copied to the TFTP server. This is a prerequisite step.
The remaining part of the example shows the consolidated file, packages.conf, being booted.
Router# tftp:isr4400/isr4400-universalk9.164422SSA.bin bootflash:
Address or name of remote host []? 192.0.2.1
Destination filename [isr4400-universalk9.164422SSA.bin]?
Accessing tftp://192.0.2.1/isr4400/isr4400-universalk9.164422SSA.bin...
Loading isr4400/isr4400-universalk9.164422SSA.bin from 192.0.2.1 (via GigabitEthernet0):
!!!!!!!!
[OK - 410506248 bytes]
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router# reload
Proceed with reload? [confirm]
Procedure
Step 2 request platform software package Expands the platform software package to super
expand file bootflash:/mydir /<IOS-XE image package.
to expand super package.
Example:
Step 4 boot bootflash:mydir/ /packages.conf. Boots the super package by specifying the path
and name of the provisioning file:
Example:
packages.conf.
rommon 1 > boot
bootflash:mydir/packages.conf
Step 5 copy NIM firmware subpackage to the folder Copies the NIM firmware subpackage into
bootflash:mydir/. bootflash:mydir.
Example:
Router#copy
bootflash:isr4400-firmware_nim_xdsl.2014-11-17_11.05_39n.SSA.pkg
bootflash:mydir/
Step 6 request platform software package install Installs the software package.
rp 0 file bootflash:/mydir/<firmware
subpackage>.
Example:
Router#equest platform software package
install rp 0 file
bootflash:mydir/isr4400-firmware_nim_xdsl.2014-11-17_11.05_39n.SSA.pkg
Step 7 hw-module subslot x/y reload to boot the Reloads the hardware module subslot and boots
module with the new firmware. the module with the new firmware.
Example:
Router#hw-module subslot 0/2 reload
Step 8 show platform software subslot 0/2 module Displays the version of the newly installed
firmware to verify that the module is booted firmware.
up with the new firmware.
Example:
Router# show platform software subslot
0/2 module firmware
Pe
Examples
The following example shows how to perform firmware upgrade in a router module:
Routermkdir bootflash:mydir
Create directory filename [mydir]?
Router#reload
Proceed with reload? [confirm]
#
File size is 0x150ae3cc
Located mydir/isr4400-mono-universalk9.03.14.00.S.155-1.S-std.SPA.pkg
Image size 353035212 inode num 356929, bks cnt 86191 blk size 8*512
###################################################################
######################################################################
Boot image size = 353035212 (0x150ae3cc) bytes
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
2 Ethernet interfaces
4 Gigabit Ethernet interfaces
2 ATM interfaces
32768K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
7393215K bytes of flash memory at bootflash:.
*Dec 12 09:28:58.922:
%IOS_LICENSE_IMAGE_APPLICATION-6-LICENSE_LEVEL:
Module name = esg Next reboot level = appxk9 and License = appxk9
*Dec 12 09:28:58.943:
%IOS_LICENSE_IMAGE_APPLICATION-6-LICENSE_LEVEL:
Module name = esg Next reboot level = ipbasek9 and License = ipbasek9
*Dec 12 09:28:58.981:
%ISR_THROUGHPUT-6-LEVEL: Throughput level has been set to 1000000 kbps
*Dec 12 09:29:13.302: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface EOBC0, changed state to up
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to down
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface LIIN0, changed state to up
*Dec 12 09:28:51.438: %CMRP-3-PFU_MISSING:cmand: The platform does not detect a power
supply in slot 1
*Dec 12 09:29:01.256: %CMLIB-6-THROUGHPUT_VALUE:cmand: Throughput license found, throughput
set to 1000000 kbps
*Dec 12 09:29:03.223: %CPPHA-7-START:cpp_ha: CPP 0 preparing ucode
*Dec 12 09:29:03.238: %CPPHA-7-START:cpp_ha: CPP 0 startup init
*Dec 12 09:29:11.335: %CPPHA-7-START:cpp_ha: CPP 0 running init
*Dec 12 09:29:11.645: %CPPHA-7-READY:cpp_ha: CPP 0 loading and initialization complete
*Dec 12 09:29:11.711: %IOSXE-6-PLATFORM:cpp_cp:
Process CPP_PFILTER_EA_EVENT__API_CALL__REGISTER
*Dec 12 09:29:16.280:
%IOSXE_MGMTVRF-6-CREATE_SUCCESS_INFO:
Management vrf Mgmt-intf created with ID 1, ipv4 table-id 0x1, ipv6 table-id 0x1E000001
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi0, changed state to up
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC0, changed state to up
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to down
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN0, changed state to up
*Dec 12 09:29:17.521: %SYS-5-LOG_CONFIG_CHANGE: Buffer logging disabled
*Dec 12 09:29:18.867: %SYS-5-CONFIG_I: Configured from memory by console
*Dec 12 09:29:18.870:
%IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled
*Dec 12 09:29:18.870:
%IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/1, interfaces disabled
*Dec 12 09:29:18.871:
%IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/2, interfaces disabled
*Dec 12 09:29:18.873:
%SPA_OIR-6-OFFLINECARD: SPA (ISR4451-X-4x1GE) offline in subslot 0/0
*Dec 12 09:29:18.874: %SPA_OIR-6-OFFLINECARD: SPA (NIM-VA-B) offline in subslot 0/1
*Dec 12 09:29:18.874: %SPA_OIR-6-OFFLINECARD: SPA (NIM-VAB-A) offline in subslot 0/2
*Dec 12 09:29:18.876: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0
*Dec 12 09:29:18.876: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0
*Dec 12 09:29:18.882: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/0
*Dec 12 09:29:18.884: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/1
*Dec 12 09:29:18.884: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/2
*Dec 12 09:29:18.935: %SYS-5-RESTART: System restarted --
Cisco IOS Software, ISR Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 15.5(1)S,
RELEASE SOFTWARE (fc5)
Technical Support: http://www.cisco.com/techsupport
Daemon Status: UP
TC Mode: PTM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Line 1:
Router#
Router#
Router#copy bootflash:isr4400-firmware_nim_xdsl.2014-11-17_11.05_39n.SSA.pkg
bootflash:mydir/
Destination filename [mydir/isr4400-firmware_nim_xdsl.2014-11-17_11.05_39n.SSA.pkg]?
Copy in progress...CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
Modem Up time
-------------------------------------------
0D 0H 25M 38S
Router#
*Dec 12 09:57:22.514: new extended attributes received from iomd(slot 0 bay 2 board 0)
*Dec 12 09:57:22.514: %IOSXE_OIR-6-SOFT_RELOADSPA: SPA(NIM-VAB-A)
reloaded on subslot 0/2
*Dec 12 09:57:22.515: %SPA_OIR-6-OFFLINECARD: SPA (NIM-VAB-A) offline in subslot 0/2
Router#
Router#
*Dec 12 09:58:35.471: %SPA_OIR-6-ONLINECARD: SPA (NIM-VAB-A) online in subslot 0/2
*Dec 12 09:58:37.470: %LINK-3-UPDOWN: Interface Ethernet0/2/0, changed state to down
*Dec 12 09:58:37.470: %LINK-3-UPDOWN: Interface ATM0/2/0, changed state to down
Router#
Modem Up time
-------------------------------------------
0D 0H 0M 42S
Router#
Provisioning Files
This section provides background information about the files and processes used in Managing and Configuring
a Router to Run Using Individual Packages, on page 76.
The consolidated package on a router consists of a collection of subpackages and a provisioning file titled
packages.conf. To run the software, the usual method used is to boot the consolidated package, which is
copied into memory, expanded, mounted, and run within memory. The provisioning file's name can be renamed
but subpackage file's names cannot be renamed. The provisioning file and subpackage files must be kept in
the same directory. The provisioning file does not work properly if any individual subpackage file is contained
within a different directory.
Note An exception to this is that if a new or upgraded module firmware package is subsequently installed, it need
not be in the same directory as the provisioning file.
Configuring a router to boot, using the provisioning file packages.conf, is beneficial because no changes have
to be made to the boot statement after the Cisco IOS XE software is upgraded.
File Systems
The following table provides a list of file systems that can be seen on the Cisco 1100 series routers.
nvram: Router NVRAM. You can copy the startup configuration to NVRAM or from
NVRAM.
system: System memory file system, which includes the running configuration.
usb0: The Universal Serial Bus (USB) flash drive file systems.
Note
The USB flash drive file system is visible only if a USB drive is installed in usb0:
port.
Use the ? help option, or use the copy command in command reference guides, if you find a file system that
is not listed in the table above.
crashinfo files Crashinfo files may appear in the bootflash: file system.
These files provide descriptive information of a crash and may be useful for
tuning or troubleshooting purposes. However, the files are not part of router
operations, and can be erased without impacting the functioning of the router.
lost+found directory This directory is created on bootup if a system check is performed. Its
appearance is completely normal and does not indicate any issues with the
router.
Flash Storage
Subpackages are installed to local media storage, such as flash memory. For flash storage, use the dir bootflash:
command to list the file names.
For more information about the configuration register, see Use of the Configuration Register on All Cisco
Routers and Configuring a Router to Boot the Consolidated Package via TFTP Using the boot Command:
Example, on page 70.
Note Setting the configuration register to 0x2102 will set the router to autoboot the Cisco IOS XE software.
Note The console baud rate is set to 9600 after changing the confreg to 0x2102 or 0x0. If you cannot establish a
console session after setting confreg, or garbage output appears, change the setting on your terminal emulation
software to 9600.
*Jul 14 08:12:41.898: %LICENSE-6-EULA_ACCEPTED: EULA for feature throughput 1.0 has been
accepted. UDI=C1111-8P:FGL212694M3; StoreIndex=3:Built-In License Storage% The config will
take effect on next reboot
Check the show license feature, throughput license at this point would not be enabled.
[OK]
yes
ipbasek9 no no no no
no
FoundationSuiteK9 yes yes no no
yes
throughput yes yes no yes<--
yes
internal_service yes no no no
no
=============
Use the show license feature command to view the license features that are enabled. In the following example,
the securityk9 and the uck9 packages are not enabled.
LED Indicators
For information on LEDs on the router, see the "LED Indicators" section of the Hardware Installation Guide
for the Cisco 1100 Series Integrated Services Routers.
Related Documentation
For further information on software licenses, see Software Activation on Cisco Integrated Services Routers
and Cisco Integrated Service Routers G2.
For further information on obtaining and installing feature licenses, see Configuring the Cisco IOS Software
Activation Feature.
Note When a device is in the installation mode, formatting of the boot drive, bootflash/flash is not recommended.
Formatting is blocked to ensure stability of the running image and to avoid any impact to upgrade of the
software.
Note Do not use these procedures if you also need to install any optional subpackages or plan to upgrade individual
subpackages. See Managing and Configuring a Router to Run Using Individual Packages, on page 76.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 379357675 bytes]
Configuring a Router to Boot the Consolidated Package via TFTP Using the
boot Command: Example
Router# configure terminal
Board is TSN-P2H
Comphy-0: SGMII2 3.125 Gbps
Comphy-1: SGMII3 1.25 Gbps
Comphy-2: USB3_HOST0 5 Gbps
Comphy-3: USB3_HOST1 5 Gbps
Comphy-4: SGMII0 1.25 Gbps
Comphy-5: PCIE2 5 Gbps
Starting ROMMON...
Rom image verified correctly
!!! DEBUG CPLD Version Installed. For INTERNAL USE ONLY !!!
........
IP_ADDRESS: 172.18.42.231
IP_SUBNET_MASK: 255.255.255.0
DEFAULT_GATEWAY: 172.18.42.1
TFTP_SERVER: 172.18.40.4
TFTP_FILE: user5/c1100.bin
TFTP_MACADDR: D4:8C:B5:83:A3:6C
ETHER_PORT: 0
Unable to get TFTP file size - Using maximum size of 1073741824 bytes.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Starting OS kernel...
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Router>
Router>enable
Router#show version
Cisco IOS XE Software, Version 16.06.02
Cisco IOS Software [Everest], ISR Software (ARMV8EB_LINUX_IOSD-UNIVERSALK9_IAS-M), Version
16.6.2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Wed 01-Nov-17 03:00 by mcpre
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY. You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
--------------------------------------------------------------------------------
Suite Suite Current Type Suite Next reboot
--------------------------------------------------------------------------------
FoundationSuiteK9 None None None
securityk9
appxk9
-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
appxk9 None None None
securityk9 None None None
ipbase ipbasek9 None ipbasek9
Router#
Procedure
--------------------------------------------------------------------------------
Suite Suite Current
Type Suite Next reboot
--------------------------------------------------------------------------------
FoundationSuiteK9 None
None None
securityk9
appxk9
-----------------------------------------------------------------
Technology Technology-package
Technology-package
Current Type
Next reboot
------------------------------------------------------------------
appxk9 None None
None
securityk9 None None
None
ipbase ipbasek9 None
ipbasek9
Router#
Step 5 request platform software package Expands the software image from the TFTP
expand file URL-to-consolidated-package server (URL-to-consolidated-package) into the
to URL-to-directory-name directory used to save the image
(URL-to-directory-name), which was created
Example:
in Step 4.
Step 8 show version installed Displays the version of the newly installed
software.
Example:
Router# show version installed
Package: Provisioning File, version: n/a,
status: active
Examples
The initial part of the example shows the consolidated package, c1100.bin, being copied to the TFTP
server. This is a prerequisite step. The remaining part of the example shows the consolidated file,
packages.conf, being booted.
Router# copy tftp:c1100.bin bootflash:
Address or name of remote host []? 172.18.40.4
Destination filename [c1100.bin]?
Accessing tftp://172.18.40.4/user5/c1100.bin...
Loading user5/c1100.bin from 172.18.40.4 (via GigabitEthernet0/0/0):
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 379357675 bytes]
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
--------------------------------------------------------------------------------
Suite Suite Current Type Suite Next reboot
--------------------------------------------------------------------------------
FoundationSuiteK9 None None None
securityk9
appxk9
-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
appxk9 None None None
securityk9 None None None
ipbase ipbasek9 None ipbasek9
Router#
Router#
Router# reload
Proceed with reload? [confirm]
RP0/0
Built: 2017-06-21_09.16, by: user5
File SHA1 checksum: 1e44c63d734c574b986c9332c1bad8580f55e992
Procedure
version. When the device boots up with Cisco IOS XE Everest image for the first time, the device checks the
installed version of the ROMMON, and upgrades if the system is running an older version. During the upgrade,
do not power cycle the device. The system automatically power cycles the device after the new ROMMON
is installed. After the installation, the system will boot up with the Cisco IOS XE image as normal.
Note When the device boots up for first time and if the device requires an upgrade, the entire boot process may
take several minutes. This process will be longer than a normal boot due to the ROMMON upgrade.
Not supported for C1100 in this release since C1100 is shipped with the minimum Rommon version.
This mode provides a consolidated boot process, using This mode uses the local (bootflash) packages.conf
local (hard disk, flash) or remote (TFTP) .bin image. file for the boot process.
Note
Bundle boot from USB and TFTPBoot is not
supported.
This mode uses a single .bin file. .bin file is replaced with expanded .pkg files in this
mode.
CLI: CLI:
#boot system file <filename> #install add file bootflash: [activate commit]
To upgrade in this mode, point the boot system to the To upgrade in this mode, use the install commands.
new image.
Image Auto-Upgrade: When a new Field-Replaceable Image Auto-Upgrade: When a new FRU is inserted
Unit (FRU) is inserted in a modular chassis, manual in a modular chassis, the joining FRU is
intervention is required to get the new FRU running auto-upgraded to the image version in sync with the
with the same version as the active FRUs. active FRUs.
Rollback: Rollback to the previous image with Rollback: Enables rollback to an earlier version of
multiple Software Maintenance Updates (SMUs) may Cisco IOS XE software, including multiple patches
require multiple reloads. in single reload.
The install add command copies the software package from a local or remote location to the platform. The
location can be FTP, HTTP, HTTPs, or TFTP. The command extracts individual components of the .package
file into subpackages and packages.conf files. It also validates the file to ensure that the image file is specific
to the platform on which it is being installed.
The install activate command performs the required validations and provisions the packages previously added
using the install add command. It also triggers a system reload.
The install commit command confirms the packages previously activated using the install activate command,
and makes the updates persistent over reloads.
Note Installing an update replaces any previously installed software image. At any time, only one image can be
installed in a device.
install add install add file Copies the contents of the image,
location:filename.bin package, and SMUs to the software
repository. File location may be
local or remote. This command
does the following:
• Validates the file–checksum,
platform compatibility checks,
and so on.
• Extracts individual
components of the package
into subpackages and
packages.conf
• Copies the image into the local
inventory and makes it
available for the next steps.
(install activate) auto abort-timer install activate auto-abort timer The auto-abort timer starts
<30-1200> automatically, with a default value
of 120 minutes. If the install
commit command is not executed
within the time provided, the
activation process is terminated,
and the system returns to the
last-committed state.
• You can change the time value
while executing the install
activate command.
• The install commit command
stops the timer, and continues
the installation process.
• The install activate
auto-abort timer stop
command stops the timer
without committing the
package.
• Use this command with the
prompt-level none keyword
to automatically ignore any
confirmation prompts.
• This command is valid only in
the three-step install variant.
install remove install remove {file <filename> | Deletes inactive packages from the
inactive} platform repository. Use this
command to free up space.
• file: Removes specified files.
• inactive: Removes all the
inactive files.
install rollback to install rollback to {base | label | Rolls back the software set to a
committed | id} saved installation point or to the
last-committed installation point.
The following are the
characteristics of this command:
• Requires reload.
• Is applicable only when the
package is in committed state.
• Use this command with the
prompt-level none keyword
to automatically ignore any
confirmation prompts.
Note
If you are performing install
rollback to a previous image, the
previous image must be installed
in install mode. Only SMU
rollback is possible in bundle
mode.
install deactivate install deactivate file <filename> Removes a package from the
platform repository. This command
is supported only for SMUs.
• Use this command with the
prompt-level none keyword
to automatically ignore any
confirmation prompts.
show install log show install log Provides the history and details of
all install operations that have been
performed since the platform was
booted.
show install package show install package <filename> Provides details about the .pkg/.bin
file that is specified.
show install summary show install summary Provides an overview of the image
versions and their corresponding
install states for all the FRUs.
• The table that is displayed will
state for which FRUs this
information is applicable.
• If all the FRUs are in sync in
terms of the images present
and their state, only one table
is displayed.
• If, however, there is a
difference in the image or state
information among the FRUs,
each FRU that differs from the
rest of the stack is listed in a
separate table.
show install active show install active Provides information about the
active packages for all the FRUs.
If there is a difference in the
information among the FRUs, each
FRU that differs from the rest of
the stack is listed in a separate
table.
show install inactive show install inactive Provides information about the
inactive packages, if any, for all the
FRUs.
If there is a difference in the
information among the FRUs, each
FRU that differs from the rest of
the stack is listed in a separate
table.
show install committed show install committed Provides information about the
committed packages for all the
FRUs.
If there is a difference in the
information among the FRUs, each
FRU that differs from the rest of
the stack is listed in a separate
table.
show install rollback show install rollback {point-id | Displays the package associated
label} with a saved installation point.
show version show version [rp-slot] [installed Displays information about the
[user-interface] | provisioned | current package, along with
running] hardware and platform information.
Note • All the CLI actions (for example, add, activate, and so on) are executed on all the available FRUs.
• The configuration save prompt will appear if an unsaved configuration is detected.
• The reload prompt will appear after the second step in this workflow. Use the prompt-level none keyword
to automatically ignore the confirmation prompts.
• If the prompt-level is set to None, and there is an unsaved configuration, the install fails. You must save
the configuration before reissuing the command.
Use the one-step install procedure described below to convert a platform running in bundle boot mode to
install mode. After the command is executed, the platform reboots in install boot mode.
Later, the one-step install procedure can also be used to upgrade the platform.
This procedure uses the install add file activate commit command in privileged EXEC mode to install a
software package, and to upgrade the platform to a new version.
Procedure
Step 2 install add file location: filename [activate Copies the software install package from a local
commit] or remote location (through FTP, HTTP,
HTTPs, or TFTP) to the platform and extracts
Example:
the individual components of the .package file
Device#install add file into subpackages and packages.conf files. It
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.bin
activate commit also performs a validation and compatibility
check for the platform and image versions,
activates the package, and commits the package
to make it persistent across reloads.
The platform reloads after this command is run.
Three-Step Installation
Note • All the CLI actions (for example, add, activate, and so on) are executed on all the available FRUs.
• The configuration save prompt will appear if an unsaved configuration is detected.
• The reload prompt will appear after the install activate step in this workflow. Use the prompt-level none
keyword to automatically ignore the confirmation prompts.
The three-step installation procedure can be used only after the platform is in install mode. This option provides
more flexibility and control to the customer during installation.
This procedure uses individual install add, install activate, and install commit commands for installing a
software package, and to upgrade the platform to a new version.
Procedure
Step 2 install add file location: filename Copies the software install package from a
remote location (through FTP, HTTP, HTTPs,
Example:
or TFTP) to the platform, and extracts the
Device#install add file individual components of the .package file into
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.bin
subpackages and packages.conf files.
Step 4 install activate [auto-abort-timer <time>] Activates the previously added package and
reloads the platform.
Example:
Device# install activate • When doing a full software install, do not
auto-abort-timer 120 provide a package filename.
• In the three-step variant,
auto-abort-timer starts automatically
with the install activate command; the
default for the timer is 120 minutes. If the
install commit command is not run
before the timer expires, the install
process is automatically terminated. The
platform reloads and boots up with the
last committed version.
Step 7 install rollback to committed (Optional) Rolls back the platform to the last
committed state.
Example:
Device#install rollback to committed
Step 8 install remove {file filesystem: filename | (Optional) Deletes software installation files.
inactive}
• file: Deletes a specific file
Example:
• inactive: Deletes all the unused and
Device#install remove inactive
inactive installation files.
Note The install rollback command succeeds only if you have not removed the previous file using the install
remove inactive command.
Alternatively, you can downgrade by installing the older image using the install commands.
/bootflash/c8000be-firmware_sm_nim_adpt.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_sm_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_sm_async.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_sm_1t3e3.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_sm_10g.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_prince.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_nim_xdsl.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_nim_ssd.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_nim_shdsl.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_nim_cwan.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_nim_bri_st_fw.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_nim_async.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_ngwic_t1e1.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_dsp_tilegx.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_dsp_analogbri.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
/bootflash/c8000be-firmware_dreamliner.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
This operation may require a reload of the system. Do you want to proceed? [y/n]y
--- Starting Activate ---
Performing Activate on Active/Standby
Building configuration...
[1] Finished Commit on R0
Checking status of Commit on [R0]
Commit: Passed on [R0]
Finished Commit
[OK]
*Oct 28 22:06:55.375: %SYS-6-PRIVCFG_ENCRYPT_SUCCESS: Successfully encrypted private config
fileSend model notification for install_add_activate_commit before reload
Install will reload the system now!
SUCCESS: install_add_activate_commit Thu Oct 28 22:07:22 UTC 2021
Router#
*Oct 28 22:07:22.661: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install one-shot PACKAGE
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.binOct
28 22:07:26.864: %PMAN-5-EXITACTION: R0/0: pvp: Process manager is exiting: reload action
requested
Router#
*Oct 28 22:40:25.971: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install add PACKAGE
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.bin
c8000be-firmware_dsp_analogbri.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_dsp_tilegx.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_ngwic_t1e1.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_bri_st_fw.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_cwan.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_shdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_ssd.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_xdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_prince.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_10g.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_1t3e3.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_nim_adpt.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-mono-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-rpboot.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
WARNING: A different version of provisioning file packages.conf already exists in bootflash:
WARNING: The provisioning file from the expanded bundle will be saved as
WARNING: bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211027_0.conf
... package files copied
SUCCESS: Finished expanding all-in-one software package.
Image file expanded
SUCCESS: install_add Thu Oct 28 22:40:10 UTC 2021
[2|install_add]: END SUCCESS Thu Oct 28 22:40:25 UTC 2021
[2|install_add(INFO, )]: cleanup_trap remote_invocation 0 operation install_add .. 0 .. 0
[3|COMP_CHECK]: START Thu Oct 28 22:40:26 UTC 2021
[3|COMP_CHECK]: END FAILED exit(1) Thu Oct 28 22:40:27 UTC 2021
[3|COMP_CHECK(INFO, )]: cleanup_trap remote_invocation 0 operation COMP_CHECK .. 1 .. 1
[4|install_activate]: START Thu Oct 28 22:42:53 UTC 2021
[4|install_activate(INFO, require user prompt)]: install_cli
[4|install_activate(CONSOLE, )]: Activating PACKAGE
[4|install_activate(INFO, )]: Acquiring transaction lock...
[4|install_activate(INFO, )]: global_trans_lock:
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, )]: tmp_global_trans_lock: /tmp/tmp_install_global_trans_lock
[4|install_activate(INFO, )]: tmp lock does not exist: /tmp/tmp_install_global_trans_lock
[4|install_activate(INFO, )]: global_trans_lock:
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, )]: tmp_global_trans_lock: /tmp/tmp_install_global_trans_lock
[4|install_activate(INFO, )]: local_trans_lock: /bootflash/.installer/install_local_trans_lock
[4|install_activate(INFO, )]: global_trans_lock:
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, )]: validate_lock: lock_duration is 7200
[4|install_activate(INFO, )]: install type stored in lock PACKAGE, install type PACKAGE,
install operation install_activate
[4|install_activate(INFO, )]: lock duration: 7200
[4|install_activate(INFO, )]: extend trans lock done.
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, require user prompt)]: install_cli
[4|install_activate( FATAL)]: Cannot proceed activate because of user input
[4|install_activate(INFO, )]: cleanup_trap remote_invocation 0 operation install_activate
.. 6 .. 0
[5|install_add]: START Thu Oct 28 22:45:48 UTC 2021
[5|install_add(INFO, )]: Set INSTALL_TYPE to PACKAGE
[5|install_add(CONSOLE, )]: Adding PACKAGE
[5|install_add(CONSOLE, )]: Checking whether new add is allowed ....
[5|install_add(INFO, )]: check_add_op_allowed: Install type PACKAGE
[5|install_add( FATAL)]: Super package already added. Add operation not allowed. install
remove inactive can be used to discard added packages
This operation may require a reload of the system. Do you want to proceed? [y/n]y
--- Starting Activate ---
Performing Activate on Active/Standby
Modified
c8000be-firmware_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_dsp_tilegx.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_ngwic_t1e1.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_async.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_bri_st_fw.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_cwan.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_shdsl.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_ssd.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_xdsl.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_prince.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_10g.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_1t3e3.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_async.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_nim_adpt.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-mono-universalk9.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified c8000be-rpboot.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
New files list:
Added
c8000be-firmware_dreamliner.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_dsp_analogbri.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_dsp_tilegx.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_ngwic_t1e1.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_bri_st_fw.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_cwan.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_shdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_ssd.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_xdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_prince.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_10g.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_1t3e3.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_nim_adpt.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-mono-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added c8000be-rpboot.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Finished list of software package changes
[1] Finished Activate on R0
Checking status of Activate on [R0]
Activate: Passed on [R0]
Finished Activate
Router#
*Oct 29 00:05:09.504: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install activate PACKAGEOct 29 00:05:14.494: %PMAN-5-EXITACTION: R0/0: pvp: Process manager
is exiting: reload action requested
Router#
*Oct 29 00:14:03.712: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install commit PACKAGE
Finished Add
This operation may require a reload of the system. Do you want to proceed? [y/n]y
--- Starting Activate ---
Performing Activate on Active/Standby
[1] Activate package(s) on R0
[1] Finished Activate on R0
Checking status of Activate on [R0]
Activate: Passed on [R0]
Finished Activate
[OK]
*Dec 10 18:14:57.782 GMT: %SYS-6-PRIVCFG_ENCRYPT_SUCCESS: Successfully encrypted private
config fileSend model notification for install_add_activate_commit before reload
/usr/binos/conf/install_util.sh: line 164: /bootflash/.prst_sync/reload_info: No such file
or directory
/usr/binos/conf/install_util.sh: line 168: /bootflash/.prst_sync/reload_info: No such file
or directory
cat: /bootflash/.prst_sync/reload_info: No such file or directory
Install will reload the system now!
SUCCESS: install_add_activate_commit Fri Dec 10 18:15:23 GMT 2021
ROUTER#
*Dec 10 18:15:23.955 GMT: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install one-shot PACKAGE bootflash:c8000be-universalk9.17.06.01a.SPA.binDec 10 18:15:27.708:
%PMAN-5-EXITACTION: R0/0: pvp: Process manager is exiting: reload action requested
ROUTER#
ROUTER# show version
Cisco IOS XE Software, Version 17.06.01a
Cisco IOS Software [Bengaluru], c8000be Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version
17.6.1a, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2021 by Cisco Systems, Inc.
Compiled Sat 21-Aug-21 03:27 by mcpre
ROM: 17.3(5r)
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
-----------------------------------------------------------------
Technology Type Technology-package Technology-package
Current Next Reboot
-----------------------------------------------------------------
Smart License Perpetual None None
Smart License Subscription None None
This install abort would require a reload. Do you want to proceed? [y/n]
*Oct 29 02:42:52.789:
%INSTALL-5-INSTALL_START_INFO: R0/0: install_engine: Started install aborty
--- Starting Abort ---
Performing Abort on Active/Standby
Router#
*Oct 29 02:44:47.866: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install abort PACKAGEOct 29 02:44:51.577: %PMAN-5-EXITACTION: R0/0: pvp: Process manager
is exiting: reload action requested
--------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------
Package:
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Size: 2966620
Timestamp: 2021-10-21 20:10:44 UTC
--------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------
--------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------
Solution Use the following show commands to view installation summary, logs, and software versions.
• request platform software trace archive target bootflash <location>: this command archives all the
trace logs relevant to all the processes running on the system since the last reload, and saves this
information in the specified location.
ROMmon Images
A ROMmon image is a software package used by ROM Monitor (ROMmon) software on a router. The software
package is separate from the consolidated package normally used to boot the router. For more information
on ROMmon, see the "ROM Monitor Overview and Basic Procedures" section in the Cisco 1100 Series ISR
Hardware and Installation Guide.
An independent ROMmon image (software package) may occasionally be released and the router can be
upgraded with the new ROMmon software. For detailed instructions, see the documentation that accompanies
the ROMmon image.
Note A new version of the ROMmon image is not necessarily released at the same time as a consolidated package
for a router.
Cisco IOS XE Minimum ROMmon Release Supported for Recommended ROMmon Release
Release IOS XE Supported for IOS XE
Cisco IOS XE Minimum ROMmon Release Supported for Recommended ROMmon Release
Release IOS XE Supported for IOS XE
Note Starting from the following releases, the ROMmon image is not available for download on software.cisco.com:
• Cisco IOS XE Release 16.12.4 (16.x) onwards
• Cisco IOS XE Release 17.3.2 (17.x) onwards
Instead the ROMmon image is bundled along with the IOS XE image. When you install the IOS XE image,
if the version of ROMmon bundled is higher than the existing version of ROMmon, an upgrade is performed
automatically.
Note To boot a device running Cisco IOS XE software 17.5.x or later, it is mandatory that the ROMmon version
is 16.9(1r) or later. If the ROMmon version of the device is earlier than or equal to 16.6(1r), then a manual
upgrade to 16.12(1r) is required.
Default Configuration
When you boot up the router for the first time, the router looks for a default file name-the PID of the router.
For example, the Cisco 1000 Series Integrated Services Routers look for a file named isr1100.cfg. The Cisco
1000 Series ISR looks for this file before finding the standard files-router-confg or the ciscortr.cfg.
The Cisco 1000 ISR looks for the isr1100.cfg file in the bootflash. If the file is not found in the bootflash, the
router then looks for the standard files-router-confg and ciscortr.cfg. If none of the files are found, the router
then checks for any inserted USB that may have stored these files in the same particular order.
Note If there is a configuration file with the PID as its name in an inserted USB, but one of the standard files are
in bootflash, the system finds the standard file for use.
Use the show running-config command to view the initial configuration, as shown in the following example:
Router# show running-config
Building configuration...
!
version 16.6
service timestamps debug datetime msec
service timestamps log datetime msec
platform qfp utilization monitor load 80
no platform punt-keepalive disable-kernel-core
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
!
!
!
!
!
!
!
!
!
!
!
subscriber templating
!
!
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-4175586959
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4175586959
revocation-check none
rsakeypair TP-self-signed-4175586959
!
!
crypto pki certificate chain TP-self-signed-4175586959
!
!
license udi pid C1111-8PLTELA sn FGL212694ML
!
diagnostic bootup level minimal
spanning-tree extend system-id
!
!
!
redundancy
mode none
!
controller Cellular 0/2/0
lte modem link-recovery disable
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface GigabitEthernet0/0/0
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet0/0/1
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet0/1/0
!
interface GigabitEthernet0/1/1
!
interface GigabitEthernet0/1/2
!
interface GigabitEthernet0/1/3
!
interface GigabitEthernet0/1/4
!
interface GigabitEthernet0/1/5
!
interface GigabitEthernet0/1/6
!
interface GigabitEthernet0/1/7
!
interface Cellular0/2/0
ip address negotiated
ipv6 enable
!
interface Cellular0/2/1
no ip address
shutdown
!
interface Vlan1
no ip address
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
!
!
!
!
!
control-plane
!
!
line con 0
transport input none
stopbits 1
line vty 0 4
login
!
wsma agent exec
!
wsma agent config
!
wsma agent filesys
!
wsma agent notify
!
!
end
Procedure
Procedure
Step 2 ip address ip-address mask Sets the IP address and subnet mask for the
specified interface. Use this Step if you are
Example:
configuring an IPv4 address.
Router(config-if)# ip address
192.168.12.2 255.255.255.0
Step 3 ipv6 address ipv6-address/prefix Sets the IPv6 address and prefix for the
specified interface. Use this step instead of Step
Example:
2, if you are configuring an IPv6 address.
Router(config-if)# ipv6 address
2001.db8::ffff:1/128
Step 4 no shutdown Enables the interface and changes its state from
administratively down to administratively up.
Example:
Router(config-if)# no shutdown
Router(config-if)# exit
Procedure
Step 3 (Option 2) ipv6 address ipv6-address/prefix Sets the IPv6 address and prefix on the loopback
interface.
Example:
Router(config-if)# 2001:db8::ffff:1/128
The loopback interface in this sample configuration is used to support Network Address Translation
(NAT) on the virtual-template interface. This configuration example shows the loopback interface
configured on the Gigabit Ethernet interface with an IP address of 192.0.2.0/16, which acts as a static
IP address. The loopback interface points back to virtual-template1, which has a negotiated IP address.
!
interface loopback 0
ip address 192.0.2.1 255.255.0.0 (static IP address)
ip nat outside
!
interface Virtual-Template1
ip unnumbered loopback0
no ip directed-broadcast
ip nat outside
Alternatively, use the ping command to verify the loopback interface, as shown in the following
example:
Procedure
Router(config-line)# login
Router(config-line)# exit
Step 6 line [ console | tty | vty] line-number Specifies a virtual terminal for remote console
access.
Example:
Router(config-line)# login
Router(config-line)# end
Example
The following configuration shows the command-line access commands.
You do not have to input the commands marked default. These commands appear automatically in
the configuration file that is generated when you use the show running-config command.
!
line console 0
exec-timeout 10 0
password 4youreyesonly
login
transport input none (default)
stopbits 1 (default)
line vty 0 4
password secret
login
!
Procedure
Step 2 (Option 2) ipv6 route prefix/mask Specifies a static route for the IP packets.
{ipv6-address | interface-type
interface-number [ipv6-address]}
Example:
Router(config)# end
In the following configuration example, the static route sends out all IP packets with a destination
IP address of 192.168.1.0 and a subnet mask of 255.255.255.0 on the Gigabit Ethernet interface to
another device with an IP address of 10.10.10.2. Specifically, the packets are sent to the configured
PVC.
You do not have to enter the command marked default. This command appears automatically in the
configuration file generated when you use the running-config command.
!
ip classless (default)
ip route 2001:db8:2::/64 2001:db8:3::0
Verifying Configuration
To verify that you have configured static routing correctly, enter the show ip route command (or
show ipv6 route command) and look for static routes marked with the letter S.
When you use an IPv4 address, you should see verification output similar to the following:
When you use an IPv6 address, you should see verification output similar to the following:
C 2001:DB8:3::/64 [0/0]
via GigabitEthernet0/0/2, directly connected
S 2001:DB8:2::/64 [1/0]
via 2001:DB8:3::1
Procedure
Router(config-router)# version 2
Router(config-router)# end
The following configuration example shows RIP Version 2 enabled in IP networks 10.0.0.0 and
192.168.1.0. To see this configuration, use the show running-config command from privileged
EXEC mode.
!
Router# show running-config
Building configuration...
hostname Router
!
boot-start-marker
boot system tftp /auto/tftp-sjc-users5/c1100-universalk9_ias.16.06.02.SPA.bin 255.255.255.0
boot-end-marker
!
!
vrf definition VRF-example
description VRF-example
!
no logging console
!
aaa new-model
!
!
!
aaa login success-track-conf-time 1
!
!
!
!
aaa session-id common
!
transport-map type persistent webui tsn_sol
server
secure-server
!
clock timezone PST -23 0
call-home
contact-email-addr dsfdsfds@cisco.com
profile "ewrewtrwrewr"
destination address email cisco@cisco.com
!
!
ipv6 unicast-routing
ipv6 dhcp pool 234324
!
!
!
!
!
!
!
!
subscriber templating
!
!
multilink bundle-name authenticated
passthru-domain-list 34324
match 3r4324
passthru-domain-list ewtrewr
match asfdkdslkf.com
!
!
!
crypto pki trustpoint TP-self-signed-2994767669
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2994767669
revocation-check none
rsakeypair TP-self-signed-2994767669
!
crypto pki trustpoint TP-self-signed-3039537782
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3039537782
revocation-check none
rsakeypair TP-self-signed-3039537782
!
!
crypto pki certificate chain TP-self-signed-2994767669
crypto pki certificate chain TP-self-signed-3039537782
!
!
license udi pid C1111-8PLTELAWN sn FGL212392WT
!
redundancy
mode none
!
controller Cellular 0/2/0
lte modem link-recovery disable
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface Loopback3
no ip address
!
interface Loopback50
ip address 192.0.2.1 255.255.255.255
!
interface Loopback100
no ip address
!
interface Loopback544534
no ip address
!
interface Loopback32432532
no ip address
!
interface Port-channel2
no ip address
no negotiation auto
!
interface GigabitEthernet0/0/0
description Interface for WebUI access
ip address 192.168.1.46 255.255.255.0
negotiation auto
spanning-tree portfast disable
!
interface GigabitEthernet0/0/1
description Interface for TFTP
ip address 192.0.2.1 255.255.255.0
negotiation auto
spanning-tree portfast disable
!
interface GigabitEthernet0/1/0
spanning-tree portfast disable
!
interface GigabitEthernet0/1/1
!
interface GigabitEthernet0/1/2
!
interface GigabitEthernet0/1/3
!
interface GigabitEthernet0/1/4
!
interface GigabitEthernet0/1/5
!
interface GigabitEthernet0/1/6
!
interface GigabitEthernet0/1/7
!
interface Wlan-GigabitEthernet0/1/8
!
interface Cellular0/2/0
pulse-time 1
!
interface Cellular0/2/1
no ip address
!
interface Vlan1
ip address 10.10.10.1 255.255.255.0
!
router rip
version 2
network 10.0.0.1
network 192.168.1.0
!
!
address-family ipv4 unicast autonomous-system 44
!
af-interface GigabitEthernet0/0/0
no split-horizon
exit-af-interface
!
topology base
exit-af-topology
exit-address-family
!
!
!
!
control-plane
!
banner login ^CTSN_WebUI^C
!
line con 0
transport input none
stopbits 1
line vty 0 4
exec-timeout 0 0
transport input telnet ssh
transport output all
line vty 5 15
transport input all
transport output all
!
wsma agent exec
!
wsma agent config
!
wsma agent filesys
!
wsma agent notify
!
!
end
Router#
Verifying Configuration
To verify that you have configured RIP correctly, enter the show ip route command and look for
RIP routes marked with the letter R. You should see an output similar to the one shown in the
following example:
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Procedure
Router(config-router)# end
Example
The following configuration example shows the EIGRP routing protocol enabled in IP networks
192.168.1.0 and 10.10.12.115. The EIGRP autonomous system number is 109. To see this
configuration, use the show running-config command.
Router# show running-config
.
.
.
!
router eigrp 109
network 192.168.1.0
network 10.10.12.115
!
.
.
.
Verifying Configuration
To verify that you have configured IP EIGRP correctly, enter the show ip route command, and look
for EIGRP routes marked by the letter D. You should see verification output similar to the following:
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Partial Clean-up
The partial clean-up of an LTE cellular device involves removing the existing IOS-XE configuration to ensure
optimal clean-up of the device before it is repurposed.
There are two ways to enable the partial clean-up process: by pressing the factory reset button or by configuring
the factory-reset command.
Procedure
Router> enable
The following configuration example shows partial clean-up of the cellular modem that erases the
configuration set-up:
Router#factory-r
Router#factory-reset ?
all All factory reset operations
keep-licensing-info Keep license usage info
Complete Clean-up
To ensure a complete cleanup of the cellular modem that erases both the configuration and the profiles, use
the lte cellular-cleanup-profile command.
The command is built in relation to the physical button to ensure a full cleanup. Therefore, the command will
perform a thorough clean-up only when the factory-reset button is pressed.
Procedure
Router> enable
Router# configure terminal
Router(config)#
The following configuration example shows complete cleanup of the cellular modem that erases both
the configuration and the profiles:
Router(config-controller)#lte cellular-profile-cleanup
************************************************************
Modem cellular profiles will be deleted during next reload
if this cli is enabled and factory reset button is pressed.
**********************************************************
Are you sure you want to proceed?[confirm]y
2. When the router boots up, the LED displays an Amber color and starts to blink, take a pin or a
toothpick and gently press on factory reset button for about 10 to 20 seconds.
The following output shows when the clean-up is completely executed and the profiles will be deleted:
Router#show cellular 0/2/0 profile
Profile 1 = INACTIVE* **
--------
PDP Type = IPv4v6
Access Point Name (APN) =
Authentication = None
The above is the pre-conditions for verification. Once set, we will re-load the router and as part of the new
reload, running configuration and modem profiles will be cleaned.
Before the clean-up is executed, the following output will appear:
Router#show cellular 0/2/0 profile
Profile 1 = INACTIVE* **
--------
PDP Type = IPv4v6
Access Point Name (APN) = test2
Authentication = None
Profile 2 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = heyhey
Authentication = None
* - Default profile
** - LTE attach profile
Configured default profile for active SIM 0 is profile 1.
Router#
Note Type 6 encrypted password and Autoconversion to password type 6 are supported
from is supported from Cisco IOS XE Amsterdam 17.2 and later releases.
• If the startup configuration of the device has type 6 password and you downgrade to a version in which
type 6 password is not supported, you will be locked out of the device.
Note This is supported in Cisco IOS XE Amsterdam 17.2.1 and later releases.
• For an additional layer of security, you can also configure username and password pairs, which are locally
stored on the switch. These pairs are assigned to lines or ports and authenticate each user before that user
can access the switch. If you have defined privilege levels, you can also assign a specific privilege level
(with associated rights and privileges) to each username and password pair.
• If you want to use username and password pairs, but you want to store them centrally on a server instead
of locally, you can store them in a database on a security server. Multiple networking devices can then
use the same database to obtain user authentication (and, if necessary, authorization) information.
• You can also enable the login enhancements feature, which logs both failed and unsuccessful login
attempts. Login enhancements can also be configured to block future login attempts after a set number
of unsuccessful attempts are made.
Enable password and privilege level No password is defined. The default is level 15 (privileged EXEC
level). The password is not encrypted in the configuration file.
Enable secret password and privilege No password is defined. The default is level 15 (privileged EXEC
level level). The password is encrypted before it is written to the
configuration file.
Password Recovery
By default, any end user with physical access to the switch can recover from a lost password by interrupting
the boot process while the switch is powering on and then by entering a new password.
The password-recovery disable feature protects access to the switch password by disabling part of this
functionality. When this feature is enabled, the end user can interrupt the boot process only by agreeing to set
the system back to the default configuration. With password recovery disabled, you can still interrupt the boot
process and change the password, but the configuration file (config.text) and the VLAN database file (vlan.dat)
are deleted.
If you disable password recovery, we recommend that you keep a backup copy of the configuration file on a
secure server in case the end user interrupts the boot process and sets the system back to default values. Do
not keep a backup copy of the configuration file on the switch. If the switch is operating in VTP transparent
mode, we recommend that you also keep a backup copy of the VLAN database file on a secure server. When
the switch is returned to the default system configuration, you can download the saved files to the switch by
using the Xmodem protocol.
To re-enable password recovery, use the service password-recovery global configuration command.
Privilege Levels
Cisco devices use privilege levels to provide password security for different levels of switch operation. By
default, the Cisco IOS XE software operates in two modes (privilege levels) of password security: user EXEC
(Level 1) and privileged EXEC (Level 15). You can configure up to 16 hierarchical levels of commands for
each mode. By configuring multiple passwords, you can allow different sets of users to have access to specified
commands.
For example, if you want many users to have access to the clear line command, you can assign it level 2 security
and distribute the level 2 password fairly widely. But if you want more restricted access to the configure
command, you can assign it level 3 security and distribute that password to a more restricted group of users.
Note Type 6 username and password are backward compatible to Cisco IOS XE Gibraltar 16.10.x. If you downgrade
to any release earlier than Cisco IOS XE Gibraltar 16.10.1, the type 6 username and password are rejected.
After autoconversion, to prevent an administrator password from getting rejected during a downgrade, migrate
the passwords used for administrator logins (management access) to irreversible password types manually.
Procedure
Device> enable
Device(config)# end
Procedure
Device> enable
Or
Device(config)# enable
algorithm-type scrypt
secret cisco
Device(config)# end
Procedure
Device> enable
Step 3 system disable password recovery switch {all Disables password recovery.
| <1-9>}
• all: Sets the configuration on switches in
Example: stack.
Device(config)# end
What to do next
To remove disable password recovery, use the no system disable password recovery switch all global
configuration command.
Procedure
Device> enable
Step 4 password password Sets a Telnet password for the line or lines.
Example: For password, specify a string from 1 to 25
alphanumeric characters. The string cannot start
Device(config-line)# password abcxyz543 with a number, is case sensitive, and allows
spaces but ignores leading spaces. By default,
no password is defined.
Device(config-line)# end
Procedure
Device> enable
Step 3 username name [privilege level] {password Sets the username, privilege level, and password
encryption-type password} for each user.
Example: • For name, specify the user ID as one word
or the MAC address. Spaces and quotation
Device(config)# username adamsample marks are not allowed.
privilege 1 password secret456
• You can configure a maximum of 12000
Device(config)# username 111111111111 clients each, for both username and MAC
mac attribute filter.
• (Optional) For level, specify the privilege
level the user has after gaining access. The
range is 0 to 15. Level 15 gives privileged
EXEC mode access. Level 1 gives user
EXEC mode access.
• For encryption-type, enter 0 to specify that
an unencrypted password will follow.
Enter 7 to specify that a hidden password
will follow. Enter 6 to specify that an
encrypted password will follow.
• For password, specify the password the
user must enter to gain access to the
device. The password must be from 1 to
25 characters, can contain embedded
spaces, and must be the last option
specified in the username command.
Step 4 Use one of the following: Enters line configuration mode, and configures
the console port (line 0) or the VTY lines (line
• line console 0
0 to 15).
• line vty 0 15
Example:
Device(config)# line console 0
or
Device(config)# line vty 15
Device(config-line)# end
Procedure
Device> enable
Step 3 privilege mode level level command Sets the privilege level for a command.
Example: • For mode, enter configure for global
configuration mode, exec for EXEC mode,
Device(config)# privilege exec level 14 interface for interface configuration mode,
configure or line for line configuration mode.
• For level, the range is from 0 to 15. Level
1 is for normal user EXEC mode
privileges. Level 15 is the level of access
permitted by the enable password.
• For command, specify the command to
which you want to restrict access.
Step 4 enable password level level password Specifies the password to enable the privilege
level.
Example:
• For level, the range is from 0 to 15. Level
Device(config)# enable password level 14 1 is for normal user EXEC mode
SecretPswd14 privileges.
• For password, specify a string from 1 to
25 alphanumeric characters. The string
cannot start with a number, is case
sensitive, and allows spaces but ignores
leading spaces. By default, no password
is defined.
Device(config)# end
Procedure
Device> enable
Step 3 line vty line Selects the virtual terminal line on which to
restrict access.
Example:
Step 4 privilege exec level level Changes the default privilege level for the line.
Example: For level, the range is from 0 to 15. Level 1 is
for normal user EXEC mode privileges. Level
Device(config-line)# privilege exec level 15 is the level of access permitted by the enable
15 password.
Device(config-line)# end
What to do next
Users can override the privilege level you set using the privilege level line configuration command by logging
in to the line and enabling a different privilege level. They can lower the privilege level by using the disable
command. If users know the password to a higher privilege level, they can use that password to enable the
higher privilege level. You might specify a high level or privilege level for your console line to restrict line
usage.
Procedure
Procedure
Device> enable
Step 3 key config-key password-encrypt [text] Stores a type 6 encryption key in private
NVRAM.
Example:
• To key in interactively (using the Enter
Device(config)# key config-key key) and an encrypted key already exists,
password-encrypt you will be prompted for the following:
Old key, New key, and Confirm key.
• To key in interactively, but an encryption
key is not present, you will be prompted
for the following: New key and Confirm
key.
• When removing the password that is
already encrypted, you will see the
following prompt:
Device(config)# end
Command Information
show privilege Displays the privilege level configuration.
Device(config)# end
Description Link
The Cisco Support website provides extensive online resources, including http://www.cisco.com/support
documentation and tools for troubleshooting and resolving technical issues
with Cisco products and technologies.
To receive security and technical information about your products, you can
subscribe to various services, such as the Product Alert Tool (accessed from
Field Notices), the Cisco Technical Services Newsletter, and Really Simple
Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a Cisco.com user
ID and password.
Table 14: Feature Information for Controlling Router Access with Passwords and Privileges
Controlling Switch Access Cisco IOS XE Password protection restricts access to a network or
with Passwords and Amsterdam 17.2.1r network device. Privilege levels define what
Privileges commands users can enter after they have logged into
a network device.
Additionally, type 0 and type 7 Username and
Password can be autoconverted to type 6.
When a policy changes for a user or user group in AAA, administrators can send RADIUS CoA packets from
the AAA server, such as a Cisco Identity Secure Engine (ISE) to reinitialize authentication and apply the new
policy. This section provides an overview of the RADIUS interface including available primitives and how
they are used during a CoA.
The RADIUS CoA provides a mechanism to change the attributes of an AAA session after it is authenticated.
When policy changed on user or user group in RADIUS server, administrators can initiate RADIUS CoA
process from RADIUS server to re-authenticate or re-authorize new policy
By default, the RADIUS interface is enabled on the device. However, some basic configuration is required
for the following attributes:
• Security and Password
• Accounting
After posture assessment is succeessful, full network access is pushed down to the device for specific client
through CoA re-authentication command based on its compliance state derived from last assessment. It is
optional to enforce downloadable ACLs with Permit-ALL or limited access to certain resources to corresponding
clients. Per-session CoA requests are supported for session identification, session termination, host
reauthentication, port shutdown, and port bounce. This model comprises one request (CoA-Request) and two
possible response codes:
• CoA acknowledgement (ACK) [CoA-ACK]
• CoA nonacknowledgement (NAK) [CoA-NAK]
Change of Authorization
Change of Authorization (CoA) is a critical part of a solution to initiate re-authenticate or re-authorization to
an endpoint’s network access based on its posture assessment result. This feature is integrated with Cisco
AnyConnect, version 4.8 and Cisco ISE, version 2.6.
The network topology below shows a typical Cisco 1000 Series Integrated Services Router as a branch router
in a network for secure access with ISE and other network services deployed in Campus or Data Center.
Figure 1: Cisco ISR1000 in a Network for Secure Access with ISE and other Network Services
CoA is critical part of the solution to initiate re-authenticate or re-authorization to endpoint’s network access
based on its posture assessment result. Downloadable ACL is the Target/Purpose of the entire solution. The
per-client basis customized security policies are achieved by it.
• Switch ASIC TCAM has only 255 entries (IPv4 ACL entries) in total
• No IPv4 option header support, no IP fragment support in ACL packet inspection
• IPv6 is not supported in this feature
• Port ACL is not supported in this feature
• SISF: Only support none-secure device-tracking (tracking policy with security level ‘glean’)
• Multi-auth vlan is not supported on Cisco 1000 Series Integrated Services Routers
• Tracking is not getting replaced by ‘enable tracking‘
• VLAN change does not happen consistently with multiple iterations on client interfaces
If you are trying to access the router through the console port and send a break signal (by entering Ctrl-C or
Ctrl-Shift-6, or by entering the send break command at the Telnet prompt) before connecting to the CLI,
you are directed to a diagnostic mode if the non-RPIOS subpackages are accessible. These settings can be
changed by configuring a transport map for the console port and applying that transport map to the console
interface.
In Cisco IOS XE Gibraltar 16.12 releases and earlier, you can enable the Reset button feature only if you use
service password-recovery configuration. However, to disable the feature, use the no service
password-recovery or no service password-recovery strict configurations.
From Cisco IOS XE Amsterdam 17.2.1r release and later, the Reset button feature is entirely disabled with
the no service password-recovery strict configuration.
Below are the tables that show the behavior of the Reset button feature in various possible combinations under
service password recovery and no service password recovery:
• The Reset button must be entered immediately after setup is reset to ROMMON under auto reboot mode.
The Reset feature does not work when the system is configured in ROMMON or IOS modes.
Procedure
Device(config)# exit
WARNING:
Executing this command will disable the password recovery mechanism.
Do not execute this command without another plan for password recovery.
Procedure
Router> enable
Step 4 connection wait [allow [interruptible] | Specifies how a console connection will be
none [disconnect]] handled using this transport map.
Example: • allow interruptible—The console
connection waits for a Cisco IOS VTY line
Router(config-tmap)# connection wait none to become available, and also allows users
to enter diagnostic mode by interrupting a
console connection that is waiting for a
Cisco IOS VTY line to become available.
This is the default setting.
Note
Users can interrupt a waiting connection
by entering Ctrl-C or Ctrl-Shift-6.
• none—The console connection
immediately enters diagnostic mode.
Step 5 (Optional) banner [diagnostic | wait] (Optional) Creates a banner message that will
banner-message be seen by users entering diagnostic mode or
waiting for the Cisco IOS VTY line because of
Example:
the console transport map configuration.
Router(config-tmap)# banner diagnostic • diagnostic—Creates a banner message
X seen by users directed to diagnostic mode
Enter TEXT message. End with the
because of the console transport map
character 'X'.
--Welcome to Diagnostic Mode-- configuration.
X
Note
Router(config-tmap)#
Users can interrupt a waiting connection
by entering Ctrl-C or Ctrl-Shift-6.
• wait—Creates a banner message seen by
users waiting for Cisco IOS VTY to
become available.
• banner-message—Banner message, which
begins and ends with the same delimiting
character.
Router(config-tmap)# exit
Examples
The following example shows how to create a transport map to set console port access policies and
attach to console port 0:
Router(config)# transport-map type console consolehandler
Router(config-tmap)# connection wait allow interruptible
Router(config-tmap)# banner diagnostic X
Enter TEXT message. End with the character 'X'.
--Welcome to diagnostic mode--
X
Router(config-tmap)# banner wait X
Enter TEXT message. End with the character 'X'.
Waiting for IOS vty line
X
Router(config-tmap)# exit
Router(config)# transport type console 0 input consolehandler
Example
The following example shows transport maps that are configured on the router: console port (consolehandler):
Router# show transport-map allTransport Map:
Name: consolehandler Type: Console Transport
Connection:
Wait option: Wait Allow Interruptable Wait banner:
Connection:
Wait option: Wait Allow Interruptable Wait banner:
Connection:
Wait option: Wait Allow Interruptable Wait banner:
Use the show platform software configuration access policy command to view the current configurations
for handling the incoming console port, SSH, and Telnet connections. The output of this command provides
the current wait policy for each type of connection (Telnet, SSH, and console), as well as information on the
currently configured banners.
Unlike the show transport-map command, the show platform software configuration access policy
command is available in diagnostic mode so that it can be entered in scenarios where you need transport map
configuration information, but cannot access the Cisco IOS CLI.
Example
The following example shows the show platform software configuration access policy command.
Router# show platform software configuration access policyThe current access-policies
Method : telnet
Rule : wait with interrupt Shell banner:
Welcome to Diagnostic Mode
Wait banner :
Waiting for IOS Process
Method : console
Rule : wait with interrupt Shell banner:
Wait banner :
Procedure
Step 1 Connect the RJ-45 end of the adapter cable to the console port on the router.
Step 2 Use the show line command to determine the async interface of the console port:
Router# show line
Router#show line
Tty Line Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int
* 0 0 CTY - - - - - 0 0 0/0 -
866 866 VTY - - - - - 0 0 0/0 -
867 867 VTY - - - - - 0 0 0/0 -
868 868 VTY - - - - - 0 0 0/0 -
869 869 VTY - - - - - 0 0 0/0 -
870 870 VTY - - - - - 0 0 0/0 -
Step 3 Use the following commands to configure the router console line::
Router(config)# line con 0
Router(config-line)#modem inOut
Router(config-line)#modem autoconfigure type usr_sportster
Router(config-line)#speed 115200 [Speed to be set according to the modem manual]
Router(config-line)#stopbits 1 [Stopbits to be set according to the modem manual]
Router(config-line)#transport input all
Router(config-line)#flowcontrol hardware [flowcontrol to be set according to the modem
manual]
Router(config-line)#password cisco
Router(config-line)#login
Router(config-line)#end
Router(config)#enable password lab
Step 4 Use the reverse telnet method on the modem to verify the modem connectivity and configuration string:
Router(config)#int loopback 0
Router(config-if)#ip add 192.0.2.1 255.255.255.0
Router(config-if)#end
Router#telnet 192.0.2.1 2001
Trying 1.1.1.1, 2001 ... Open
Step 5 Use an analog phone to verify that the phone line is active and functions properly. Then, connect the analog
phone line to the modem.
Step 6 Initialize an EXEC modem call to the router from another device (PC) to test the modem connection.
Step 7 When the connection is established, the dial in client is prompted for a password. Enter the correct password.
Note: This password should match the one that is configured on the console port line.
Note Before you access the WebUI, you need to have the basic configuration on the device.
Procedure
Step 1 Ensure that the router is in the factory fresh mode. If the router is not in the factory fresh mode, use the write
erase option to erase all the configuration from the router.
Step 2 Ensure that the following basic configuration is available on the device.
!
!
ip dhcp excluded-address 192.168.1.1 192.168.1.5
!
ip dhcp pool WEBUIPool
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
dns-server 192.168.1.1
!
!
username webui privilege 15 secret cisco
!
interface Vlan1
ip address 192.168.1.1 255.255.255.0
ip nat inside
no shutdown
!
Step 3 Connect the PC to any of the switch port which is the member of VLAN1. By default, all the ports will be
the member of VLAN1 and the PC recieves the IP address from the pool WEBUIPool.
Step 4 After your PC receives the IP address, launch the browser, type https://192.168.1.1/webui/#/dayZeroRouting
or enter http://192.168.1.1/webui/#/dayZeroRouting.
Step 5 Enter the default username (webui) and default password (cisco).
Procedure
Step 1 Choose the Basic Mode or Advanced Mode and click Go To Account Creation Page.
Step 2 Enter the username and password. Reenter the password to confirm.
Step 3 Click Create and Launch Wizard.
Step 4 Enter the device name and domain name.
Step 5 Select the appropriate time zone from the Time Zone drop-down list.
Step 6 Select the appropriate date and time mode from the Date and Time drop-down list.
Step 7 Click LAN Settings.
Step 1 Choose the Web DHCP Pool/DHCP Pool name or the Create and Associate Access VLAN option.
a) If you choose the Web DHCP Pool, specify the following:
Pool Name—Enter the DHCP Pool Name.
Network—Enter network address and the subnet mask.
b) If you choose the Create and Associate Access VLAN option, specify the following:
Access VLAN—Enter the Access VLAN identification number. The range is from 1 to 4094.
Network—Enter the IP address of the VLAN.
Management Interfaces—Select the interface and move to the selected list box using the right and left
arrows. You can also double click or drag and drop to move the interface to the selected list box.
Step 1 Select the primary WAN type. You can configure Serial, 3G/4G, Ethernet, or Broadband (xDSL) as primary
WAN depending on the WAN types supported by the router.
Step 2 Select the interface from the drop-down list.
Step 3 Check the Get DNS Server info directly from ISP check box to get the DNS server information directly
from the service provider. You can also manually enter the Primary DNS and Secondary DNS.
Step 4 Check the Get IP automatically from ISP check box to get the IP address information directly from the
service provider. You can also manually enter the IP address and subnet mask.
Step 5 Check the Enable NAT check box to enable NAT. It is recommended to enable NAT.
Step 6 Check the Enable PPPOE check box to enable PPPoE. If you have enabled PPPoE, select the required
authentication mode. The options are: PAP and CHAP.
Step 7 Enter the username and password provided by the service provider.
Step 8 Click Security / APP Visibility WAN Settings.
Procedure
Step 1 Select the secondary WAN type. You can configure Serial, 3G/4G, Ethernet, or Broadband (xDSL) as a
secondary WAN depending on the WAN types supported by the router.
Step 2 Select the interface from the drop-down list.
Step 3 Check the Get DNS Server info directly from ISP check box to get the DNS server information directly
from the service provider. You can also manually enter the Primary DNS and Secondary DNS.
Step 4 Check the Get IP automatically from ISP check box to get the IP address information directly from the
service provider. You can also manually enter the IP address and subnet mask.
Step 5 Check the Enable NAT check box to enable NAT. It is recommended to enable NAT.
Step 6 Check the Enable PPPOE check box to enable PPPoE. If you have enabled PPPoE, select the required
authentication mode. The options are PAP and CHAP.
Step 7 Enter the username and password provided by the service provider.
Step 8 Click Security / APP Visibility WAN Settings.
Step 1 Check the Enable Cisco Recommended Security Settings check box to ensure that all passwords are not
shown in plain text. The passwords are encrypted.
Step 2 Click Day 0 Config Summary.
Step 3 To preview the configuration, click CLI Preview to preview the configuration.
Step 4 Click Finish to complete the Day Zero setup.
Procedure
Step 1 Configure the HTTP server. By default, the HTTP server configuration should be present on the device. Ensure
the configuration by checking if the ip http server and ip http secure-server commands are present in the
running configuration.
Device #configure terminal
Device (config)#ip http server
Device (config)#ip http secure-server
Step 2 Set up the authentication options to log into Web UI. You can use one of these methods to authenticate:
a) You can authenticate using local database. To use a local database for Web UI authentication, ensure to
have the ip http authentication local command in the running configuration. This command is
preconfigured on the device. If the command is not present, configure the device as shown in this example:
Device #configure terminal
Device (config)#ip http authentication local
b) Authenticate using AAA options. To use AAA authentication for Web UI, ensure to configure ‘ip http
authentication aaa’ on the device. Also, ensure that the required AAA server configuration is present on
the device.
Device #configure terminal
Device (config)#ip http authentication local
Step 3 Launch the browser. In the address bar, type the IP address of the device. For a secure connection, type
https://ip-address.
Step 4 Enter the default username (webui) and default password (cisco).
Step 5 Click Log In.
Monitor and Troubleshoot Device Cisco IOS XE Catalyst SD-WAN You can now monitor and
PnP Onboarding using WebUI Release 17.5.1a troubleshoot your Day-0 device
onboarding using WebUI through
PnP onboarding. If the automated
PnP onboarding fails, you can
manually onboard your device.
A device can be automatically onboarded to Cisco vManage through either Zero Touch Provisioning (ZTP)
or the Plug and Play (PnP) process. This section describes the procedure to monitor and troubleshoot device
onboarding through the PnP method. This feature on WebUI enables you to monitor and troubleshoot the PnP
onboarding process, and also see its real-time status. If this onboarding is stuck or fails, you can terminate
the process and onboard your device manually.
Prerequisites
• Your device (a computer that can run a web browser) running the WebUI and the device you are
onboarding must be connected through an L2 switch port (NIM) on the device.
• The DHCP client-identifier on your device must be set to string “webui”.
• Your device must support Cisco SD-WAN Day-0 device onboarding on WebUI.
Note If the device does not have start-up configuration at the time of PnP onboarding, the WebUI is enabled by
default on supported devices.
2. On the Welcome to Cisco SDWAN Onboarding Wizard page, click Reset Default Password.
Note The default password of your Day-0 device is weak. Therefore, for a secure log in, you must reset the password
when you first log in to the device on WebUI. The WebUI configuration is automatically deleted after the
device is onboarded successfully. In rare cases where the template configuration for your device on Cisco
vManage has the WebUI configuration, it is not deleted even after a successful device onboarding.
3. You are redirected to the Device hardware and software details page. Enter your password and click
Submit.
4. The next page displays the onboarding progress and lists statuses of different components of the PnP
Connect Portal and Cisco SD-WAN controllers. If the PnP IPv4 component fails, it indicates that the
device PnP onboarding has failed.
To view and download logs for the onboarding process, click the information icon on the right hand
side of the SDWAN Onboarding Progress bar.
5. If the automated PnP onboarding fails, click Terminate Automated Onboarding. This allows you to
onboard your device manually.
6. A dialogue box appears. To continue with the termination, click Yes. It might take a few minutes for
the termination to complete.
7. On the Bootstrap Configuration page click Select File and choose the bootstrap file for your device.
This file can be either a generic bootstrap file (common platform-specific file) or a full configuration
bootstrap file that you can download from Cisco SD-WAN Manager. This file must contain details such
as the vBond number, UUID, WAN interface, root CA and configuration.
8. Click Upload.
9. After your file is successfully uploaded, click Submit.
10. You can see the SDWAN Onboarding Progress page again with statuses of the Cisco SD-WAN
controllers. To open the Controller Connection History table click the information icon on the right
hand side of the SDWAN Control Connections bar. In this table you can see the state of your onboarded
device. After the onboarding is complete, the state of your device changes to connect.
Processor memory
...
The show process cpu command displays Cisco IOS CPU utilization average:
Router# show process cpu
CPU utilization for five seconds: 1%/1%; one minute: 1%; five minutes: 1%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
1 0 21 0 0.00% 0.00% 0.00% 0 Chunk Manager
2 5692 12584 452 0.00% 0.00% 0.00% 0 Load Meter
3 0 1 0 0.00% 0.00% 0.00% 0 PKI Trustpool
4 0 1 0 0.00% 0.00% 0.00% 0 Retransmission o
5 0 1 0 0.00% 0.00% 0.00% 0 IPC ISSU Dispatc
6 16 12 1333 0.00% 0.00% 0.00% 0 RF Slave Main Th
7 4 1 4000 0.00% 0.00% 0.00% 0 EDDRI_MAIN
...
The following sections describe the fields in the show platform software status control-processor command
output.
Load Average
Load average represents the process queue or process contention for CPU resources. For example, on a
single-core processor, an instantaneous load of 7 would mean that seven processes are ready to run, one of
which is currently running. On a dual-core processor, a load of 7 would mean that seven processes are ready
to run, two of which are currently running.
Memory Utilization
Memory utilization is represented by the following fields:
• Total—Total system memory
• Used—Consumed memory
• Free—Available memory
• Committed—Virtual memory committed to processes
CPU Utilization
CPU utilization is an indication of the percentage of time the CPU is busy, and is represented by the following
fields:
• CPU—Allocated processor
• User—Non-Linux kernel processes
• System—Linux kernel process
• Nice—Low-priority processes
• Idle—Percentage of time the CPU was inactive
• IRQ—Interrupts
• SIRQ—System Interrupts
• IOwait—Percentage of time CPU was waiting for I/O
Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 3448368 1996720 (58%) 1451648 (42%) 2003380 (58%)
CPU Utilization
Slot CPU User System Nice Idle IRQ SIRQ IOwait
RP0 0 1.54 0.92 0.00 97.53 0.00 0.00 0.00
1 1.64 1.12 0.00 97.22 0.00 0.00 0.00
2 3.32 8.36 0.00 88.30 0.00 0.00 0.00
3 12.58 64.44 0.00 22.97 0.00 0.00 0.00
If alarm severity is not specified, alarm messages for all severity levels are sent to logging devices.
Alarms
To view alarms, use the show facility-alarm status command. The following example shows a critical alarm
for the power supply:
Device# show facility-alarm status
Source Severity Description [Index]
------ -------- -------------------------
Cellular0/2/0 INFO Physical Port Administrative State Down [2]
Cellular0/2/1 INFO Physical Port Administrative State Down [2]
To view critical alarms, use the show facility-alarm status critical command, as shown in the following
example:
Device# show facility-alarm status critical
ystem Totals Critical: 4 Major: 0 Minor: 0
Source Time Severity Description [Index]
------ ------ -------- ------------ -------
GigabitEthernet0/1/0 Jul 12 2017 22:27:25 CRITICAL Physical Port Link Down [1]
GigabitEthernet0/1/1 Jul 12 2017 22:27:25 CRITICAL Physical Port Link Down [1]
GigabitEthernet0/1/2 Jul 12 2017 22:27:25 CRITICAL Physical Port Link Down [1]
GigabitEthernet0/1/3 Jul 12 2017 22:27:25 CRITICAL Physical Port Link Down [1]
To view the operational state of the major hardware components on the Device, use the show platform diag
command. This example shows that power supply P0 has failed:
Device# show platform diag
Slot: 0, C1117-4PLTEEA
Running state : ok
Internal state : online
Internal operational state : ok
Physical insert detect time : 00:01:52 (09:02:14 ago)
Software declared up time : 00:03:12 (09:00:54 ago)
CPLD version : 17100501
Firmware version : 16.6(1r)RC3
Network Management System Alerts a Network Administrator when an Alarm is Reported Through
SNMP
The SNMP is an application-layer protocol that provides a standardized framework and a common language
used for monitoring and managing devices in a network.
SNMP provides notification of faults, alarms, and conditions that might affect services. It allows a network
administrator to access router information through a network management system (NMS) instead of reviewing
logs, polling devices, or reviewing log reports.
To use SNMP to get alarm notification, use the following MIBs:
• ENTITY-MIB, RFC4133(required for the CISCO-ENTITY-ALARM-MIB, ENTITY-STATE-MIB and
CISCO-ENTITY-SENSOR-MIB to work)
• CISCO-ENTITY-ALARM-MIB
• ENTITY-STATE-MIB
• CISCO-ENTITY-SENSOR-MIB(for transceiver environmental alarm information, which is not provided
through the CISCO-ENTITY-ALARM-MIB)
Overview
Security-Enhanced Linux (SELinux) is a solution composed of Linux kernel security module and system
utilities to incorporate a strong, flexible Mandatory Access Control (MAC) architecture into Cisco IOS-XE
platforms.
SELinux provides an enhanced mechanism to enforce the separation of information, based on confidentiality
and integrity requirements, which addresses threats of tampering and bypassing of application security
mechanisms and enables the confinement of damage that malicious or flawed applications can cause.
these programs and daemons to cause harm when compromised (for example, through buffer overflows or
misconfigurations). This is a practical implementation of principle of least privilege by enforcing MAC on
Cisco IOS-XE platforms. This confinement mechanism works independently of the traditional Linux access
control mechanisms. SELinux provides the capability to define policies to control the access from an application
process to any resource object, thereby allowing for the clear definition and confinement of process behavior.
SELinux can operate either in Permissive mode or Enforcing mode when enabled on a system.
• In Permissive mode, SELinux does not enforce the policy, and only generates system logs for any denials
caused by violation of the resource access policy. The operation is not denied, but only logged for resource
access policy violation.
• In Enforcing mode, the SELinux policy is enabled and enforced. It denies resource access based on the
access policy rules, and generates system logs.
From Cisco IOS XE 17.13.1a, SELinux is enabled in Enforcing mode by default on supported Cisco IOS XE
platforms. In the Enforcing mode, any system resource access that does not have the necessary allow policy
is treated as a violation, and the operation is denied. The violating operation fails when a denial occurs, and
system logs are generated. In Enforcing mode, the solution works in access-violation prevention mode.
Supported Platforms
From Cisco IOS XE 17.13.1a, SELinux is enabled on the following platforms:
• Cisco 1000 Series Aggregation Services Routers
• Cisco 1000 Series Integrated Services Routers
• Cisco 4000 Series Integrated Services Routers
• Cisco Catalyst 8000v Edge Software
• Cisco Catalyst 8200 Series Edge Platforms
• Cisco Catalyst 8300 Series Edge Platforms
• Cisco Catalyst 8500 and 8500L/8530L Series Edge Platforms
• Cisco VG Series Gateways: VG400, VG410, VG420, and VG450
• Cisco 1100 Terminal Services Gateway
Configuring SELinux
The are no additional requirements or configuration steps needed to enable or use the SELinux feature in
Enforcing mode.
The following commands are introduced as part of the SELinux feature:
set platform software selinux {default | enforcing | permissive}
platform security selinux {enforcing | permissive}
show platform software selinux
Device(config)#
*Oct 20 21:52:45.155: %IOSXE-1-PLATFORM: R0/0:
SELINUX_MODE_PROG: Platform Selinux confinement mode downgraded to permissive!
Device(config)#
The following example shows the output for changing the mode from Permissive to Enforcing:
“*Oct 20 21:44:34.160: %IOSXE-1-PLATFORM: R0/0:
SELINUX_MODE_PROG: Platform Selinux confinement mode upgraded to enforcing!”
Note If the SELinux mode is changed, this change is considered a system security event, and a system log message
is generated.
Message N/A
Message Explanation Resource access was made by the process for which
a resource access policy does not exist. The operation
was flagged, and resource access was denied. A
system log was generated with information that
process resource access has been denied.
Component SELINUX
Example 2:
*Nov 14 00:09:04.947: %SELINUX-1-VIOLATION: R0/0: audispd: t type=AVC
msg=audit(1699927198.486:130): avc: denied { write } for pid=6012 comm="echo"
path="/root/test" dev="rootfs" ino=25839
scontext=system_u:system_r:polaris_iosd_t:s0
tcontext=system_u:object_r:admin_home_t:s0 tclass=file permissive= 0
Troubleshooting SELinux
If there is an instance of an SELinux violation on your device or network, please reach out to Cisco TAC with
the following details:
• The message exactly as it appears on the console or in the system log. For example:
device#request platform software trace archive target
flash:selinux_btrace_logs
Packet-Trace Description
Level
Accounting Packet-Trace accounting provides a count of packets that enter and leave the network
processor. Packet-Trace accounting is a lightweight performance activity, and runs
continuously until it is disabled.
Summary At the summary level of packet trace, data is collected for a finite number of packets.
Packet-Trace summary tracks the input and output interfaces, the final packet state, and
punt, drop, or inject packets, if any. Collecting summary data adds to additional performance
compared to normal packet processing, and can help to isolate a troublesome interface.
Packet-Trace Description
Level
Path data The packet-trace path data level provides the greatest level of detail in packet trace. Data
is collected for a finite number of packets. Packet-Trace path data captures data, including
a conditional debugging ID that is useful to correlate with feature debugs, a timestamp,
and also feature-specific path-trace data.
Path data also has two optional capabilities: packet copy and Feature Invocation Array
(FIA) trace. The packet-copy option enables you to copy input and output packets at various
layers of the packet (layer 2, layer 3 or layer 4). The FIA- trace option tracks every feature
entry invoked during packet processing and helps you to know what is happening during
packet processing.
Note
Collecting path data consumes more packet-processing resources, and the optional
capabilities incrementally affect packet performance. Therefore, path-data level should
be used in limited capacity or in situations where packet performance change is acceptable.
memory required = (statistics overhead) + number of packets * (summary size + data size + packet copy size).
When the Packet-Trace feature is enabled, a small, fixed amount of memory is allocated for statistics. Similarly,
when per-packet data is captured, a small, fixed amount of memory is required for each packet for summary
data. However, as shown by the equation, you can significantly influence the amount of memory consumed
by the number of packets you select to trace, and whether you collect path data and copies of packets.
Note The amount of memory consumed by the Packet-Trace feature is affected by the packet-trace configuration.
You should carefully select the size of per-packet path data and copy buffers and the number of packets to be
traced in order to avoid interrupting normal services. You can check the current data-plane DRAM memory
consumption by using the show platform hardware qfp active infrastructure exmem statistics command.
Procedure
Router> enable
Step 2 debug platform packet-trace packet pkt-num Collects summary data for a specified number
[fia-trace | summary-only] [circular] of packets. Captures feature path data by
[data-size data-size] default, and optionally performs FIA trace.
Example: pkt-num—Specifies the maximum number of
packets maintained at a given time.
Router# debug platform packet-trace
packets 2048 summary-only fia-trace—Provides detailed level of data
capture, including summary data,
feature-specific data. Also displays each feature
entry visited during packet processing.
summary-only—Enables the capture of
summary data with minimal details.
circular—Saves the data of the most recently
traced packets.
data-size—Specifies the size of data buffers for
storing feature and FIA trace data for each
packet in bytes. When very heavy packet
processing is performed on packets, users can
increase the size of the data buffers if necessary.
The default value is 2048.
Step 3 debug platform packet-trace {punt Enables tracing of punted packets from data to
|inject|copy|drop|packet|statistics} control plane.
Example:
Step 4 debug platform condition [ipv4 | ipv6] Specifies the matching criteria for tracing
[interface interface][access-list access-list packets. Provides the ability to filter by
-name | ipv4-address / subnet-mask | protocol, IP address and subnet mask, access
ipv6-address / subnet-mask] [ingress | egress control list (ACL), interface, and direction.
|both]
Example:
Step 5 debug platform condition start Enables the specified matching criteria and
starts packet tracing.
Example:
Step 6 debug platform condition stop Deactivates the condition and stops packet
tracing.
Example:
Step 7 show platform packet-trace {configuration Displays packet-trace data according to the
| statistics | summary | packet {all | pkt-num}} specified option. See {start cross reference}
Table 21-1 {end cross reference} for detailed
Example:
information about the show command options.
Router# show platform packet-trace 14
Step 8 clear platform condition all Removes the configurations provided by the
debug platform condition and debug platform
Example:
packet-trace commands.
Router(config)# clear platform condition
all
Router# exit
Procedure
Device> enable
Step 3 udf udf name header {inner | outer} {13|14} Configures individual UDF definitions. You
offset offset-in-bytes length length-in-bytes can specify the name of the UDF, the
networking header from which offset, and the
Example:
length of data to be extracted.
Step 4 udf udf name {header | packet-start} • header—Specifies the offset base
offset-base offset length configuration.
Example: • packet-start—Specifies the offset base
from packet-start. packet-start” can vary
Router(config)# udf TEST_UDF_NAME_5 depending on if packet-trace is for an
packet-start 120 1
inbound packet or outbound packet. If the
packet-trace is for an inbound packet then
the packet-start will be layer2. For
outbound, he packet-start will be layer3.
• offset—Specifies the number of bytes
offset from the offset base. To match the
first byte from the offset base (Layer
3/Layer 4 header), configure the offset as
0.
• length—Specifies the number of bytes
from the offset. Only 1 or 2 bytes are
supported. To match additional bytes, you
must define multiple UDFs.
Step 5 ip access-list extended {acl-name |acl-num} Enables extended ACL configuration mode.
The CLI enters the extended ACL
Example:
configuration mode in which all subsequent
commands apply to the current extended access
Router(config)# ip access-list extended
acl2 list. Extended ACLs control traffic by the
comparison of the source and destination
addresses of the IP packets to the addresses
configured in the ACL.
Step 6 ip access-list extended { deny | permit } udf Configures the ACL to match on UDFs along
udf-name value mask with the current access control entries (ACEs)
. The bytes defined in ACL is 0xD3. Masks
Example:
are used with IP addresses in IP ACLs to
specify what should be permitted and denied.
Router(config-acl)# permit ip any any
udf TEST_UDF_NAME_5 0xD3 0xFF
Step 7 debug platform condition [ipv4 | ipv6] [ Specifies the matching criteria for tracing
interface interface] [access-list access-list packets. Provides the ability to filter by
Step 8 debug platform condition start Enables the specified matching criteria and
starts packet tracing.
Example:
Step 9 debug platform packet-trace packet pkt-num Collects summary data for a specified number
[ fia-trace | summary-only] [ circular ] [ of packets. Captures feature path data by
data-size data-size] default, and optionally performs FIA trace.
Example: pkt-num—Specifies the maximum number of
packets maintained at a given time.
Router# debug platform packet-trace
packet 1024 fia-trace data-size 2048 fia-trace—Provides detailed level of data
capture, including summary data,
feature-specific data. Also displays each
feature entry visited during packet processing.
summary-only—Enables the capture of
summary data with minimal details.
circular—Saves the data of the most recently
traced packets.
data-size—Specifies the size of data buffers
for storing feature and FIA trace data for each
packet in bytes. When very heavy packet
processing is performed on packets, users can
increase the size of the data buffers if
necessary. The default value is 2048.
Step 10 debug platform packet-trace {punt | Enables tracing of punted packets from data
inject|copy | drop |packet | statistics} to control plane.
Example:
Step 11 debug platform condition stop Deactivates the condition and stops packet
tracing.
Example:
Router# exit
Command Description
show platform packet-trace configuration Displays packet trace configuration, including any defaults.
show platform packet-trace statistics Displays accounting data for all the traced packets.
show platform packet-trace summary Displays summary data for the number of packets specified.
show platform packet-trace {all | pkt-num} Displays the path data for all the packets or the packet
[decode] specified. The decode option attempts to decode the binary
packet into a more human- readable form.
Command Description
clear platform packet-trace statistics Clears the collected packet-trace data and statistics.
clear platform packet-trace configuration Clears the packet-trace configuration and the statistics.
Also, the input packets are copied. The show platform packet-trace packet 0 command displays the summary
data and each feature entry visited during packet processing for packet 0.
Router>
enable
Router# debug platform packet-trace packet 128 fia-trace
Router# debug platform packet-trace punt
Router# debug platform condition interface g0/0/1 ingress
Router# debug platform condition start
Router#! ping to UUT
Router# debug platform condition stop
Router# show platform packet-trace packet 0
Packet: 0 CBUG ID: 9
Summary
Input : GigabitEthernet0/0/1
Output : GigabitEthernet0/0/0
State : FWD
Timestamp
Start : 1819281992118 ns (05/17/2014 06:42:01.207240 UTC)
Stop : 1819282095121 ns (05/17/2014 06:42:01.207343 UTC)
Path Trace
Feature: IPV4
Source : 192.0.2.1
Destination : 192.0.2.2
Protocol : 1 (ICMP)
Feature: FIA_TRACE
Entry : 0x8059dbe8 - DEBUG_COND_INPUT_PKT
Timestamp : 3685243309297
Feature: FIA_TRACE
Entry : 0x82011a00 - IPV4_INPUT_DST_LOOKUP_CONSUME
Timestamp : 3685243311450
Feature: FIA_TRACE
Entry : 0x82000170 - IPV4_INPUT_FOR_US_MARTIAN
Timestamp : 3685243312427
Feature: FIA_TRACE
Entry : 0x82004b68 - IPV4_OUTPUT_LOOKUP_PROCESS
Timestamp : 3685243313230
Feature: FIA_TRACE
Entry : 0x8034f210 - IPV4_INPUT_IPOPTIONS_PROCESS
Timestamp : 3685243315033
Feature: FIA_TRACE
Entry : 0x82013200 - IPV4_OUTPUT_GOTO_OUTPUT_FEATURE
Timestamp : 3685243315787
Feature: FIA_TRACE
Entry : 0x80321450 - IPV4_VFR_REFRAG
Timestamp : 3685243316980
Feature: FIA_TRACE
Entry : 0x82014700 - IPV6_INPUT_L2_REWRITE
Timestamp : 3685243317713
Feature: FIA_TRACE
Entry : 0x82000080 - IPV4_OUTPUT_FRAG
Timestamp : 3685243319223
Feature: FIA_TRACE
Entry : 0x8200e500 - IPV4_OUTPUT_DROP_POLICY
Timestamp : 3685243319950
Feature: FIA_TRACE
Entry : 0x8059aff4 - PACTRAC_OUTPUT_STATS
Timestamp : 3685243323603
Feature: FIA_TRACE
Entry : 0x82016100 - MARMOT_SPA_D_TRANSMIT_PKT
Timestamp : 3685243326183
Linux Forwarding Transport Service (LFTS) is a transport mechanism to forward packets punted from the
CPP into applications other than IOSd. This example displays the LFTS-based intercepted packet destined
for binos application.
Router# show platform packet-trace packet 10
Packet: 10 CBUG ID: 52
Summary
Input : GigabitEthernet0/0/0
Output : internal0/0/rp:1
State : PUNT 55 (For-us control)
Timestamp
Start : 597718358383 ns (06/06/2016 09:00:13.643341 UTC)
Stop : 597718409650 ns (06/06/2016 09:00:13.643392 UTC)
Path Trace
Feature: IPV4
Input : GigabitEthernet0/0/0
Output : <unknown>
Source : 10.64.68.2
Destination : 10.0.0.102
Protocol : 17 (UDP)
SrcPort : 1985
DstPort : 1985
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : <unknown>
Entry : 0x8a0177bc - DEBUG_COND_INPUT_PKT
Lapsed time : 426 ns
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : <unknown>
Entry : 0x8a017788 - IPV4_INPUT_DST_LOOKUP_CONSUME
Lapsed time : 386 ns
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : <unknown>
Entry : 0x8a01778c - IPV4_INPUT_FOR_US_MARTIAN
Lapsed time : 13653 ns
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : internal0/0/rp:1
Entry : 0x8a017730 - IPV4_INPUT_LOOKUP_PROCESS_EXT
Lapsed time : 2360 ns
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : internal0/0/rp:1
Entry : 0x8a017be0 - IPV4_INPUT_IPOPTIONS_PROCESS_EXT
Lapsed time : 66 ns
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : internal0/0/rp:1
Entry : 0x8a017bfc - IPV4_INPUT_GOTO_OUTPUT_FEATURE_EXT
Lapsed time : 680 ns
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : internal0/0/rp:1
Entry : 0x8a017d60 - IPV4_INTERNAL_ARL_SANITY_EXT
Lapsed time : 320 ns
Feature: FIA_TRACE
Input : GigabitEthernet0/0/0
Output : internal0/0/rp:1
Entry : 0x8a017a40 - IPV4_VFR_REFRAG_EXT
The output shows that packets are dropped due to NAT configuration on Gigabit Ethernet interface 0/0/0,
which enables you to understand that an issue is occurring on a specific interface. Using this information, you
can limit which packets to trace, reduce the number of packets for data capture, and increase the level of
inspection.
Input : GigabitEthernet0/0/0
Output : <unknown>
Source : 10.64.68.3
Destination : 10.0.0.102
Protocol : 17 (UDP)
SrcPort : 1985
DstPort : 1985
IOSd Path Flow: Packet: 15 CBUG ID: 238
Feature: INFRA
Pkt Direction: IN
Packet Rcvd From CPP
Feature: IP
Pkt Direction: IN
Source : 10.64.68.122
Destination : 10.64.68.255
Feature: IP
Pkt Direction: IN
Packet Enqueued in IP layer
Source : 10.64.68.122
Destination : 10.64.68.255
Interface : GigabitEthernet0/0/0
Feature: UDP
Pkt Direction: IN
src : 10.64.68.122(1053)
dst : 10.64.68.255(1947)
length : 48
Feature: UDP
Pkt Direction: IN DROP
Pkt : DROPPED
UDP: Discarding silently
src : 881 10.78.106.2(1985)
dst : 10.0.0.102(1985)
length : 60
Feature: IP
Pkt Direction: IN
Packet Enqueued in IP layer
Source : 10.1.1.1
Destination : 10.1.1.2
Interface : GigabitEthernet3
Feature: IP
Pkt Direction: IN
FORWARDEDTo transport layer
Source : 10.1.1.1
Destination : 10.1.1.2
Interface : GigabitEthernet3
Feature: TCP
Pkt Direction: IN
tcp0: I NoTCB 10.1.1.1:46593 10.1.1.2:23 seq 1925377975 OPTS 4 SYN WIN 4128
Router# show platform packet-trace summary
Pkt Input Output State Reason
0 INJ.2 Gi1 FWD
1 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
2 INJ.2 Gi1 FWD
3 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
4 INJ.2 Gi1 FWD
5 INJ.2 Gi1 FWD
6 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
7 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
8 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
9 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
10 INJ.2 Gi1 FWD
11 INJ.2 Gi1 FWD
12 INJ.2 Gi1 FWD
13 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
14 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
15 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
16 INJ.2 Gi1 FWD
PKT_DIR_IN
Dropped Consumed Forwarded
INFRA 0 0 0
TCP 0 0 0
UDP 0 0 0
IP 0 0 0
IPV6 0 0 0
ARP 0 0 0
PKT_DIR_OUT
Dropped Consumed Forwarded
INFRA 0 0 0
TCP 0 0 0
UDP 0 0 0
IP 0 0 0
IPV6 0 0 0
ARP 0 0 0
The following example displays packets that are injected and punted to the forwarding processor from the
control plane.
Router#debug platform condition ipv4 10.118.74.53/32 both
Router#Router#debug platform condition start
Router#debug platform packet-trace packet 200
Packet count rounded up from 200 to 256
Feature: IP
Pkt Direction: IN
Packet Enqueued in IP layer
Source : 10.118.74.53
Destination : 172.18.124.38
Interface : GigabitEthernet1
Feature: IP
Pkt Direction: IN
FORWARDED To transport layer
Source : 10.118.74.53
Destination : 172.18.124.38
Interface : GigabitEthernet1
Feature: UDP
Pkt Direction: IN
DROPPED
UDP: Checksum error: dropping
Source : 10.118.74.53(2640)
Destination : 172.18.124.38(500)
Feature: TCP
Pkt Direction: OUT
FORWARDED
TCP: Connection is in SYNRCVD state
ACK : 2346709419
SEQ : 3052140910
Source : 172.18.124.38(22)
Destination : 172.18.124.55(52774)
Feature: IP
Pkt Direction: OUTRoute out the generated packet.srcaddr: 172.18.124.38, dstaddr:
172.18.124.55
Feature: IP
Pkt Direction: OUTInject and forward successful srcaddr: 172.18.124.38, dstaddr:
172.18.124.55
Feature: TCP
Pkt Direction: OUTtcp0: O SYNRCVD 172.18.124.38:22 172.18.124.55:52774 seq 3052140910
OPTS 4 ACK 2346709419 SYN WIN 4128
Summary
Input : INJ.2
Output : GigabitEthernet1
State : FWD
Timestamp
Start : 490928006866 ns (06/29/2020 13:31:30.807879 UTC)
Stop : 490928038567 ns (06/29/2020 13:31:30.807911 UTC)
Path Trace
Feature: IPV4(Input)
Input : internal0/0/rp:0
Output : <unknown>
Source : 172.18.124.38
Destination : 172.18.124.55
Protocol : 6 (TCP)
SrcPort : 22
DstPort : 52774
Feature: IPSec
Result : IPSEC_RESULT_DENY
Action : SEND_CLEAR
SA Handle : 0
Peer Addr : 10.124.18.172
Local Addr: 10.124.18.172
Router#
The output shows that packets are dropped due to NAT configuration on Gigabit Ethernet interface 0/0/0,
which enables you to understand that an issue is occurring on a specific interface. Using this information, you
can limit which packets to trace, reduce the number of packets for data capture, and increase the level of
inspection.
Destination : 224.0.0.102
Protocol : 17 (UDP)
SrcPort : 1985
DstPort : 1985
IOSd Path Flow: Packet: 15 CBUG ID: 238
Feature: INFRA
Pkt Direction: IN
Packet Rcvd From CPP
Feature: IP
Pkt Direction: IN
Source : 10.64.68.122
Destination : 10.64.68.255
Feature: IP
Pkt Direction: IN
Packet Enqueued in IP layer
Source : 10.64.68.122
Destination : 10.64.68.255
Interface : GigabitEthernet0/0/0
Feature: UDP
Pkt Direction: IN
src : 10.64.68.122(1053)
dst : 10.64.68.255(1947)
length : 48
Feature: UDP
Pkt Direction: IN DROP
Pkt : DROPPED
UDP: Discarding silently
src : 881 10.78.106.2(1985)
dst : 224.0.0.102(1985)
length : 60
Summary
Input : GigabitEthernet3
Output : internal0/0/rp:0
State : PUNT 11 (For-us data)
Timestamp
Start : 16120990774814 ns (01/20/2020 12:38:02.816435 UTC)
Stop : 16120990801840 ns (01/20/2020 12:38:02.816462 UTC)
Path Trace
Feature: IPV4(Input)
Input : GigabitEthernet3
Output : <unknown>
Source : 12.1.1.1
Destination : 12.1.1.2
Protocol : 6 (TCP)
SrcPort : 46593
DstPort : 23
IOSd Path Flow: Packet: 12 CBUG ID: 767
Feature: INFRA
Pkt Direction: IN
Packet Rcvd From DATAPLANE
Feature: IP
Pkt Direction: IN
Packet Enqueued in IP layer
Source : 12.1.1.1
Destination : 12.1.1.2
Interface : GigabitEthernet3
Feature: IP
Pkt Direction: IN
FORWARDEDTo transport layer
Source : 12.1.1.1
Destination : 12.1.1.2
Interface : GigabitEthernet3
Feature: TCP
Pkt Direction: IN
tcp0: I NoTCB 12.1.1.1:46593 12.1.1.2:23 seq 1925377975 OPTS 4 SYN WIN 4128
Router# show platform packet-trace summary
Pkt Input Output State Reason
0 INJ.2 Gi1 FWD
1 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
2 INJ.2 Gi1 FWD
3 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
4 INJ.2 Gi1 FWD
5 INJ.2 Gi1 FWD
6 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
7 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
8 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
9 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
10 INJ.2 Gi1 FWD
11 INJ.2 Gi1 FWD
12 INJ.2 Gi1 FWD
13 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
14 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
15 Gi1 internal0/0/rp:0 PUNT 11 (For-us data)
16 INJ.2 Gi1 FWD
Packets Received
Ingress 0
Inject 0
Packets Processed
Forward 0
Punt 3
Count Code Cause
3 56 RP injected for-us control
Drop 0
Consume 0
PKT_DIR_IN
Dropped Consumed Forwarded
INFRA 0 0 0
TCP 0 0 0
UDP 0 0 0
IP 0 0 0
IPV6 0 0 0
ARP 0 0 0
PKT_DIR_OUT
Dropped Consumed Forwarded
INFRA 0 0 0
TCP 0 0 0
UDP 0 0 0
IP 0 0 0
IPV6 0 0 0
ARP 0 0 0
The following example displays packets that are injected and punted to the forwarding processor from the
control plane.
Router#debug platform condition ipv4 10.118.74.53/32 both
Router#Router#debug platform condition start
Router#debug platform packet-trace packet 200
Packet count rounded up from 200 to 256
Feature: IP
Pkt Direction: IN
Feature: IP
Pkt Direction: IN
FORWARDED To transport layer
Source : 10.118.74.53
Destination : 198.51.100.38
Interface : GigabitEthernet1
Feature: UDP
Pkt Direction: IN
DROPPED
UDP: Checksum error: dropping
Source : 10.118.74.53(2640)
Destination : 198.51.100.38(500)
Feature: TCP
Pkt Direction: OUT
FORWARDED
TCP: Connection is in SYNRCVD state
ACK : 2346709419
SEQ : 3052140910
Source : 198.51.100.38(22)
Destination : 198.51.100.55(52774)
Feature: IP
Pkt Direction: OUTRoute out the generated packet.srcaddr: 198.51.100.38, dstaddr:
198.51.100.55
Feature: IP
Pkt Direction: OUTInject and forward successful srcaddr: 198.51.100.38, dstaddr:
198.51.100.55
Feature: TCP
Pkt Direction: OUTtcp0: O SYNRCVD 198.51.100.38:22 198.51.100.55:52774 seq 3052140910
OPTS 4 ACK 2346709419 SYN WIN 4128
Summary
Input : INJ.2
Output : GigabitEthernet1
State : FWD
Timestamp
Start : 490928006866 ns (06/29/2020 13:31:30.807879 UTC)
Stop : 490928038567 ns (06/29/2020 13:31:30.807911 UTC)
Path Trace
Feature: IPV4(Input)
Input : internal0/0/rp:0
Output : <unknown>
Source : 172.18.124.38
Destination : 172.18.124.55
Protocol : 6 (TCP)
SrcPort : 22
DstPort : 52774
Feature: IPSec
Result : IPSEC_RESULT_DENY
Action : SEND_CLEAR
SA Handle : 0
Peer Addr : 55.124.18.172
Local Addr: 38.124.18.172
Router#
Additional References
Standards
Standard Title
None —
MIBs
None To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco
MIB Locator found at this URL:
{start hypertext}http://www.cisco.com/go/mibs{end hypertext}
RFCs
RFC Title
None —
Technical Assistance
Description Link
Note {start cross reference}Table 21-4{end cross reference} lists only the software releases that support a given
feature in a given software release train. Unless noted otherwise, subsequent releases of that software release
train also support that feature.
Packet Cisco IOS XE 3.10S The Packet Trace feature provides information about how data packets are
Trace processed by the Cisco IOS XE software.
In Cisco IOS XE Release 3.10S, this feature was introduced.
The following commands were introduced or modified:
• debug platform packet-trace packet pkt-num [fia-trace |
summary-only] [data-size data-size] [circular]
• debug platform packet-trace copy packet {input | output | both}
[size num-bytes] [L2 | L3 | L4]
• show platform packet-trace {configuration | statistics | summary
| packet {all | pkt-num}}
Cisco IOS XE 3.11S In Cisco IOS XE Release 3.11S, this feature was enhanced to include the
following features:
• Matched versus traced statistics.
• Trace stop timestamp in addition to trace start timestamp.
The following commands were introduced or modified:
• debug platform packet-trace drop [code drop-num]
• show platform packet-trace packet {all | pkt-num} [decode]
Cisco IOS XE Denali In Cisco IOS XE Denali 16.3.1, this feature was enhanced to include Layer3
16.3.1 packet tracing along with IOSd.
The following commands were introduced or modified: debug platform
packet-trace punt.
Cisco IOS XE The output of the show platform packet-trace command now includes
Amsterdam 17.3.1 additional trace information for packets either originated from IOSd or
destined to IOSd or other BinOS processes.
G.Fast and VDSL2 Cisco IOS XE Fuji Cisco 1000 Series Intergration Services Routers (ISR) uses G.fast
35b Profile Release 16.7.1 and VDSL2 35b profiles, which are based on Fiber to X (FTTx)
technology, to help accelerate ultra-broadband deployments at
customer premises.
G.fast and VDSL2 35b are supported on the following platforms:
• Cisco ISR C1112
• Cisco ISR C1113
Note There is no specific command to implement G.fast on the Cisco 1000 Series Integrated Services Routers
(ISRs).
Note VDSL2 bonding is not supported on C1100 Series Integrated Services Routers.
SRA and Bit Swap are enabled by default.
For more information on firmware upgrade and training logs, refer to the Upgrading the Modem Firmware
and Collecting DSL and Training Logs sections.
Daemon Status: UP
TC Mode: PTM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Line 0:
Daemon Status: UP
TC Mode: PTM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Line 0:
• CISCO-MIB To locate and download MIBs for selected platforms, Cisco IOS releases, and
feature sets, use the URL here:Cisco MIB Locator.
Technical Assistance
Description Link
DSL Specifications
Table 24: DSL Feature Specifications
Warning It is critical that the installer read these instructions and be familiar with the correct method of inserting and
removing the SFP. Failure to do so may result in damage to the SFP.
Basic Configuration
Once the SFP is installed, it requires a basic configuration to bring it up. Follow these steps:
configure t
Router(conf)#interface g0/0/0
Router(conf-if)#media-type sfp
Router(conf-if)#no shut
Router(conf-if)#exit
SFP Verification
After safely installing the SFP, you can check its status with the show inventory command:
Router#show inventory
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INFO: Please use "show license UDI" to get serial number for licensing.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
NAME: "Power Supply Module 0", DESCR: "External Power Supply Module"
PID: PWR-12V , VID: V01 , SN: FOC23473SRK
NAME: "NIM subslot 0/0", DESCR: "Front Panel 2 port Gigabitethernet Module"
PID: C1131X-2x1GE , VID: V01 , SN:
In the below output, ignore the Description and bitrate. The PID/Serial number information are true to the
SFP.
Router#show interfaces transceiver detail
IDPROM for transceiver Gigabitethernet0/0/0:
Description = SFP or SFP+ optics (type 3)
Transceiver Type: = GE T (26)
Product Identifier (PID) = SFP-VADSL2+-I
Vendor Revision = V5.1
Serial Number (SN) = MET2023000A
Vendor Name = CISCO-METANOIA
Vendor OUI (IEEE company ID) = 00.00.00 (0)
CLEI code =
Cisco part number = 30-1635-01
Device State = Enabled.
Date code (yy/mm/dd) = 21/16/
Connector type = RJ45.
Encoding = 8B10B (1)
Nominal bitrate = GE (1300 Mbits/s)
Minimum bit rate as % of nominal bit rate = not specified
Maximum bit rate as % of nominal bit rate = not specified
Socket Verification
130: 00 00 00 00 00 00 00 00 00 00
140: 00 00 00 00 00 00 00 00 00 00
150: 00 00 00 00 00 00 00 00 00 00
160: 00 00 00 00 00 00 00 00 00 00
170: 00 00 00 00 00 00 00 00 00 00
180: 00 00 00 00 00 00 00 00 00 00
190: 00 00 00 00 00 00 00 00 00 00
200: 00 00 00 00 00 00 00 00 00 00
210: 00 00 00 00 00 00 00 00 00 00
220: 00 00 00 00 00 00 00 00 00 00
230: 00 00 00 00 00 00 00 00 00 00
240: 00 00 00 00 00 00 00 00 00 00
250: 00 00 00 00 00 00
Link reach for 9u fiber (m) = SX(550/270m) (0)
1xFC-MM(500/300m) (0)
2xFC-MM(300/150m) (0)
ESCON-MM(2km) (0)
Note There is no show platform led support for the SFP LED. Use the show controller vdsl 0/0/0 local command
for DSL link status.
LED Indications
The following table describes the SFP LED indications:
SFP no shut triggered from the CLI Flashing, then Solid Green
Auto-Negotiation
You can tell the status of auto-negotiation based on the LED on the SFP. On shut/no shut or during
auto-negotiation, the following sequence should be observed:
If the SFP LED is toggling between slow flashing green and fast flashing green, it usually means it is in
auto-negotiation mode. If this continues for a long time, the DSLAM and Router DSL SFP parameters need
to be rechecked. The following chapters cover more details on Router xDSL configuration.
Check your firmware levels by executing show controller vdsl 0/0/0 local command.
Router#show controllers vdsl 0/0/0 local
SFP Vendor PID: SFPV5311TR
SFP Vendor SN: V021932028C
Firmware embedded in IOS-XE: 1_62_8463
Running Firmware Version: 1_62_8463
Management Link: up
DSL Status: showtime
Dumping internal info: idle
Dying Gasp: armed
Dumping DELT info: idle
The command loads the new firmware, and then performs a shut/no shut on the interface to reset the SFP.
Note From Cisco IOS XE 17.12.1a release, the capabilityexists to upgrade standalone SFP firmware. Additionally,
the SFP firmware is bundled with the IOS image.
VDSL2
VDSL2 Overview
This section provides an overview for VDSL2.
The Router DSL SFP-VADSL2+-I provides VDSL2 Annex A, B support in conformance to ITU-T standards
G.993.2 (VDSL2). This xDSL SFP is also in compliance with TR-114 (VDSL2 Annex A and B performance)
and TR-115 (VDSL2 Feature validation tests by University of New Hampshire). The SFP complies with
ITU-T G.99x standard with supporting AVD2 CPEmode only.
• Configurable Band Plan, conforms to North America Annex A (G.998) and Europe Annex B (G.997,
998) Band Plans subject to the 3072/4096 and 8-band/4-passband constraints.
• Supports all VDSL2 profiles (8a/b/c/d, 12a/b, 17a).
• Supports EU type Upstream Band 0 (US0).
• Complies with ITU-T G.994.1 Handshake Procedure for DSL TRx.
• Complies with ITU-T G.997.1 Physical Layer Management for DSL TRx.
• Complies with ITU-T G.993.5 Self-FEXT Cancellation (Vectoring) for CPE mode.
• Supports Robust Overhead Channel (ROC).
• Supports Online Reconfiguration (OLR) including Seamless Rate Adaptation (SRA) with D/L change
and Bit Swapping.
• Supports Upstream /Downstream Power Back Off (UPBO/DPBO).
• Supports DELT
• Supported maximum MTU size on VDSL2 is 1800 Bytes.
• Standard compliance VDSL2 mode is PTM (Packet transfer mode).
• Supports VDSL2 Vectoring.
For configuration and display commands, see the detailed sections below. The show controller vdsl 0/0/0 is
the fundamental command for validation.
VDSL2 Specifications
Table 25: VDSL2 Feature Specifications
Configuring VDSL2
The router supports Very-high-bit-rate Digital Subscriber Line (VDSL2).
Procedure
Step 3 controller vdsl 0/0/0 Enters configuration mode for the VDSL2
controller.
Example:
router(config-controller)# controller
vdsl 0/0/0
Step 4 carrier-set a43 a43c b43 Configures the carrier set. Multiple choice.
Default is a43 a43c b43. v43 is disabled by
Example:
default.
router(config-controller)# carrier-set
a43|a43c|b43
carrier-set carrier-set [a43 b43 a43c] a43 b43 a43c DSL SFP Carrier Set
mac-address mac-address <MAC address> The default is the MAC is DSL SFP MAC Address. There
preconfigured. is no need to configure anything
to get the controller working.
VDSL Example
The following example is from a VDSL configuration:
show controllers vdsl 0/0/0
Controller VDSL 0/0/0 is UP
Daemon Status: UP
TC Mode: PTM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Modem FW Version:
Modem PHY Version:
Modem PHY Source: System
Line 0:
Reed-Solomon EC: NA 0 NA 0
CRC Errors: NA 0 NA 27166
Header Errors: NA 0 NA 0
Interleave (ms): NA 7.00 NA 3.00
Actual INP: NA 2.00 NA 1.00
For an explanation of some of the key output messages, see Controller Status Messages, on page 237.
Troubleshooting
This section provides information for troubleshooting and debugging if the DSL control and/or datapath is
not up.
Problem: If WAN interface g0/0/0 is DOWN:
Solution: Try the following:
• Check L1 cabling, networking, and with different SFP
• Capture output for show int g0/0/0, show run all, and show version
• Check if g0/0/0 has media-type sfp configuration set and the interface is unshut.
• Try another SFP to see if that is detected.
• Check SFP's LED status.
Problem: If the controller is UP, but show controller vdsl 0/0/0 shows the DSL Link Idle.
Solution: Try the following:
• Ensure show controller vdsl 0/0/0 local shows Running FW = System FW. If not, upgrade FW and
shut/no shut g0/0/0.
• Ensure carrier-set match (in controller vdsl 0/0/0) configuration with DSLAM
• Restart DSLAM interface if any config changes have been made
• Fine-tune the Power Spectrum Density, Freq Bandplan, profile, operating mode, vlan, etc... on the DSLAM
end. On the Router DSL controller end, auto mode is the default and no configuration is required except
possibly carrier-set. For example: If DSLAM only supports POTS, recommended to set carrier-set to
a43. By default, Cisco allows a43, a43c, b43.
• Ensure the DSLAM profile ONLY includes supported Profiles, bands, etc as per VDSL2.
• When using the service internal command test vdsl rawcli "basic show summary 1" consecutively,
do you see the status move from Idle/Handshake/Training back to Idle, or stuck in Idle? If former case,
recheck DSLAM profile configs. If latter, share L1 debug logs.
• If the DSLAM has the same configuration that used to work, and then after an image upgrade, or new
SFP change the controller is UP but no negotiation , then please provide following to Cisco:
• SFP LED status
• Capture show version, show running-config, show run all | sec controller, show interface
gigabitethernet 0/0/0, and show controller vdsl 0/0/0 local.
• Possible workaround: After providing logs to Cisco, attempt to write erase and reload the router. Also,
shut/no shut the DSLAM interface tied to this device, and unplug/plug SFP and cables again.
Problem: If Controller is up, profile with DSLAM up in show controller vdsl 0/0/0, but Dialer did not acquire
IP
Solution: Try the following:
• Check routes
• Check the output of debug dialer to see if it offers any information. If dialer idle time is resetting too
soon, modify dialer idle-timeout (default is 120s , which ideally should be enough).
• Ensure there are SW Licenses (datak9, securityk9, and network-advantage) on both PPPoE server
and the PPPoE Client/CPE.
• The following is a basic Dialer configuration that works:
interface Dialer1
ip address negotiated
no ip redirects
encapsulation ppp
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap callin
ppp chap hostname WORD
ppp chap password 0 WORD
ppp ipcp route default
!
ip route 0.0.0.0 0.0.0.0 Dialer1 (or any route that works in user environment)
• Possible workaround: After gathering the above logs in sequence for Cisco, you can try to write erase
and reload Peer and Router. Specifically removing the Dialer interface with PPP configurations and
reapplying. As a last resort, try to shut/no shut DSLAM interface attached to this Router DSL SFP
interface. Additionally, to isolate behavior, validate this SFP on another Router if available. If it works,
then validate multiple SFPs on same Router (to narrow down if it is an SFP or Router issue).
Problem: If controller is Up, Dialer is Up, but Dialer did not acquire IP, Authentication works only with PAP
and does not work with CHAP.
Solution: Suppose there is a scenario where:
show controller vdsl 0/0/0 shows showtime
show pppoe session shows PPP session established.
Then we see Virtual Access bound with Dialer successfully, but still Dialer didn't acquire an IP with PAP
config in dialer all as well, but CHAP would not work On PPPoE Server end, it showed CHAP authentication
passed and device ack too, but still IP not acquiring on PPPoE Client/device end.
debug ppp packet showed everything was okay, but still IP not acquiring. In such cases, enable following to
monitor: debug ppp authentication enabled, we may notice that after successful chap handshake, there was
another attempt by our device/client to validate based on local hostname set on Router CLI required to disable,
if there is default local hostname set for chap in Router client (or any IOS router):
config t
service internal
Int Dialer1
no ppp chap ignoreus
no shut
exit
Problem If controller is up, Dialer acquired an IP, but cannot self-ping Dialer or ping PPPoE Server
Solution: Try the following:
• Ensure the appropriate SW licenses (datak9, securityk9, and network-advantage) are enabled on both
the PPPoe Server and Client
• Verify if icmp is enabled on PPPoE client session (enable via access list)
• Ensure pap/chap authentication match is seen in debug pppoe session.
• show pppoe session should reflect session (virtual-access binding with Dialer)
• Apply Static IP on g0/0/0 DSL interface and check if you can ping the DSLAM and Peer (to isolate DSL
SFP issues)
• The following is a Basic PPPoE Server and PPPoE client configuration that works, presuming PPPoE
Server is a Cisco IOS device as well:
PPPoE Server
ip dhcp excluded-address 41.41.41.1 41.41.41.9
!
ip dhcp pool 41-41-41-pool
network 41.41.41.0 255.255.255.0
default-router 41.41.41.1
lease 2
!
username dslpeer password 0 dslpeerpass
!!
bba-group pppoe global
virtual-template 1
!
interface GigabitEthernet0/0/0
no ip address
media-type sfp
!
interface GigabitEthernet0/0/0.1
encapsulation dot1Q 1 native
ip address 41.41.41.1 255.255.255.0
pppoe enable group global
!
interface Virtual-Template1
ip unnumbered GigabitEthernet0/0/0.1
peer default ip address dhcp-pool 41-41-41-pool
ppp authentication pap chap
!
>>>>>> Add routes as relevant, next hop being the IP that Router Dialer acquires
!
ip route 10.0.0.0 255.255.255.0 41.41.41.3 >> dialer ip, change as necessary
PPPoE Client:
controller VDSL 0/0/0
Carrier-set a43 >>> Can set to whichever [a43, b43, a43c, v43 depending on DSLAM support]
interface GigabitEthernet0/0/0
no ip address
media-type sfp
!
interface GigabitEthernet0/0/0.1
encapsulation dot1Q 1 native
pppoe enable group global
pppoe-client dial-pool-number 1
!
interface Dialer1
ip address negotiated
no ip redirects
encapsulation ppp
dialer pool 1
dialer-group 1
no cdp enable
ppp authentication chap callin
ppp chap hostname dslpeer
ppp chap password 0 dslpeerpass
ppp ipcp route default
!
ip route 0.0.0.0 0.0.0.0 Dialer1
Problem: If DSL traffic has been going through for a while, however bandwidth drops in time:
Solution: Try the following:
• Ensure DSLAM profile PSD, Freq band plan configurations are fine-tuned (in such cases, ideally unrelated
to Router DSL SFP).
• Ensure ip arp timeout is increased in the Cisco Router DSL interface, Dialer interface - this may specially
help in bursty traffic or during congestion.
Interface Status:
Router#show ip interface brief
Use this command to validate if Dialer acquired an IP address
Inventory Status:
Router#show inventory
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INFO: Please use "show license UDI" to get serial number for licensing.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
NAME: "Module 0 - Mother Board", DESCR: "Cisco C1131X-8PLTEPWB Built-In NIM controller"
PID: C1131X-8PLTEPWB , VID: , SN:
NAME: "NIM subslot 0/0", DESCR: "Front Panel 2 port Gigabitethernet Module"
PID: C1131X-2x1GE , VID: V01 , SN:
There are some debugging commands that will also reflect the status of auto-negotiation:
Router#configure terminal
Router#service internal
Router#exit
The following test command will reflect auto-negotiation status:
Router#test vdsl rawcli "basic show summary 1"
Link time Rate US/DS Mode Status Annex TxPkts/RxPkts
4 1097/12491 ADSL2 Showtime AnnexA 0/0
Question: The training log in show controller vdsl 0/0/0 is not working. There is no option to start/stop.
Answer: This option is only specific to the c111x platform and not the Router DSL SFP.
Question: System hangs during L1 Debug Logs capture, taking very long. show commands are not working.
Answer: When debug vdsl controller 0/0/0 dump internal folder_name is executed, it drains most of the
system resources. A warning syslog to that effect is displayed as well. This takes approximately 10 minutes
to complete depending on state of controller. Multiple times during the process the controller is shut/no shut,
during this activity do NOT intervene. Once complete, you should observe 'DONE' in syslog and prompted
to shut/no shut g0/0/0.
Caution When inserting the SFP, make sure you hear it lock in. Insert the cable and then close the latch. You should
hear the click again. If you force the latch and it breaks, the SFP will be stuck in the Router. Workaround is
to remove the faceplate and remove the SFP.
Chip Vendor Specific: 0x0000 0x0762 SFP Metanoia Chip Information burnt in EEPROM
programming
Modem Version Far: <value> Ignore if empty, the above Near version is what is
important
DSL Config Mode: AUTO Always in AUTO mode, no specific CLI to configure
for ADSL2/2+, VDSL2
Trained Mode: G.992.3 (ADSL2) Annex A Specifies ITU and Annex type
L1 Training Logs
To configure the device perform the following:
Router#configure terminal
Router#service internal
Router#logging console
Router#exit
When the L1 debug dump starts you should see the following:
%VDSL_SFP_MGR-5-DUMP_START: Dump internal info started on interface GigabitEthernet0/0/0
Important At this point, the device is unusable. Wait approximately 10 minutes until it completes.
To recover the device into normal operational mode, preform the following:
Router#configure terminal
Router#interface g0/0/0
Router#shut
Router#no shut
Router#exit
Note Cisco recommends that each time you start a new log or debug, save it to a new directory rather than append
to the existing information.
status
Link time Rate US/DS Mode Status Annex TxPkts/RxPkts
773 1089/23628 ADSL2+ Showtime AnnexA 470/338
Note test vdsl rawcli “basic show summary 1” - port number 1 is for G0/0/0; port number 2 for G0/0/1
Router#test vdsl option 6 0x0 If functional, State = 2 should display. This command shows
basic L1 bringup of DSL SFP and it's states. Provide to Cisco for L1 troubleshooting.
Debug flags: 0x8000
Seq 0: slot=0 slot_port=0 bay=0 port=0 Name:MetaMgr0_0_0
MetanoiaPort=0 SFP type: 1 State: 2 cnt=855
MAC:00:00:00:00:00:00 Choice:0
hw interface:GigabitEthernet0/0/0 sw interface:GigabitEthernet0/0/0
Firmware file: /etc/SFP_V5311-T-R_CSP.b, size=491520, version=1_62_8463
SFP version: 1_62_8463
Notification Seq: 0x1 cnt: 0xB3 Stat Cycle:255
VDSL State: 5
EBM Tx: 21039 Rx: 21031
EBM Wait Timeout: 8 Rx Loss: 0
G994 vid CO: BDCM CPE: META
Serial No CO: CPE: MET2023000A V5311TR 1_62_8463
Version CO: CPE: 1_62_8463 MT5311
Capability CO: 000000000001000000 CPE: 000000000001000000
Line Attn: UP: 65535 DOWN: 13
This option will force the entire subslot to reload, including the software module. So if connectivity is via
telnet/ssh you might lose access for 1-2 minutes, and then all messages/syslogs buffered will print out.
Procedure
Step 4 ip flow-record destination ip-address port Specifies NetFlow collector IP address and port
number. A maximum of four exporters is
supported.
Example
Device> enable
Device# configure terminal
Device(config)# et-analytics
Device(config-et-analytics)# ip flow-record destination 192.0.2.1 2055
Device(config-et-analytics)# exit
Device(config)# interface gigabitethernet 0/0/1
Device(config-if)# et-analytics enable
Device(config-if)# end
Procedure
Step 4 whitelist acl access-list The allowed list specifies the access list traffic.
The access list can be a standard, extended, or
named ACL.
Step 7 permit ip {ip-address | any | host | Specifies the packets to forward to a source host
object-group} or source IP address.
Example
Device> enable
Device# configure terminal
Device(config)# et-analytics
Device(config-et-analytics)# whitelist acl eta_whitelist
Device(config-et-analytics)# exit
Device(config)# ip access-list extended eta_whitelist
Device(config-ext-nacl)# permit ip host 198.51.100.1 any
Device(config-ext-nacl)# permit ip any host 198.51.100.1
Device(config-ext-nacl)# permit ip host 198.51.200.1 any
Device(config-ext-nacl)# permit ip any host 198.51.200.1
Device(config-ext-nacl)# end
Device# show platform hardware qfp active feature et-analytics data interface gigabitEthernet
2
Device# show platform hardware qfp active feature et-analytics data memory
Device# show platform hardware qfp active feature et-analytics data runtime
Device# show platform hardware qfp active feature et-analytics datapath stats export
Total
dropped records : 0
Total
dropped packets : 0
Total
dropped bytes : 0
Total
IDP records exported :
initiator->responder : 805813
responder->initiator : 418799
Total SPLT records exported:
initiator->responder : 805813
responder->initiator : 418799
Total SALT records exported:
initiator->responder : 0
responder->initiator : 0
Total BD records exported :
initiator->responder : 0
responder->initiator : 0
Total TLS records exported :
initiator->responder : 171332
responder->initiator : 174860
Device# show platform hardware qfp active feature et-analytics datapath stats flow
ET-Analytics Stats:
Flow statistics:
feature object allocs : 0
feature object frees : 0
flow create requests : 0
flow create matching : 0
flow create successful: 0
flow create failed, CFT handle: 0
flow create failed, getting FO: 0
flow create failed, malloc FO : 0
flow create failed, attach FO : 0
flow create failed, match flow: 0
flow create, aging already set: 0
flow ageout requests : 0
flow ageout failed, freeing FO: 0
flow ipv4 ageout requests : 0
flow ipv6 ageout requests : 0
flow whitelist traffic match : 0
Procedure
Step 3 storm-control {unicast | broadcast | Specifies the interface level unicast, broadcast,
multicast} level {level_high}{level_low} or multicast storm control suppression level as
a percentage of the total bandwidth. Here, the
Example:
bandwidth is dependent on the operational
• Unicast control speed.
Router(config-if)#storm-control multicast
level 70.00 50.00
Step 4 storm-control action { shutdown | trap} Specifies the action to take when a storm occurs
on a port.
Example:
Router(config-if)#storm control action The traffic is blocked when it exceeds the
trap threshold specified by configuration level,
irrespective of the shutdown or SNMP trap
being enabled or disabled.
Note
You can enable the shutdown and trap actions
simultaneously.
Router(config)#int gi0/1/0
Router(config-if)#storm-control unicast level 70.00 50.00
Router(config-if)#storm-control broadcast level 70.00 50.00
Router(config-if)#storm-control multicast level 70.00 50.00
Router(config-if)#storm-control action shutdown
Router(config-if)#storm-control action trap
Traffic storm control Cisco IOS XE • Starting from Cisco IOS XE Cupertino 17.7.x, Traffic Storm
support on L2 switch Cupertino 17.8.1a Control is supported on all the existing C11xx (C110x,
ports Release C111x, C112, C113x, C116x) models.
• Starting from Cisco IOS XE Cupertino 17.8.x, Traffic Storm
Control is supported on C1113 and C1131 series.
To use Smart Licensing, you must first set up a Smart Account on Cisco Software Central
(http://software.cisco.com/).
For a more detailed overview on Cisco Licensing, go to https://cisco.com/go/licensingguide.
HSECK9
The HSECK9 license is required for a feature to have full crypto functionality. Without the HSECK9 license,
only 225 secure tunnels and 85 Mbps of crypto bandwidth would be available. The HSECK9 license allows
features in the securityk9 technology package to use the maximum number of secure tunnels and crypto
bandwidth. To enable the HSECK9 license, purchase the FL-44-HSEC-K9 license from Cisco.com and
install it using the license install license-files command. For further information on obtaining and installing
feature licenses, see configuring the Cisco IOS software activation.
Note The HSECK9 feature does not have an evaluation license that converts to an RTU license after 60 days; a
feature license must be obtained.
To enable the license for the HSECK9 feature, use the securityk9 technology package.
For more information on how to enable license boot level securityk9 or license feature hseck9, refer to Smart
Licensing using Policy.
Procedure
Device> enable
Device# exit
Device Registration
Procedure
Device> enable
Step 2 license smart register idtoken idtoken Registers the device with the back-end server.
[force] Token id can be obtained from your virtual a/c
in the Smart Licensing server.
Example:
• force: To forcefully register your device
Device# license smart register idtoken irrespective of either the device is
123 registered or not.
Note
The device supplies the token ID to the Cisco
server, which sends back a “Device Certificate”
that is valid for 365 days.
Step 3 license smart deregister Deregisters the device from the backend server.
Example:
Step 4 license smart renew [ID | auth] (Optional) Manually renews the ID certification
or authorization.
Example:
Note The installation process does not install duplicate licenses. This message appears when duplicate licenses are
detected:
Installing...Feature:xxx-xxx-xxx...Skipped:Duplicate
Procedure
Device> enable
Step 3 show license udi Displays all the UDI values that can be licensed
in a system.
Example:
• You need the UDI of the device as part of
Device# show license udi the process to obtain a license.
Step 4 Convert the PAK to a license by entering the After entering the appropriate information, you
PAK and the UDI into the Cisco Product will receive an e-mail containing the license
License Registration portal: information that you can use to install the
http://www.cisco.com/go/license. license:
• Copy the license file received from the
Cisco Product License Registration portal
to the appropriate file system on the
device.
or
• Click the Install button on the web page.
Step 7 license boot level {metroaggrservices} Activates the metroaggrservices license on the
device upon the next reload.
Example:
Note Flexible NetFlow is supported from Cisco IOS XE 17.7.1a and later releases.
Prior to configuring a bridge domain interface, you must understand the following concepts:
• Ethernet Virtual Circuit Overview
• Bridge Domain Interface Encapsulation
• Assigning a MAC Address
• Support for IP Protocols
• Support for IP Forwarding
• Packet Forwarding
• Bridge Domain Interface Statistics
For more information on the EVC architecture, see the section Configuring Ethernet Virtual Connections on
the Cisco ASR 1000 Router in the Carrier Ethernet Configuration Guide .
Note You can configure a static MAC address on a bridge domain interface using the mac-address command.
• HTTP
• ICMP
• NTP
• RARP
• SNMP
• TCP
• Telnet
• TFTP
• UDP
Packet Forwarding
A bridge domain interface provides bridging and forwarding services between the Layer 2 and Layer 3 network
infrastructure.
Layer 2 to Layer 3
During a packet flow from a Layer 2 network to a Layer 3 network, if the destination MAC address of the
incoming packet matches the bridge domain interface MAC address, or if the destination MAC address is a
multicast address, the packet or a copy of the packet is forwarded to the bridge domain interface.
Note MAC address learning cannot not be performed on the bridge domain interface.
Layer 3 to Layer 2
When a packet arrives at a Layer 3 physical interface of a router, a route lookup action is performed. If route
lookup points to a bridge domain interface, then the bridge domain interface adds the layer 2 encapsulation
and forwards the frame to the corresponding bridge domain. The byte counters are updated.
During a Layer 2 lookup on a bridge domain to which the bridge domain interface belongs, the bridge domain
forwards the packets to the correct service instance based on the destination MAC address.
Note Because a bridge domain interface is an internal interface, the operational state of bridge domain interface
does not affect the bridge domain operational state.
A BDI maintains a standard set of Layer 3 packet counters as the case with all Cisco IOS interfaces. Use the
show interface command to view the Layer 3 packet counters.
The convention of the counters is relative to the Layer 3 cloud. For example, input refers to the traffic entry
to the Layer 3 cloud from the Layer 2 BD, while output refers to the traffic exit from the Layer 3 cloud to the
Layer 2 BD.
Use the show interfaces accounting command to display the statistics for the BDI status. Use the show
interface <if-name> command to display the overall count of the packets and bytes that are transmitted and
received.
Note When a bridge domain interface is created, a bridge domain is automatically created.
When you create the bridge domain interface and the bridge domain, the system maintains the required
associations for mapping the bridge domain-bridge domain interface pair.
The mapping of bridge domain and bridge domain interface is maintained in the system. The bridge domain
interface uses the index of the associated bridge domain to show the association.
Table 28: Bridge Domain Interface Scalability Numbers Based on the Type of Cisco 1000 Series ISR devices' Forwarding Processor
Description 0
Note You must configure every BD-VIF interface with a unique MAC address and it should belong to a different
VRF.
• Number of BD-VIF interfaces with automatically generated MAC address varies on the basis of platforms.
• BD-VIF Interface does not support MPLS.
• The maximum number of BD-VIF interfaces per bridge-domain and the total number of BD-VIF interface
for per system vary based on the type of platforms.
From Cisco IOS XE 17.7.1a release, BD-VIF supports Flexible Netflow (FNF).
Procedure
Router> enable
Step 5 Do one of the following: Specifies either the IPv4 or IPv6 address for the
bridge domain interface.
Example:
ip address ip-address mask
Example:
ipv6 address {X:X:X:X::X
link-local| X:X:X:X::X/prefix
[anycast | eui-64] | autoconfig
[default]}
Example:
Example:
Example:
Step 6 match security-group destination tag Configures the value for security-group
sgt-number destination security tag.
Example:
Router(config-route-map)# match
security-group destination tag 150
Step 7 mac address {mac-address} Specifies the MAC address for the bridge
domain interface.
Example:
Router(config-if)# no shut
Router(config-if)# shut
Example
The following example shows the configuration of a bridge domain interface at IP address 10.2.2.1
255.255.255.0:
Procedure
Router> enable
Step 3 show platform software interface fp active Displays the bridge domain interface
name configuration in a Forwarding Processor.
Example:
Step 4 show platform hardware qfp active interface Displays the bridge domain interface
if-name configuration in a data path.
Example:
Step 5 debug platform hardware qfp feature The selected CPP L2BD Client debugging is
on.
Example:
Step 6 platform trace runtime process Enables the Forwarding Manager Route
forwarding-manager module Processor and Embedded Service Processor
trace messages for the Forwarding Manager
Example:
process.
platform trace
Router(config)#
runtime slot F0 bay 0 process
Step 7 platform trace boottime process Enables the Forwarding Manager Route
forwarding-manager module interfaces Processor and Embedded Service Processor
trace messages for the Route Processor
Example:
Forwarding Manager process during bootup.
platform trace
Router(config)#
boottime slot R0 bay 1 process
forwarding-manager
forwarding-manager level max
What to do next
For additional information on the commands and the options available with each command, see the Cisco
IOS Configuration Fundamentals Command Reference Guide.
exit
To dissociate the VIF interface, use the 'no' form of the command.
interface Port-channel1
mtu 9000
no ip address
!Ethernet service endpoint one per neutron network
service instance 1756 ethernet
description 4e8e5957-649f-477b-9e5b-f1f75b21c03c
encapsulation dot1q 1756
rewrite ingress tag pop 1 symmetric
bridge-domain 1756
!
interface BD-VIF5001
no shutdown
vrf forwarding vrf5001
ip address 10.0.0.1 255.255.255.0
interface BD-VIF5002
no shutdown
vrf forwarding vrf5002
ip address 10.0.0.2 255.255.255.0
bridge-domain 1756
member Port-channel1 service-instance 1756
member bd-vif5001
member bd-vif5002
Procedure
Device> enable
Step 4 {ip | ipv6}flow monitor monitor-name Enables a Flexible NetFlow flow monitor for
[sampler sampler-name] {input | output} IP traffic that the router is receiving or
transmitting on the interface.
Example:
Configuration Output
ipv4_input enabled.
ipv4_output enabled.
ipv6_input enabled.
ipv6_output enabled.
layer2_input enabled.
layer2_output enabled.
ess_ac_input enabled.
The following is a sample out of the show flow monitor [[name] [cache [format {csv | record | table}]]
[statistics]] command showing the cache output in record format.
Device# show flow monitor name FLOW-MONITOR-1 cache format record
- Emergency aged 0
IPV6 DESTINATION ADDRESS: 2001:DB8:0:ABCD::1
ipv6 source address: 2001:DB8:0:ABCD::2
trns source port: 33572
trns destination port: 23
counter bytes: 19140
counter packets: 349
IPV6 DESTINATION ADDRESS: FF02::9
ipv6 source address: 2001:DB8::A8AA:BBFF:FEBB
The following is a sample out of the show flow interface command showing the flow status for an interface.
Device# show flow interface BD-VIF2001
Interface GigabitEthernet0/0/0
FNF: monitor: FLOW-MONITOR-1
direction: Input
traffic(ip): on
FNF: monitor: FLOW-MONITOR-2
direction: Input traffic(ipv6): on
Interface GigabitEthernet1/0/0
FNF: monitor: FLOW-MONITOR-1
direction: Output
traffic(ip): on
FNF: monitor: FLOW-MONITOR-2
direction: Input traffic(ipv6): on
The following is a sample output of the show platform hardware qfp active interface if-name | in FNF
command showing the QFP information and flow direction for flow monitors in Flexible NetFlow configuration.
The table below provides the key to the CLI output.
Configuration Output
The clear flow monitor name monitor-name [cache [force-export] | force-export | statistics] command
clears a Flexible NetFlow flow monitor, flow monitor cache, or flow monitor statistics, and can be used to
force the export of the data in the flow monitor cache.
For more details on configuring Flexible NetFlow, see the Flexible NetFlow Configuration Guide, Cisco IOS
XE 17.
Additional References
Related Documents
MIBs
None To locate and download MIBs for selected platforms, Cisco software releases, and feature sets, use
Cisco MIB Locator found at the following URL:
http://www.cisco.com/go/mibs
Technical Assistance
Description Link
The Cisco Support and Documentation website provides online resources to https://www.cisco.com/c/en_
download documentation, software, and tools. Use these resources to install in/support/index.html
and configure the software and to troubleshoot and resolve technical issues
with Cisco products and technologies. Access to most tools on the Cisco
Support and Documentation website requires a Cisco.com user ID and
password.
Note The table below lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Configuring Bridge Domain Cisco IOS XE This feature was introduced on the Cisco 1000 Series
Interface Cupertino 17.7.1a ISR devices.
Bridge-Domain Virtual IP Cisco IOS XE This feature was introduced on the Cisco 1000 Series
Interface Cupertino 17.7.1a ISR devices.
The Bridge-Domain Virtual IP Interface (VIF) now
connects multiple Bridge Domain Interfaces (BDI)
with a single BD instance so that each IP subnet
within an L2 network can be associated with a single
VRF.
Flexible NetFlow (FNF) on Cisco IOS XE This feature was introduced on the Cisco 1000 Series
Bridge-Domain Virtual IP Cupertino 17.7.1a ISR devices. The following command was introduced:
Interface (BD-VIF)
{ip | ipv6} flow monitor monitor-name [sampler
sampler-name] {input | output}
For more information on DSLAM interoperability, refer to the Cisco Multimode VDSL2 and ADSL2/2
Network Interface Module Datasheet.
• DSL Feature Specifications, on page 278
• Configuring DSL, on page 279
• Features Supported in xDSL , on page 283
• Show and Debug Commands, on page 297
• Sample Configurations, on page 315
ADSL2/2+ • ADSL over POTS with Annex A and Annex B ITU G. 992.1 (ADSL), G.992.3 (ADSL2),
and G.992.5 (ADSL2+)
• ADSL over POTS with Annex M (extended upstream bandwidth) G.992.3 (ADSL2) and
G.992.5 (ADSL2+)
• G.994.1 ITU G.hs
• Reach-extended ADSL2 (G.922.3) Annex L for increased performance on loop lengths
greater than 16,000 feet from central office
• T1.413 ANSI ADSL DMT issue 2 compliance
• DSL Forum TR-067, and TR-100 conformity
• Impulse noise protection (INP) and extended INP
• Downstream power backoff (DPBO)
• Asynchronous transfer mode (ATM) only
• Maximum 8 PVCs per interface
Configuring DSL
Cisco C1100 Series Integrated Services Routers (ISRs) support asymmetric digital subscriber line (ADSL)
1/2/2+ and very high speed digital subscriber line 2 (VDSL2) transmission modes, also called multimode.
Configuring ADSL
Perform the below mentioned steps to configure a DSL controller.
Procedure
Step 3 controller VDSL slot/subslot/port Enters configuration mode for the VDSL
controller.
Example:
router(config-controller)# controller
vdsl 0/3/0
Step 4 operating mode auto Configures the auto operating mode, which is
the default configuration.
Example:
router(config-controller)# operating mode
auto
Procedure
Step 3 controller VDSL slot/subslot/port Enters configuration mode for the VDSL
controller.
Example:
router(config-controller)# controller
vdsl 0/3/0
Configuring VDSL2
Procedure
Step 3 controller VDSL slot/subslot/port Enters configuration mode for the VDSL
controller.
Example:
Step 4 operating mode mode Configures the operating mode. The operating
mode is VDSL2. Enables 8a through 17a
Example:
profile.
router(config-controller)# operating mode
vdsl2
interface ATM0/3/0
no ip address
no atm oversubscribe
no atm enable-ilmi-trap
no shut
interface Ethernet0/3/0
ip address 192.0.2.1 255.255.255.0
load-interval 30
no negotiation auto
If the trained mode is VDSL2 or VDSL2+, the TC mode should be in Packet Transfer Mode (PTM). In this
case, the PTM Ethernet interface is in the up state. All other upper layer parameters such as PPP, IP, and so
on should be configured under the Ethernet interface. If the trained mode is ADSL, ADSL2, or ADSL2+, the
TC mode should be ATM and all the upper layer parameters should be configured under the ATM Permanent
Virtual Circuit (PVC). If you change the operating mode between ADSL and VDSL, you need not to reboot
the router in order to activate the corresponding Ethernet or ATM interfaces. In case of PTM mode, check
with your ISP if they are expecting Dot1q tag configuration on the CPE. ISP should provide Dot1q tag value.
Router(config)#interface Ethernet0.835
Router(config-subif)#pppoe-client dial-pool-member 1
• If the user configures VBR-rt or VBR-nrt more than the configured oversubscription factor then PVC
will be configured for the bandwidth available. If there is no oversubscription bandwidth left then VC
will be downgraded to UBR. For example for line rate of 1000k, with oversubscription factor 2: PVC1
is vbr-rt 400k 400k, PVC2 is vbr-nrt 1600k 1600k and PVC3 is vbr-rt 500k 500k. In this case the PVC1
and PVC2 will be configured to given pcr and scr, PVC3 will be downgraded to UBR class.
• If there is no bandwidth left, then some PVCs may be downgraded to UBR class.
• PCR & SCR of VBR PVC can never exceed the line rate even if there is enough available bandwidth
for the configured PCR and SCR.
Oversubscription of the ATM interfaces is enabled by default and is subject to infinite oversubscription factor
which is not supported on DSL NIM. User must enable oversubscription factor.
The following configuration enables the oversubscription 2. The only oversubscription factor supported is 2.
Example:
Below is the example for the sum of pvc rates less than the line rate of 1561kbps.
When line rate gets downgraded to 294 kbps, CBR and VBR PVC rates gets adjusted dynamically as below.
Note • When there is a change in line condition or DSL line flaps, ATM interface Bandwidth gets updated after
line condition is stable. PVC Service Class bandwidth and Multilink Bundle bandwidth (if MLPPP is
configured) gets adjusted dynamically. As a result, traffic flows according to the adjusted bundle
bandwidth.
• When "bandwidth x" is configured under dialer and there is a change in line condition or DSL line flaps,
ATM interface Bandwidth gets updated after line condition is stable. PVC Service Class bandwidth gets
adjusted dynamically, but Multilink Bundle bandwidth (if MLPPP is configured) does not get updated
dynamically because of fixed dialer bandwidth configuration. Because of this, throughput might not be
achieved as expected. It is recommended not to configure "bandwidth x" under dialer interface for MLP
ATM configurations to be in sync with ATM interface/Service Class bandwidth.
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#int atm0/3/0
Router(config-if)#atm bandwidth dynamic
Router(config-if)#end
Router#
Sample configuration:
!
interface ATM0/3/0
no ip address
load-interval 30
no atm enable-ilmi-trap
!
Example 2:
In example 2, CBR PVC was configured with PCR as 300 kbps. Due to line rate change, PCR rate has
dynamically changed to 294 kbps.
Router#
Show atm pvc output with atm dynamic bandwidth feature disabled:
The following steps are performed by the Cisco IOS-XE software to determine what value should be assigned
to a parameter when a PVC is re-created in response to a change in total available bandwidth:
• A value is calculated for the parameter. The calculation takes into account the configured value for the
parameter, the active value for the parameter (if it is different from the configured value), and the change
in total available bandwidth.
• The calculated value is compared to the configured value of the parameter and to the maximum available
cell rate, and a new value is determined. The new value is applied when the PVC is re-created.
The following sections describe how the new parameter values are determined when a PVC is re-created for
supported QoS classes:
CBR PVCs
When the total available bandwidth changes, PVCs configured with CBR service class are recreated as follows:
• If the configured PCR value is less than the calculated PCR value, the PVC is recreated with the configured
PCR value.
• If the configured PCR value is greater than the calculated PCR value, the PVC is recreated with the
calculated value with no change in class.
• If there is no bandwidth left for the CBR PVC, then CBR PVCs will be downgraded to UBR class with
a PCR value equal to the maximum available rate.
VBR PVCs
When the total available bandwidth changes, PVCs configured with VBR service class are re-created as
follows:
• If the configured PCR value is less than the calculated PCR value, the PVC is recreated with the configured
PCR value.
• If the configured PCR value is greater than the calculated PCR value, the PVC is recreated with a new
PCR value. The new PCR value will be the lower of the following values:
• The calculated PCR value
• The maximum available cell rate
• If the configured SCR value is less than the calculated PCR value, the PVC is re-created with the
configured SCR value.
• If the configured SCR value is greater than the calculated PCR value, the PVC is recreated with a new
SCR value. The new SCR value will be the lower of the following values:
• The calculated PCR value
• The maximum available cell rate
UBR PVCs
When the total available bandwidth changes, PVCs configured with UBR service class are re-created as
follows:
• If the PCR configuration is set to the default, the PVC is re-created with a PCR value equal to the new
line rate.
• If the configured PCR value is less than the calculated PCR value, the PVC is re-created with the
configured PCR value.
• If the configured PCR value is greater than the calculated PCR value, the PVC is recreated with a new
PCR value. The new PCR value will be the lower of the following values:
• The calculated PCR value
Example:
Below is the example for the sum of pvc rates less than the line rate of 1561kbps.
Router#show atm pvc
VCD / Peak Av/Min Burst
Interface Name VPI VCI Type Encaps SC Kbps Kbps Cells St
When line rate gets downgraded to 687kbps, CBR and VBR PVC rates gets adjusted dynamically as below.
If you do not boot the router in packages.conf mode with the Cisco IOS XE image, you must follow the
prerequisites given below, before proceeding with the firmware upgrade:
• Copy the firmware subpackage into bootflash:/mydir.
• Type the request platform software package expand file command boot flash:/mydir/<IOS-XE image>
to expand the super package.
• Type the reload command to load the module with the new firmware
• Boot the router with packages.conf.
• Copy the firmware subpackage to the folder bootflash:mydir/.
• Issue request platform software package install rp 0 file bootflash:/mydir/<firmware subpackage> .
• Reload the hardware module subslot to boot the module with the new firmware.
• Verify that the module is booted up with the new firmware using the show platform software subslot
0/3 module firmware command.
Procedure
Step 2 request platform software package Expands the platform software package to super
expand file bootflash:/mydir /<IOS-XE image package.
to expand super package.
Example:
Router# request platform software
package expand file
bootflash:/mydir/c1100-universalk9.03.14.00.S.155-1.S-std.SPA.bin
Step 4 boot bootflash:mydir/ /packages.conf. Boots the super package by specifying the path
and name of the provisioning file:
Example:
packages.conf.
rommon 1 > boot
bootflash:mydir/packages.conf
Step 5 copy firmware subpackage to the folder Copies the firmware subpackage into
bootflash:mydir/. bootflash:mydir.
Example:
bootflash:mydir/
Step 6 request platform software package install Installs the software package.
rp 0 file bootflash:/mydir/<firmware
subpackage>.
Example:
Router#request platform software package
install rp 0 file
bootflash:mydir/c1100-universalk9.03.14.00.S.155-1.S-std.SPA.bin
Step 7 hw-module subslot x/y reload to boot the Reloads the hardware module subslot and boots
module with the new firmware. the module with the new firmware.
Example:
Router#hw-module subslot 0/3 reload
Step 8 show platform software subslot 0/3 module Displays the version of the newly installed
firmware to verify that the module is booted firmware.
up with the new firmware.
Example:
Router# show platform software subslot
0/3 module firmware
Pe
The following example shows how to perform firmware upgrade in a router module:
Routermkdir bootflash:mydir
Create directory filename [mydir]?
Created dir bootflash:/mydir
Router#c
Router#copy bootflash:c1100-universalk9.03.14.00.S.155-1.S-std.SPA.bin bootflash:mydir/
Destination filename [mydir/c1100-universalk9.03.14.00.S.155-1.S-std.SPA.bin]?
Copy in progress...CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCC 425288648 bytes copied in 44.826 secs (9487544 bytes/sec)
Router#
Router#
Router#dir bootflash:mydir
Directory of bootflash:/mydir/
632738 -rw- 425288648 Dec 12 2014 09:16:42 +00:00
c1100-universalk9.03.14.00.S.155-1.S-std.SPA.bin
7451738112 bytes total (474025984 bytes free)
Router#
Router#reload
System configuration has been modified. Save? [yes/no]: yes
Building configuration...
[OK]
Proceed with reload? [confirm]
Rom image verified correctly
File size is 0x000028f1 Located mydir/packages.conf Image size 10481 inode num 632741, bks
cnt 3 blk size 8*512 # File size is 0x150ae3cc Located mydir/
c1100-universalk9.03.14.00.S.155-1.S-std. SPA.pkg Image size 353035212 inode num 356929,
bks cnt 86191 blk size 8*512
###################################################################
###################################################################### Boot image size =
353035212 (0x150ae3cc) bytes Package header rev 1 structure detected Calculating SHA-1
hash...done validate_package: SHA-1 hash: calculated
8e966678:8afb08f4:8a88bb8f:fe591121:8bddf4b3 expected
8e966678:8afb08f4:8a88bb8f:fe591121:8bddf4b3 RSA Signed RELEASE Image Signature Verification
Successful. Package Load Test Latency : 3799 msec Image validated Dec 12 09:28:50.338 R0/0:
%FLASH_CHECK-3-DISK_QUOTA: Flash disk quota exceeded [free space is 61864 kB] - Please
clean up files on bootflash.
Router>
Router>en
Password:
Router#
Router show controller vdsl 0/3/0
Controller VDSL 0/3/0 is UP
Daemon Status: UP
TC Mode: ATM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Line 0:
Router#
Router#
--- Starting local lock acquisition on R0 --- Finished local lock acquisition on R
--- Starting file path checking --- Finished file path checking --- Starting image file
verification
--- Checking image file names Locating image files and validating name syntax Found Verifying
image file locations Inspecting image file types Processing image file constraints Creating
candidate provisioning file Finished image file verification --- Starting candidate package
set construction --- Verifying existing software set Processing candidate provisioning
file Constructing working set for candidate package set Constructing working set for running
package set Checking command output Constructing merge of running and candidate packages
Checking if resulting candidate package set would be complete Finished candidate package
set construction --- Starting ISSU compatiblity verficiation --- Verifying image type
compatibility Checking IPC compatibility with running software Checking candidate package
set infrastructure compatibility Checking infrastructure compatibility with running software
Checking package specific compatibility Finished ISSU compatiblity verficiation --- Starting
impact testing --- Checking operational impact of change Finished impact testing ---
Starting list of software package changes --- Old files list: Removed
c1100-firmware_c1100_vadsl2017-07-07_23.01_.SSA.pkg New files list: Added
c1100-firmware_c1100_vadsl2017-07-07_23.01_.SSA _39n.SSA.pkg Finished list of software
package changes --- Starting commit of software changes --- Updating provisioning rollback
files Creating pending provisioning file Committing provisioning file Finished commit of
software changes --- Starting analysis of software changes --- Finished analysis of software
changes --- Starting update running software --- Blocking peer synchronization of operating
information Creating the command set placeholder directory Finding latest command set
Finding latest command shortlist lookup file Finding latest command shortlist file
Router#
Router#
Router#show platform software subslot 0/3 module firmware
IP to ATM CoS, Per-VC WFQ and CBWFQ QoS: PPPoE QoS Markings of .1P Bits
in S (AOL)
IP to ATM CoS support for a single ATM VC allows network managers to use existing features, such as
committed access rate (CAR) or policy-based routing (PBR), to classify and mark different IP traffic by
modifying the IP Precedence field in the IP version 4 (IPv4) packet header. Subsequently, Weighted Random
Early Detection (WRED) or distributed WRED (DWRED) can be configured on a per-VC basis so that the
IP traffic is subject to different drop probabilities (and therefore priorities) as IP traffic coming into a router
competes for bandwidth on a particular VC.
For more information, see the Configuring IP to ATM CoS document.
QoS on Dialer
QOS on dialer interfaces feature provides support for Point-to-Point Protocol over Ethernet (PPPoE) and
Point-to-Point Protocol over Asynchronous Transfer Mode (PPPoA) configurations on dialer interfaces. The
feature provides support for Modular QoS CLI (MQC)-based queuing and shaping that supports per-customer
quality of service (QoS). For more details on configuring QOS on dialer, see the Shaping on Dialer Interfaces
document.
VC Bundling
APP License is required to support this feature on this module in Cisco IOS XE.
Router(config)#license boot level appxk9
ATM VC bundle management allows you to define an ATM VC bundle and add VCs to it. You can configure
multiple Permanent Virtual Circuits (PVC) that have different QoS characteristics between two end devices.
Each VC of a bundle has its own ATM traffic class and ATM traffic parameters. You can apply attributes
and characteristics to discrete VC bundle members, or you can apply them collectively at the bundle level.
For more details on configuring VC Bundling, see the Configuring ATM document.
Daemon Status: UP
TC Mode: ATM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Line 0:
Modem Up time
-------------------------------------------
0D 0H 13M 47S
2 0 admin SW 0 0% 1 0% [kthreadd]
3 2 admin SW 0 0% 0 0% [ksoftirqd/0]
4 2 admin SW 0 0% 0 0% [kworker/0:0]
89 2 admin SW< 0 0% 1 0% [crypto]
6 2 admin SW 0 0% 0 0% [migration/0]
Processors utilization
--------------------------------------
Linux 3.4.11-rt19 ((none)) 01/01/70 _mips_ (2 CPU)
00:14:47 CPU %usr %nice %sys %iowait %irq %soft %steal %guest %idle
00:14:47 all 0.13 0.00 1.42 0.00 0.00 0.17 0.00 0.00 98.28
00:14:47 0 0.13 0.00 1.52 0.00 0.00 0.28 0.00 0.00 98.07
00:14:47 1 0.13 0.00 1.32 0.00 0.00 0.06 0.00 0.00 98.49
Interrupts
--------------------------------------
CPU0 CPU1
0: 8608 9201 BCM63xx IPI
7: 881960 881466 BCM63xx timer
9: 0 0 BCM63xx_no_unmask brcm_9
10: 1780 0 BCM63xx_no_unmask brcm_10
13: 0 717 BCM63xx_no_unmask serial
21: 0 0 BCM63xx_no_unmask brcm_21
22: 0 0 BCM63xx_no_unmask brcm_22
31: 33832 0 BCM63xx_no_unmask dsl
34: 0 0 BCM63xx_no_unmask brcm_34
35: 0 0 BCM63xx_no_unmask brcm_35
39: 0 0 BCM63xx_no_unmask brcm_39
89: 0 0 BCM63xx_no_unmask brcm_89
91: 0 0 BCM63xx_no_unmask brcm_91
ERR: 0
System status
--------------------------------------
cpu 237 0 2521 174333 0 0 305 0 0 0
cpu0 118 0 1350 86981 0 0 249 0 0 0
cpu1 118 0 1170 87352 0 0 55 0 0 0
intr 1817730 17926 0 0 0 0 0 0 1763474 0 0 1781 0 0 717 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
33832 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
ctxt 616258
btime 0
processes 609
procs_running 1
procs_blocked 0
--------------------------------------
--------------------------------------
MemTotal: 119616 kB
MemFree: 76496 kB
Buffers: 3220 kB
Cached: 9732 kB
SwapCached: 0 kB
Active: 5300 kB
Inactive: 9572 kB
Active(anon): 1924 kB
Inactive(anon): 0 kB
Active(file): 3376 kB
Inactive(file): 9572 kB
Unevictable: 0 kB
Mlocked: 0 kB
SwapTotal: 0 kB
SwapFree: 0 kB
Dirty: 0 kB
Writeback: 0 kB
AnonPages: 1976 kB
Mapped: 2764 kB
Shmem: 0 kB
Slab: 26208 kB
SReclaimable: 556 kB
SUnreclaim: 25652 kB
KernelStack: 752 kB
PageTables: 252 kB
NFS_Unstable: 0 kB
Bounce: 0 kB
WritebackTmp: 0 kB
CommitLimit: 59808 kB
Committed_AS: 4888 kB
VmallocTotal: 1032116 kB
VmallocUsed: 1544 kB
VmallocChunk: 1028200 kB
show platform software subslot slot/subslot module Displays firmware version, CFE version, build label
firmware of both module (base board).
show platform software subslot slot/subslot module Displays CPU utilization, memory utilization,
status firmware status, and so on.
show platform hardware subslot slot/subslot Displays device information specific to the module
module device help (for example, Phy, Non-Interface Registers).
show platform hardware subslot slot/subslot Displays configuration and status for the host interface
module host-if status port(s) (that is, ports connected to the backplane
switch) of baseboard.
show platform hardware subslot slot/subslot Displays link statistics for the host interface port(s)
module host-if statistics (that is, ports connected to the backplane switch).
show platform hardware subslot slot/subslot Displays status, configuration and IID for specified
module interface interface name status user-visible interface.
show platform hardware subslot slot/subslot Displays link statistics including FC info for specified
module interface interface name statistics user-visible interface.
Modem Up time
-------------------------------------------
0D 0H 13M 47S
Processors utilization
--------------------------------------
Linux 3.4.11-rt19 ((none)) 01/01/70 _mips_ (2 CPU)
00:14:47 CPU %usr %nice %sys %iowait %irq %soft %steal %guest %idle
00:14:47 all 0.13 0.00 1.42 0.00 0.00 0.17 0.00 0.00 98.28
00:14:47 0 0.13 0.00 1.52 0.00 0.00 0.28 0.00 0.00 98.07
00:14:47 1 0.13 0.00 1.32 0.00 0.00 0.06 0.00 0.00 98.49
Interrupts
--------------------------------------
CPU0 CPU1
0: 8608 9201 BCM63xx IPI
7: 881960 881466 BCM63xx timer
9: 0 0 BCM63xx_no_unmask brcm_9
10: 1780 0 BCM63xx_no_unmask brcm_10
13: 0 717 BCM63xx_no_unmask serial
21: 0 0 BCM63xx_no_unmask brcm_21
22: 0 0 BCM63xx_no_unmask brcm_22
31: 33832 0 BCM63xx_no_unmask dsl
34: 0 0 BCM63xx_no_unmask brcm_34
35: 0 0 BCM63xx_no_unmask brcm_35
39: 0 0 BCM63xx_no_unmask brcm_39
89: 0 0 BCM63xx_no_unmask brcm_89
91: 0 0 BCM63xx_no_unmask brcm_91
ERR: 0
System status
--------------------------------------
cpu 237 0 2521 174333 0 0 305 0 0 0
cpu0 118 0 1350 86981 0 0 249 0 0 0
cpu1 118 0 1170 87352 0 0 55 0 0 0
intr 1817730 17926 0 0 0 0 0 0 1763474 0 0 1781 0 0 717 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
33832 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 0 0 0 0 0 0 0 0
ctxt 616258
btime 0
processes 609
procs_running 1
procs_blocked 0
--------------------------------------
--------------------------------------
MemTotal: 119616 kB
MemFree: 76496 kB
Buffers: 3220 kB
Cached: 9732 kB
SwapCached: 0 kB
Active: 5300 kB
Inactive: 9572 kB
Active(anon): 1924 kB
Inactive(anon): 0 kB
Active(file): 3376 kB
Inactive(file): 9572 kB
Unevictable: 0 kB
Mlocked: 0 kB
SwapTotal: 0 kB
SwapFree: 0 kB
Dirty: 0 kB
Writeback: 0 kB
AnonPages: 1976 kB
Mapped: 2764 kB
Shmem: 0 kB
Slab: 26208 kB
SReclaimable: 556 kB
SUnreclaim: 25652 kB
KernelStack: 752 kB
PageTables: 252 kB
NFS_Unstable: 0 kB
Bounce: 0 kB
WritebackTmp: 0 kB
CommitLimit: 59808 kB
Committed_AS: 4888 kB
VmallocTotal: 1032116 kB
VmallocUsed: 1544 kB
VmallocChunk: 1028200 kB
Router#show platform hardware subslot 0/3 module interface ethernet 0/3/0 statistics
Mode: PTM IID : 1
Queue Stats LP HP
Throttles 0 0
Enables 0 0
Throttles Ref 0 0
Enables Ref 55 55
Throttled 0 0
Tx Packets 14 0
Tx Bytes 6046 0
Tx Q Drops 0 0
Rx Packets 0 NA
Rx Bytes 0 NA
Rx Q Drops 0 NA
Max Q Depth 400 400
Q Depth 0 0
XON Q Depth 25 25
XOFF Q Depth 35 35
Router#show platform hardware subslot 0/3 module interface atm 0/3/0 statistics
Mode: ATM IID:3 PVC:8/37
============================================
Queue Stats LP HP
Throttles 0 0
Enables 0 0
Throttles Ref 0 0
Enables Ref 1543 1543
Throttled 0 0
Tx Packets 7306 0
Tx Bytes 277628 0
Tx Q Drops 0 0
Rx Packets 0 NA
Rx Bytes 0 NA
Rx Q Drops 0 NA
Max Q Depth 400 400
Q Depth 0 0
XON Q Depth 96 96
XOFF Q Depth 100 100
local remote
pkts in pkts out errors pkts in pkts out errors
Control Point: 0: Last update was 280 ms ago
SAP 7: 0 0 0 0 0 0
SAP 6: 0 0 0 0 0 0
SAP 5: 0 0 0 0 0 0
SAP 4: 0 0 0 0 0 0
SAP 3: 0 0 0 0 0 0
SAP 2: 14 85 0 68 13 0
SAP 1: 12 873 0 872 12 0
SAP 0: 402 328 0 326 401 0
Total : 428 1286 0 1266 426 0
Heartbeats Local Remote
State: HB_INACTIVE HB_ACTIVE
in 184 28
out 28 184
acks in 28 183
acks out 184 28
lost 0 0
resets 0 0
Grand Total: 428 1286 0 1266 426 0
== sram contents ==
ch: bd base: status:current bd content
rx:078ec000:0000000b:08402000:07b37060
tx:07ae2000:0000004a:003c6110:05e96002
FFP_DP_MAC: 30.f7.0d.55.40.a9
FFP_FC_MAC: 30.f7.0d.55.40.a9
Module_MAC: d0.72.dc.93.f5.4b
CP VLAN ID: 2351
FFP DP VLAN ID: 2350
FFP HP1 VLAN ID: 2350
FFP HP2 VLAN ID: 2350
FC VLAN ID: 2350
Max CP MTU : 2048
Router#show platforrm hardware subslot 0/3 module interface ethernet 0/3/0 status
PTM Interface IID:1
Channel Status:ENABLE
Packet Flow Specific to ATM PVC Related Show and Debug Commands
Router#show platform software atm F0 pvc
Forwarding Manager ATM PVC Information
Interface VCD ID Ing-ID Eg-ID VC State AOM ID
ATM0/3/0.1 1 0x1004010 0 0 0x1248 378
Statistics:
tail drops (bytes): 0 , (packets): 0
total enqs (bytes): 103686 , (packets): 6098
queue_depth (pkts ): 0
Schedule specifics:
Index 0 (SID:0x91, Name: ATM0/3/0.1.1.1004010)
PARQ Software Control Info:
sid: 0x91, parent_sid: 0x90
evfc_fc_id: 0x5200, fc_sid: 0xfffff
obj_id: 0x24, parent_obj_id: 0x20, debug_name: ATM0/3/0.1.1.1004010
num_entries (active): 1, num_children (max): 1
presize_hint: 0
sw_flags: 0x0842002a, sw_state: 0x00000801
orig_min : 0 , min: 0
min_qos : 0 , min_dflt: 1045000
orig_max : 0 , max: 1045000
max_qos : 0 , max_dflt: 1045000
share : 1
plevel: 0, service_fragment: False, port_uidb: 65503
priority: 0, defer_obj_refcnt: 0
ifm_h: 36, qos_h: 0x00000000, parent_obj_h: 0x00000020
ifh 33 queue_type 0(NONE)
qm_obj: 0x00007f81b81ca0f0
subdevice_id : 0
REM Schedule Info:
Cntl=0x0 (FC_Enabled) Aggregate State=0x0 (XON XON XON)
HP2, priority level 1. Enforced State=XON (XON)
Bytes Left=2147483647, Paks Left=2147483647
Rvd Flow-On Msgs=0, Rvd Flow-Off Msgs=0
Rvd Refresh Msgs=370, Refresh xon_mismatch=0 xoff_mismatch=0
HP1, priority level 2. Enforced State=XON (XON XON)
Bytes Left=0, Paks Left=0
Rvd Flow-On Msgs=0, Rvd Flow-Off Msgs=0
Rvd Refresh Msgs=0, Refresh xon_mismatch=0 xoff_mismatch=0
LP, normal priority. Enforced State=XON (XON XON XON)
Bytes Left=2147483647, Paks Left=2147483647
Rvd Flow-On Msgs=0, Rvd Flow-Off Msgs=0
Rvd Refresh Msgs=370, Refresh xon_mismatch=0 xoff_mismatch=0
Schedule specifics:
Index 1 (SID:0x90, Name: ATM0/3/0 UBR COS)
PARQ Software Control Info:
sid: 0x90, parent_sid: 0x7f
evfc_fc_id: 0xffff, fc_sid: 0xfffff
obj_id: 0x20, parent_obj_id: 0x1c, debug_name: ATM0/3/0 UBR COS
num_entries (active): 1, num_children (max): 1
presize_hint: 0
sw_flags: 0x08520022, sw_state: 0x00000801
orig_min : 0 , min: 0
min_qos : 0 , min_dflt: 0
orig_max : 0 , max: 0
max_qos : 0 , max_dflt: 0
share : 1
plevel: 0, service_fragment: False, port_uidb: 65504
priority: 0, defer_obj_refcnt: 0
ifm_h: 32, qos_h: 0x00000000, parent_obj_h: 0x0000001c
ifh 0 queue_type 0(NONE)
qm_obj: 0x00007f81b81caa20
subdevice_id : 0
Schedule specifics:
Index 2 (SID:0x7f, Name: ATM0/3/0)
PARQ Software Control Info:
sid: 0x7f, parent_sid: 0x7c
evfc_fc_id: 0x5100, fc_sid: 0xfffff
obj_id: 0x1c, parent_obj_id: 0x17, debug_name: ATM0/3/0
TC Mode: ATM
Line 0:
XTU-R (DS) XTU-C (US)
Trellis: ON ON
SRA: disabled disabled
SRA count: 0 0
Bit swap: enabled enabled
Bit swap count: 669 383
Line Attenuation: 3.5 dB 1.7 dB
Signal Attenuation: 3.1 dB 0.0 dB
Noise Margin: 9.4 dB 5.9 dB
Attainable Rate: 15912 kbits/s 1379 kbits/s
Actual Power: 18.0 dBm 12.2 dBm
Total FECC: 176 176
Total ES: 43 0
Total SES: 0 0
Total LOSS: 0 0
Total UAS: 50 50
Total LPRS: 0 0
Total LOFS: 0 0
Total LOLS: 0 0
User can modify the file in which training logs be stored before starting the training log collection procedure
by configuring training log filename flash:user-filename.
Example:
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#controller vdsl 0/3/0
Router(config-controller)#training log filename flash:mytraininglog_file
Router(config-controller)#exit
Router#show controller vdsl 0/3/0
Controller VDSL 0/3/0 is UP
Daemon Status: UP
XTU-R (DS) XTU-C (US)
Chip Vendor ID: 'BDCM' 'BDCM'
Chip Vendor Specific: 0x0000 0x544D
Chip Vendor Country: 0xB500 0xB500
Modem Vendor ID: 'CSCO' 'BDCM'
Modem Vendor Specific: 0x4602 0x544D
Modem Vendor Country: 0xB500 0xB500
Serial Number Near: FOC18426DR9 4351/K9 15.5(201412
Serial Number Far:
Modem Version Near: 15.5(20141202:161930
Modem Version Far: 0x544d
TC Mode: ATM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Line 0:
Trellis: ON ON
SRA: disabled disabled
SRA count: 0 0
Bit swap: enabled enabled
Bit swap count: 669 383
Line Attenuation: 3.5 dB 1.7 dB
Signal Attenuation: 3.1 dB 0.0 dB
Noise Margin: 8.8 dB 5.9 dB
Attainable Rate: 15464 kbits/s 1379 kbits/s
Actual Power: 18.0 dBm 12.2 dBm
Total FECC: 176 176
Total ES: 43 0
Total SES: 0 0
Total LOSS: 0 0
Total UAS: 50 50
Total LPRS: 0 0
Total LOFS: 0 0
Total LOLS: 0 0
Sample Configurations
Sample MLPPP Configurations and Show Commands
!
interface Ethernet0/3/0
no ip address
load-interval 30
no negotiation auto
pppoe enable
pppoe-client dial-pool-number 2
!
!
interface Dialer2
bandwidth 55000
ip address negotiated
encapsulation ppp
load-interval 30
dialer pool 1
dialer-group 1
ppp authentication chap
ppp chap hostname cisco
ppp multilink
ppp multilink endpoint string mlpp
!
Router#show platform hardware qfp active feature mlp client bundle Virtual-Access3
Bundle Interface: Virtual-Access3
Bundle State: Up
Platform Interface Handle: 35
QFP Interface Handle: 26
QFP Interface uIDB Handle: Rx 65510, Tx 65510
Shadow Base: 0x020E19D0, Size: 1160
Num Links: 2, Next Link: 2, Enabled Links Mask: 0x0003
Tx Channel: 0x32, Tx Queue ID: 0x451, Tx Flow Control SID: 0x9f
Max Frags: 0x0, Lost Fragment Timeout: 1000
Max Frag Size: 65535, Frag Delay: 30
RX Class Buffer Size: 24384
MRRU: 1524, Peer MRRU: 1524
Bundle Bandwidth: 89000 kbps
RX Classes: 1, TX Classes: 1
Bundle Flags: 0x00000011, RX DP Flags: 0x04, TX DP Flags: 0x20
Outstanding datapath proxy requests:
Bundle Create: 0, Update: 0, Remove: 0
Links Add: 0, Delete: 0
Member Link Interfaces:
Interface: EVSI20
Platform Interface Handle: 20
QFP Interface Handle: 17
QFP Interface uIDB Handle: Rx 65519, Tx 65519
Shadow Base: 0x02075CA0, Size: 218
TX Chan: 52, P1 Queue ID: 1107, P2 Queue ID: 0
Link Bandwidth: 55000 kbps, Link Weight: 206250, Link Qlimit: 2286
Link Optimal Frag Size: 1496, Max Frag Size: 65535
Rewrite Len w/ PID: 2 Rewrite Len w/o PID: 0
Rewrite String: 00, 3d
Outstanding datapath proxy requests:
Links Add: 0, Update: 0, Delete: 0
Interface: EVSI21
Router#show platform hardware qfp active feature mlp datapath bundle Virtual-Access3 detail
QFP: 0.0 - Bundle Rx Interface: Virtual-Access3, State: UP
Rx Bundle uIDB: 65510
Num Links: 2, Num Classes: 1, MRRU: 1524
Defined Links: 0x0003, Enabled Links: 0x0003
Config Flags: 0x04 (EVSI, MCMP: Disabled, Strict Seq Check: Enabled)
Buffer Limit: 24384 bytes per class, Lost Frag Timeout: 1000 ms
Stats Non-MLP Encapped Rx: 0 packets
Meta Packet Drop: 0, Attn Sync Drop: 0
No Buffer: 0, Invalid Class: 0
Hit Buffer Limit: 0, Rx Pkt Exceeds MRRU: 0
Lost Frag Timeout: 0
Reassembly QID: 0x000003F8, Qlimit: 2000, Qdepth: 0
Bundle SB: 0x33445150, SB Size: 144
Rx Classes:
Class: 0
Expected Seq Number: 0x00000D, In Order/In Sync Links: 0x0003/0x0003
Stats Rx Buffered: 0/0 fragments/bytes
Rx Fragmented: 0 fragments
Rx Unfragmented: 13 packets
Rx Post Reassembly: 13 packets
Rx Discarded: 0/0 fragments/bytes
Rx NULL Frags: 0, Rx Lost: 0
Rx Out of Order: 0, Rx Rcv'd Lost: 0
Reorder/Reassembly Stats:
Reassembly Packet: 0/0 fragments/bytes
Staged Packets: 0 (S1-empty,S2-empty)
Inflight Packets: 0
Class SB: 0x3334D910, SB Size: 272
Rx Member Links:
Member Link Interface: EVSI20, State: UP
Rx Link uIDB: 65519, Link ID: 0, Link Mask: 0x0001
Config Flags: 0x01 (EVSI)
Class Link Buffered Fragments
0 0
Link SB: 0x33470430, SB Size: 32
Member Link Interface: EVSI21, State: UP
Rx Link uIDB: 65518, Link ID: 1, Link Mask: 0x0002
Config Flags: 0x01 (EVSI)
Class Link Buffered Fragments
0 0
Link SB: 0x33470410, SB Size: 32
QFP: 0.0 - Bundle Tx Interface: Virtual-Access3, State: UP
Tx Bundle uIDB: 65510
Num Links: 2, Num Classes: 1, Peer MRRU: 1524
Member Links Defined: 0x0003 Enabled: 0x0003 Congested(HP/LP): 0x0000/0x0000
Bundle Equal Cost Frag Size: 1496
Config Flags: 0x20 (EVSI, MCMP: Disabled, MCMP Encap Seq: No,
Interleave: Disabled, Fragmentation: Disabled
NCP MLP Encaped: Yes, NCP Tx Link ID: 0)
EVSI First Member Link Encap Type: 1, EVSI L2 Overhead: 20
Bundle Flow Control SID: 0x9F, SID Update In Prog: No, Bundle Flags: 0x01
Flow Control Timer: Stopped, Xoff Timer Tics: 0, Check Interval: 4572
MLP FC: Xon, SW FC: Full-Xon, HW FC: Full-Xon
HW FC Full Xoff Events: 6410, HW FC LP Xoff Events: 0
Bundle Load Cycle ID (HP/LP): 0/2594, Next Tx Link ID (HP/LP): 0/1
Link Link Queue Cycle ID Cycle Tx Bytes Queue Depth
ID Weight Limit HP/LP HP/LP HP(agg)/LP
0 206250 9 0/2594 0/98444 0/0
1 127500 9 0/2594 0/98314 0/0
Stats Non-MLP Encapped Tx: 2 packets
Non-MLP Priority Interleaved: 0 packets
Tx Drop: 0, Tx ESS Packet Drop: 0
Invalid Class: 0
Bundle SB: 0x34F6C800, SB Size: 256
Tx Classes:
Class: 0
Next Send Seq Number: 0x976A97
Stats Tx Pre Frag Packets: 127363735 packets
Tx Fragmented: 0 fragments
Tx Unfragmented: 127363735 packets
Tx Frag Interleaved: 0 fragments
Tx Unfrag Interleaved: 0 packets
Class SB: 0x3334DD20, SB Size: 64
Tx Member Links:
Member Link Interface: EVSI20, Parent: Ethernet0/3/0, State: UP
Tx Link uIDB: 65519, Link ID: 0, Link Mask: 0x0001
Config Flags: 0x01 (EVSI)
EVSI Parent Encap Type: 1, EVSI L2 Overhead: 20
Link Weight: 206250, Frag Size: 1496
P1 Tx QID: 0x00000453, Qdepth: 0
P2 Tx QID: 0x00000000, Qdepth: 0
Default Tx QID: 0x00000452, Qdepth: 0
L2 Rewrite String: 003D
Rewrite length w/ PID: 2, Length w/o PID: 0
Link SB: 0x34FAB0C0, SB Size: 144
Member Link Interface: EVSI21, Parent: Ethernet0/3/0, State: UP
Tx Link uIDB: 65518, Link ID: 1, Link Mask: 0x0002
Config Flags: 0x01 (EVSI)
EVSI Parent Encap Type: 1, EVSI L2 Overhead: 20
Link Weight: 127500, Frag Size: 1496
P1 Tx QID: 0x00000455, Qdepth: 0
P2 Tx QID: 0x00000000, Qdepth: 0
Default Tx QID: 0x00000454, Qdepth: 0
L2 Rewrite String: 003D
Rewrite length w/ PID: 2, Length w/o PID: 0
Link SB: 0x34FAB030, SB Size: 144
Region Cisco LTE Advanced 3.0 LTEEA SKU (European Cisco LTE Advanced 3.0 LTELA SKUs (Latin
Theaters Union, North America) America, Asia-Pacific)
Bands LTE bands 1-5, 7, 12, 13, 20, 25, 26, 29, 30, and LTE bands 1, 3, 5, 7, 8, 18, 19, 21, 28, 38, 39,
41 40, and 41
FDD LTE 700 MHz (band 12), 700 MHz (band FDD LTE 700 MHz (band 28), 850 MHz (band
29), 800 MHz (band 20), 850 MHz (band 5 CLR), 5 CLR), 850 MHz (bands 18 and 19 Low), 900
850 MHz (band 26 Low), 900 MHz (band 8), MHz (band 8), 1500 MHz (band 21), 1800 MHz
1800 MHz (band 3), 1900 MHz (band 2), 1900 (band 3), 2100 MHz (band 1), or 2600 MHz
MHz (PCS band 25), 1700 MHz and 2100 MHz (band 7)
(band 4 AWS), 2100 MHz (band 1), 2300 MHz
TDD LTE 1900 MHz (band 39), 2300 MHz
(band 30), or 2600 MHz (band 7)
(band 40), 2500 MHz (band 41), or 2600 MHz
TDD LTE 2500 MHz (band 41) (band 38)
Carrier aggregation band combinations: Carrier aggregation band combinations:
1+8; 2+(2,5,12,13,29); 3+(7,20); 4+(4,5,12,13,29); 1+(8,18,19,21); 3+(5,7,19,28); 7+(5,7,28);
7+(7,20); 12+30, 5+30, and 41+41 19+21, 38+38, 39+39,40+40, and 41+41
5GNR Sub-6G 29, 38, 41, 48, 75, 76, 77, 78, 79
LB LTE/ 5GNR Sub-6G 5, 8, 12, 13, 14, 17, 18, 19, 20, 26, 28, 71
WCDMA 1, 2, 4, 5, 8, 19
The following figure explains the 4G LTE packet core network architecture.
Figure 2: 4G LTE Packet Core Network Architecture
Gateways The Serving Gateway (SGW) routes and forwards user data packets, while also acting as the
mobility anchor for the user plane, and is the anchor for mobility between LTE and other 3GPP
technologies. The Packet Data Network (PDN) Gateway (PGW) provides connectivity from the
User Equipment (UE) to external packet data networks by being the point of exit and entry of
traffic for the UE.
A UE may have simultaneous connectivity with more than one PGW for accessing multiple
PDNs. The PGW performs policy enforcement, packet filtering for each user, charging support,
lawful interception, and packet screening. Another key role of the PGW is to act as the anchor
for mobility between 3GPP and non-3GPP technologies such as WiMAX and 3GPP2 (CDMA
1X and EvDO).
The System Architecture Evolution GW (SAE GW) is the entity that covers the PGW and SGW
functionality in the Evolved Packet Core (EPC).
RNC The Radio Network Controller (RNC) is responsible for controlling the Radio Access Network
(RAN) that are connected to it. The RNC carries out radio resource management and some of
the mobility management functions and is the point where encryption is done before user data is
sent to and from the mobile. The RNC connects to the Circuit-Switched Core Network through
the Media Gateway (MGW).
For instructions on setting up the GPS antenna, see the Cisco 4G Indoor/Outdoor Active GPS Antenna
(GPS-ACT-ANTM-SMA) document.
Note Microsoft Streets & Trips is a licensed software that you can download from the Microsoft website.
To connect a Cisco LTE/5G through IP to a PC running Microsoft Streets & Trips, perform the following
steps:
1. Connect the PC to the router using an Ethernet cable.
2. Ensure that the PC and router can ping.
3. Launch the serial port redirector on the PC.
4. Create a virtual serial port that connects to the NMEA port on the router.
5. Launch Microsoft Streets & Trips on your PC.
6. Select the GPS Menu.
7. Click Start Tracking.
8. If you have acquired a location fix from the show cellular 0/2/0 gps command output on the router, the
current location is plotted on the graph, and a reddish brown dotted cursor with a circle around it is seen
on the map.
Note If you have not acquired a location fix, the Microsoft application times out and disconnects.
If the active SIM card loses connectivity to the network a failover to the alternative SIM card slot occurs.
By default the failover timer is two minutes. The failover timer can be set from 1 to 7 minutes.
controller cellular 0/2/0
lte failovertimer <3-7>
You can also manually switch the SIM slot via the command line interface.
cellular 0/2/0 lte sim activate slot <0-1>
Auto SIM
The Auto SIM feature detects the SIM and loads the corresponding firmware. For example, if a Verizon SIM
is detected, the modem loads the Verizon firmware. If you switch the SIM to an ATT SIM, the modem will
load ATT firmware.
When Auto-SIM is enabled, it is said to be in Auto-SIM mode and when disabled, it is known as Manual
mode. In Auto-SIM mode, the modem selects the right carrier firmware from the list of firmware's available.
When in manual mode, you can select the firmware manually. Modem resets every time you make a config
change from Auto-SIM enabled to disabled or vice-versa.
Procedure
Firmware Activation
Note • To check the carrier firmwares that are available to be switched to, use the show cellular
slots/sub-slots/interface firmware command.
• To manually switch the carrier firmware, disable the auto SIM.
• For P-5GS6-GL (FN980), use cellular slots/sub-slots/interface lte mno-activate <1-10>|auto command.
Procedure
Caution It is very important to use the correct PIN after it is configured. The SIM card will be blocked if the wrong
PIN is entered three consecutive times on a locked SIM during authentication or when trying to unlock a
locked SIM. You can unblock a blocked SIM card using the PUK code. Contact your service provider for the
PUK code. Use the cellular <slot> lte sim unblock <PUK code> <new PIN code> command to unblock the
SIM.
Procedure
Note
SIM should be in locked state when the PIN is
being changed.
Procedure
Procedure
Note After the scrambled PIN has been obtained and used in SIM authentication, the username created can be
deleted from the Cisco IOS configuration. A SIM should be locked for SIM authentication to work.
Procedure
Router(config)# service
password-encryption
Step 3 do show run | i name Shows the username configuration line with the
encrypted level 7 PIN for the username created
Example:
in Step 3 (user “SIM” in the example shown).
Router(config)# do show run | i SIM Copy the scrambled password for use in Step 6
(as the PIN).
Step 4 username privilege 0 password pin Enters the cellular controller configuration
mode.
Example:
Router(config)# controller cellular 0/0/0
Step 5 lte sim authenticate 7pin ORlte sim Authenticates the SIM CHV1 code by using the
authenticate 7 pin slot {0 | 1} encrypted keyword 7 and the scrambled PIN
from Step 4. ThePIN is sent to the modem for
Example:
authentication with each subsequent LTE
Router(config-controller)# lte sim connection. If authentication passes based on
authenticate 7 055A575E70
the configured PIN, the data call is allowed. If
authentication fails, the modem does not initiate
the data call.
Note
Note For the LTE/5G, the unit argument identifies the router slot, module slot, and port separated by slashes (0/2/0).
Procedure
end users must have a text-capable device, and optionally, a text plan. If end users do not have a text plan,
standard SMS rates apply to their text transmissions.
Figure 3: SMS Network
LTE/5G LEDs
The following table describes the LED behavior in LTE/5G.
LTE SIM(0) & SIM(1) Green (Solid) Modem up, SIM installed and
active
RSSI - Uses Bars for LED Four Bar High RSSI >= -69dBm
Indication
Three Bar Medium RSSI, -89dBm <> -70dBm
0 or No Bar No Service
SERVICE - Uses Color Indication Green(solid) LTE signal present (RSSI LEDs
will be Green)
Procedure
Step 2 show cellular unit radio Shows the radio signal strength.
Example: Note
The RSSI should be better than –90 dBm for
Router# show cellular 0/2/0 radio steady and reliable connection.
Step 3 show cellular unit profile Shows information about the modem data
profiles created.
Example:
Step 4 show cellular unit security Shows the security information for the modem,
such as SIM and modem lock status.
Example:
Step 5 show cellular unit all Shows consolidated information about the
modem, profiles created, radio signal strength,
Example:
network security, and so on.
Router# show cellular 0/2/0 all
EM7430 Profile 1
Follow these guidelines when you configure a data profile using EXEC mode or Config mode :
• You do not have to make any profile-related changes if your modem comes with a data profile, for
instance, AT&T, Sprint and Verizon.
• If any profile parameter changes are required for a connection type, the changes will likely be carried
out in the default profiles.
• To configure different profile types and use them for a different connection, you can create separate
profiles with different parameters (for instance, APN names). Note that only one profile is active at a
given time.
• Use the show cellular <unit> profile command to view the data profile. An asterisk(*) symbol is
displayed against the data profile. Double asterisk(**) symbol is displayed against the attach profile.
• The data profile is used to set up a data call. If you want to use a different profile, that profile needs to
be made the default one. Use the lte sim data-profile number command to change the default profile
under controller cellular 0/2/0.
Note For the LTE/5G, the unit argument identifies the router slot, module slot, and port separated by slashes (0/2/0).
Procedure
Example
Router# show cellular 0/2/0 profile
Profile 1 = INACTIVE **
--------
PDP Type = IPv4v6
Access Point Name (APN) = vzwims
Authentication = None
Profile 2 = INACTIVE
--------
PDP Type = IPv4v6
Access Point Name (APN) = vzwadmin
Authentication = None
Profile 3 = ACTIVE*
--------
PDP Type = IPv4v6
PDP address = 192.0.2.1
PDP IPV6 address = 2600:1010:B00E:1E11:192D:3E20:199B:3A70/64 Scope: Global
Access Point Name (APN) = VZWINTERNET
Authentication = None
Primary DNS address = 192.0.2.2
Secondary DNS address = 192.0.2.2
Primary DNS IPV6 address = 2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF
Secondary DNS IPV6 address = 2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF
Note If data and attach profile bindings need modification, use the controller cellular slot.
--------------------------------------------------
PDP Type = IPv4v6
Access Point Name (APN) = test
Authentication = None
Profile 2 = INACTIVE **
--------
PDP Type = IPv4
Access Point Name (APN) = internet
Authentication = PAP or CHAP
Username = user@solution.com
Password = cisco
Profile 3 = INACTIVE*
--------
PDP Type = IPv4v6
Access Point Name (APN) = basic
Authentication = None
* - Default profile
** - LTE attach profile
Configured default profile for active SIM 0 is profile 2.
Note For the LTE/5G NIM, the unit argument identifies the router slot, WIC slot, and port separated by slashes
(0/1/0).
Procedure
Configuration Examples
The following example shows how to change a default profile on LTE/5G:
The following example shows the output of the show cellular command for Verizon network service:
Profile 2 = INACTIVE
--------
PDP Type = IPv4v6
Access Point Name (APN) = vzwadmin
Authentication = None
Profile 3 = ACTIVE*
--------
PDP Type = IPv4v6
PDP address = 192.0.2.1
PDP IPV6 address = 2600:1010:B00E:1E11:192D:3E20:199B:3A70/64 Scope: Global
Access Point Name (APN) = VZWINTERNET
Authentication = None
Primary DNS address = 192.0.2.2
Secondary DNS address = 192.0.2.3
Primary DNS IPV6 address = 2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF
Secondary DNS IPV6 address = 2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF
Profile 4 = INACTIVE
--------
PDP Type = IPv4v6
Access Point Name (APN) = vzwapp
Authentication = None
Profile 5 = INACTIVE
--------
PDP Type = IPv4v6
Access Point Name (APN) = vzw800
Authentication = None
Profile 6 = INACTIVE
--------
PDP Type = IPv4v6
Access Point Name (APN) = CISCO.GW4.VZWENTP
Authentication = None
* - Default profile
** - LTE attach profile
Configuration Example
Example Configuration under Controller Cellular
** As part of this enhancement, any attach and/or data profile changes will immediately
trigger a connection reset and take effect. Below warning message will be displayed.
Procedure
Step 2 controllercellularinterface-number
Example:
Router(config)# controller cellular 0/2/0
Example
Router#show cellular 0/3/0 radio ?
band Show Radio band settings
history Show Radio history in graph format
| Output modifiers
<cr> <cr>
Router#show cell 0/3/0 radio band
LTE bands supported by modem:
- Bands 1 2 3 4 5 7 8 12 13 14 17 18 19 20 25 26 28 29 30 32 34 38 39 40 41 42 43 46 48 66
71.
LTE band Preference settings for the active sim(slot 0):
- Bands 1 2 3 4 5 7 8 12 13 14 17 18 19 20 25 26 28 29 30 32 34 38 39 40 41 42 43 46 48 66
71.
===========================================
For 3G, indices 1-64 maps to the 3G bands mentioned against each above.
Note Both PDNs share radio resources. Therefore, any throughput measurement needs to take into account the
aggregate throughput on both PDNs, instead of just one.
Note For Verizon cellular network, the second PDN uses profile #6 automatically, when the call is initiated for the
second data connection.
Configuration Examples
The following example shows how to configure multiple PDN on Cisco LTE/5G SKU:
interface Cellular0/2/0
ip address negotiated
dialer in-band
dialer idle-timeout 0
dialer-group 1
ipv6 enable
pulse-time 1
!
interface Cellular0/2/1
ip address negotiated
dialer in-band
dialer idle-timeout 0
dialer-group 1
ipv6 enable
pulse-time 1
! dialer-list 1 protocol ipv6 permit
!
The following show commands can be used to verify the status of the multiple PDN calls:
Router#sh cellular 0/2/0 profile
Profile 1 = ACTIVE* **
--------
PDP Type = IPv4v6
PDP address = 192.0.2.1
PDP IPV6 address = 2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF/64 Scope: Global
Access Point Name (APN) = broadband
Authentication = None
Primary DNS address = 192.0.2.2
Secondary DNS address = 192.0.2.3
Primary DNS IPV6 address = 2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF
Secondary DNS IPV6 address = 2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF
.
.
.
Profile 16 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = broadband
Authentication = CHAP
Username: ipv4v6
Password: xxxxxx
* - Default profile
** - LTE attach profile
Router#
Router# show ip dns view
DNS View default parameters:
DNS Resolver settings:
Domain lookup is enabled
Default domain name:
Domain search list:
Domain name-servers:
192.0.2.1
2001:4860:4860::8888
192.0.2.2
2001:DB8:0000:FFFF:FFFF:FFFF:FFFF:FFFF
192.0.2.3
8.8.8.8
DNS Server settings:
Forwarding of queries is enabled
Forwarder addresses: DNS View default parameters: DNS Resolver settings:
Domain lookup is enabled Default domain name: Domain search list: Domain name-servers:
192.0.2.1
192.0.2.2
192.0.2.3
DNS Server settings:
Forwarding of queries is enabled
Forwarder addresses:
Router#
Procedure
Procedure
Note For the LTE/5G, the unit argument identifies the router slot, module slot, and port separated by slashes (0/2/0).
Procedure
Procedure
Step 3 lte sim authenticate 0 pin Authenticates the SIM CHV1 code by using an
unencrypted (0) keyword and PIN. This PIN is
Note When obtaining the encrypted PIN for a SIM, a username and password are created by configuring password
encryption, defining the username and associated password, copying the resulting scrambled password, and
using this scrambled password in the SIM authentication command. After the scrambled PIN has been obtained
and used in SIM authentication, the username created can be deleted from the Cisco IOS configuration.
Note A SIM should be locked for SIM authentication to work. To verify the SIM’s status, use the show cellular
<unit> security command.
Note For the 4G LTE SKU, the unit argument identifies the router slot, module slot, and port separated by slashes
(0/2/0).
Procedure
Router(config)# service
password-encryption
Step 3 username name privilege 0 password pin Creates username and password.
Example: • name—Specifies the username.
• pin—Specifies the four- to eight-digit PIN
Router(config)# username SIM privilege code.
0 password 1111
Step 4 do show run | i name Shows the username configuration line with the
encrypted level 7 PIN for the username created
Example:
in Step 3 (user “SIM” in the example shown).
Router(config)# do show run | i SIM Copy the scrambled password for use in Step 6
(as the PIN).
Step 6 lte sim authenticate {0 | 7} pin Authenticates the SIM CHV1 code by using the
encrypted keyword 7 and the scrambled PIN
from Step 4. The PIN is sent to the modem for
authentication with each subsequent LTE
connection. If authentication passes based on
the configured PIN, the data call is allowed. If
authentication fails, the modem does not initiate
the data call.
Router(config-controller)# exit
Router(config)# no service
password-encryption
Procedure
Step 3 lte sim data-profile number attach-profile Applies the configured profile number to the
number SIM and its slot number. The default (primary)
slot is 0.
The attach profile is the profile used by the
modem to attach to the LTE network.
The data profile is the profile used to send and
receive data over the cellular network.
Procedure
Step 4 dialer in-band Enables DDR and configures the specified serial
interface to use in-band dialing.
Example:
Step 5 dialer-group group-number Specifies the number of the dialer access group
to which the specific interface belongs.
Example:
Router(config-if)# dialer-group 1
Router(config-if)# exit
Step 7 ip route network-number network-mask Establishes a floating static route with the
{ip-address | interface} [administrative configured administrative distance through the
distance] [name name] specified interface.
Example: Note
A higher administrative distance should be
Router(config)# ip route 209.165.200.225 configured for the route through the backup
255.255.255.224 cellular 0/2/0 interface so that it is used only when the
primary interface is down.
Step 8 dialer-list dialer-group protocol protocol-name Creates a dialer list for traffic of interest and
{permit | deny | list access-list-number | permits access to an entire protocol.
access-group}
Example:
Configuring DDR
To configure DDR for the cellular interface, enter the following commands starting in EXEC mode.
Note For the LTE/5G, the unit argument identifies the router slot, module slot, and port separated by slashes (0/2/0).
Procedure
Step 6 dialer idle-timeout seconds Specifies the duration of idle time, in seconds,
after which a line has no outbound traffic. “0”
Example:
second means no idle timeout. The default idle
timeout is 120 seconds if there is no idle timer
Router(config-if)# dialer idle-timeout
30 specified.
Step 7 dialer-group group-number Specifies the number of the dialer access group
to which the specific interface belongs.
Example:
Router(config-if)# dialer-group 1
Router(config-if)# exit
Step 9 dialer-list dialer-group protocol protocol-name Creates a dialer list for traffic of interest and
{permit | deny | list access-list-number | permits access to an entire protocol.
access-group}
Note For the LTE/5G, the unit argument identifies the router slot, module slot, and the port, and is separated by
slashes (0/2/0).
Procedure
Step 3 lte gps enable (Optional) GPS is enabled by default. Use this
command to enable the GPS feature if GPS has
Example:
been disabled for any reason.
Router(config-controller)# lte gps enable
Step 4 lte gps mode standalone Enables the standalone GPS mode.
Example:
Router(config-controller)# lte gps mode
standalone
or
Router(config-controller)# lte gps nmea
Step 6 test cellular unit modem-power-cycle GPS can take effect only after modem power
cycle.
Example:
Router# test cellular 0/2/0
modem-power-cycle
Step 8 show cellular unit gps Displays a summary of the following GPS data:
Example: • GPS state information (GPS disabled, GPS
Router# show cellular 0/2/0 gps acquiring, GPS enabled)
• GPS mode configured (standalone)
GPS Info
------------- • GPS location and timestamp information
GPS Feature: enabled • GPS satellite information
GPS Mode Configured: standalone • GPS feature (enabled or disabled)
GPS Port Selected: Dedicated GPS port
GPS Status: GPS coordinates acquired • GPS port selected (Dedicated GPS and
Last Location Fix Error: Offline [0x0] GPS port with voltage-no-bias)
Latitude: 38 Deg 11 Min 22.1939 Sec North
Longitude: 96 Deg 40 Min 48.7066 Sec West
Timestamp (GMT): Thu Jun 29 07:13:42 2017
Step 9 show cellular unit gps detail Displays detailed GPS data.
Example:
Router# show cellular 0 gps detail
GPS Info
-------------
GPS Feature: enabled
GPS Mode Configured: standalone
Satellite Info
----------------
Satellite #3, elevation 0, azimuth 0,
SNR 53
.
.
.
Satellite #9, elevation 0, azimuth 0,
SNR 0
Router#
Note For the LTE/5G, the unit argument identifies the router slot, module slot, and the port, and is separated by
slashes (0/2/0).
Procedure
Step 3 lte sms archive path FTP-URL Specifies an FTP server folder path to send all
the incoming and outgoing SMS messages.
Example:
After the folder path is identified, it is appended
Router(config-controller)# lte sms automatically with outbox and inbox folders for
archive path
ftp://username:password@172.25.211.175/SMS-LTE the path to which SMS messages are sent and
received, for example:
ftp://172.25.211.175/SMS-LTE/outbox
ftp://172.25.211.175/SMS-LTE/inbox
Step 4 cellular unit lte sms view { all | ID | summary Displays the message contents of incoming texts
} received by a modem.
Step 6 show cellular unit sms Displays all the information in the text messages
sent and received. Message information includes
Example:
text messages sent successfully, received,
Router# show cellular 0/2/0 sms archived, and messages pending to be sent.
Incoming Message Information
---------------------------- LTE-specific information on errors in case of
SMS stored in modem = 20 a FAILED attempt may also be displayed.
SMS archived since booting up = 0
Total SMS deleted since booting up = 0
Storage records allocated = 25
Storage records used = 20
Number of callbacks triggered by SMS =
0
Number of successful archive since
booting up = 0
Number of failed archive since booting
up = 0
Step 7 cellular unit lte sms send number Enables a user to send a LTE/5G band SMS
message to other valid recipients, provided they
Example:
have a text message plan. The number argument
Step 8 cellular unit lte sms delete [ all | id ] (Optional) Deletes one message ID or all of the
stored messages from memory.
Example:
Router# cellular 0/2/0 lte sms delete [
all | id ]
Procedure
Step 3 lte modem dm-log {autoshop {link-down | Configures DM logging for LTE modem.
timer time} | enable | filesize size | filter}
• autostop—Automatically stops DM log
bootflash:file | flash:file} rotation | size
capturing based on:
log-size}
link-down—cellular interface link down
Example:
event
Router(config-controller)# lte modem timertimer—amount of time in minutes
dm-log enable
• enable—Starts DM log capturing.
Note
If the DM log filter file is not specified,
the generic filter file, which comes with
the router will be used.
Note
The DM log filter file needs to be in .sqf
format.
Router(config-controller)# end
Step 5 show cellular unit logs dm-log (Optional) Displays DM log configuration and
statistics.
Example:
Example
The following example shows how to:
• Specifies the maximum size of all DM log files that can be stored in bootflash or flash to 512 MB
• Specifies the maximum size of each DM log file to 32 MB
• Uses MC7xxx_GPS_Log.sqf DM log filter in the flash
• Enable rotation
• Enables DM log capturing
The following example shows how to specify the filter file for LTE:
Router(config-controller)# controller cell 0/2/0
Router(config-controller)# lte modem dm-log filter flash:MC7xxx_GPS_Log.sqf
The following example shows how to enable DM log rotation for LTE:
Router(config-controller)# controller cell 0/2/0
Router(config-controller)# lte modem dm-log rotation
The following example shows how to specify the maximum log size for LTE:
Router(config-controller)# controller cell 0/2/0
Router(config-controller)# lte modem dm-log enable
The following example shows how to enable DM log rotation for LTE:
Router(config-controller)# controller cell 0/2/0
Router(config-controller)# end
The following example shows how to specify the maximum log size for LTE:
Router(config-controller)# controller cell 0/2/0
Router(config-controller)# lte modem dm-log size 1024
The following example shows how to enable DM log rotation for LTE:
Router(config-controller)# controller cell 0/2/0
Router(config-controller)# end
The following example shows what was configured on the router for DM log feature:
Router#show running-config | section controller
controller Cellular 0/2/0
lte modem dm-log filter flash:MC7xxx_GPS_Log.sqf
lte modem dm-log size 512
lte modem dm-log filesize 32
lte modem dm-log rotation
lte modem dm-log enable
lte modem dm-log size 1024
Directory of bootflash:/
Note The integrated modem crashdump collection feature is supported only on 3G HSPA and LTE/5G based SKUs.
Note After the modem firmware crashes, the modem is available for crashdump log collection only. Data calls
cannot be made.
Procedure
Note The modem log error and dump collection feature is supported only on 3G SKUs.
Procedure
Step 2 test cellular unit modem-error-clear (Optional) Clears out the error and dump
registers. By default, error and dump registers
Example:
are not cleared out after a read. This command
changes the operation so that registers are
Router# test cellular 0/2/0
modem-error-clear cleared once they are read. As a result, the AT
command strings are changed to “at!errclr=–1”
for CDMA and “at!err=0” for GSM modems.
show version
Router#show version
Cisco IOS XE Software, Version BLD_V166_THROTTLE_LATEST_20170622_080605_V16_6_0_237
Cisco IOS Software [Everest], ISR Software (ARMV8EB_LINUX_IOSD-UNIVERSALK9_IAS-M),
Experimental Version 16.6.20170622:072729
[v166_throttle-/scratch/mcpre/BLD-BLD_V166_THROTTLE_LATEST_20170622_080605 108]
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Thu 22-Jun-17 03:39 by mcpre
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
--------------------------------------------------------------------------------
Suite Suite Current Type Suite Next reboot
--------------------------------------------------------------------------------
-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
show platform
show interfaces
Note This feature does not automatically select the next best carrier network or initiate a SIM switchover based on
the RSSI, RSRQ, RSRP values. It only focuses on reloading the modem to resolve potential connectivity
problems.
To configure and enable the monitoring parameters for link recovery, perform the lte modem link-recovery
rssi onset-threshold command for RSSI, lte modem link-recovery rsrp onset-threshold for RSRP and lte
modem link-recovery rsrq onset-threshold for RSRQ.
To disable the link recovery feature, use:
{ lte } modem link-recovery disable | no lte | modem link-recovery disable }
Note The link-recovery feature enables the RSRP (Reference Signal Received Power) and RSRQ (Reference Signal
Received Quality) parameters on cellular modems from Cisco IOS XE Dublin 17.11.1a onwards.
To enable or disable the cellular modem link recovery feature (if required) perform the following steps:
Procedure
Step 3 For LTE modems, RSSI, RSRP (Reference Enables or disables the cellular modem link
Signal Received Power) and RSRQ (Reference recovery feature (the cellular modem link
Signal Received Quality) are recommended recovery feature is disabled by default).
indicators of signal quality. Perform the lte
Further enables the RSSI, RSRQ and RSRP
modem link-recovery rssi onset-threshold
parameters recommended for the link-recovery
command for RSSI, lte modem link-recovery
feature.
rsrp onset-threshold for RSRP and lte modem
link-recovery rsrq onset-threshold for RSRQ. Once we enable link-recovery, the default Cisco
To disable the link recovery feature, use: {lte} recommended values for link-recovery
modem link-recovery disable | no lte | modem parameters are populated.
link-recoverydisable}
We can change the values of link recovery
Example: parameters from the default Cisco recommended
Router(config-controller)# lte modem values, by using CLI for each parameter like in
link-recovery disable example.
Router(config-controller)# no lte modem
link-recovery disable Note
Router(config)# end
Parameter Description
rssi onset-threshold This parameter defines the RSSI value below which
the link recovery feature triggers additional scrutiny
to look for potential issues and take action if needed.
The range of this parameter can be set from -90 dBm
to -125 dBm. The recommended and default value is
-110 dBm.
Registration check is ON
RSSI threshold value is -110 dBm
Monitor Timer value is 20 seconds
Wait Timer value is 10 seconds
Debounce Count value is 6
When the cellular modem link recovery occurs and modem is power cycled, you can see the
%CELLWAN-2-MODEM_DOWN message on the console logs and additionally there is a
%CELLWAN-2-LINK_RECOVERY message which indicates that action has been taken by the cellular
modem link recovery feature.
Whenever the cellular modem link recovery has occurred, it updates the Modem timeouts counter under the
Modem Management Statistics section of the show controller cellular unit command output. Modem parameters
at the last timeout section has information that helps to identify the cause of the issue that triggered link
recovery
In the following example log, the messages, modem time out counter, and modem parameters at the last time
out are highlighted.
*Jul 19 17:15:18.980 PDT: %CELLWAN-2-LINK_RECOVERY: Cellular0/1/0: Cellular Modem has
been power cycled
Router#show controller Cellular 0/2/0
Interface Cellular0/2/0
LTE Module - Multimode LTE/DC-HSPA+/HSPA+/HSPA/UMTS/EDGE/GPRS unit 2
interface GigabitEthernet0/0/1
ip address 192.0.2.1 255.255.255.0
ip nat outside
negotiation auto
!
interface Cellular0/2/0
ip address negotiated
ip nat outside
dialer in-band
dialer idle-timeout 0
dialer watch-group 1
dialer-group 1
pulse-time 1
!
interface Cellular0/2/1
no ip address
shutdown
dialer in-band
pulse-time 1
!
!
interface Vlan1
no ip address
!
no ip nat service dns tcp
no ip nat service dns udp
ip nat inside source list 1 interface Cellular0/2/0 overload
ip forward-protocol nd
ip http server
no ip http secure-server
ip http max-connections 16
ip tftp source-interface GigabitEthernet0/0/1
ip dns server
ip route 192.0.2.2 192.0.2.3 Cellular0/2/0
ip route 223.255.254.0 255.255.255.0 1.3.0.1
!
!
access-list 1 permit 192.0.2.5 255.255.255.255
dialer watch-list 1 ip 192.0.2.6 255.255.255.255
dialer-list 1 protocol ip permit
!
snmp-server community public RO
snmp-server community private RW
snmp-server community lab RW
snmp-server host 192.0.2.1 public
snmp-server manager
control-plane
!
!
line con 0
exec-timeout 0 0
stopbits 1
line aux 0
exec-timeout 0 0
stopbits 1
line vty 0 4
login
transport input all
!
!
end
Router#ping 192.0.2.2
Type escape sequence to abort.
RouterSending 5, 100-byte ICMP Echos to 192.0.2.2, timeout is 2 seconds
.
.
.
Router#show cell 0/2/0
Profile 1, Packet Session Status = INACTIVE
Profile 2, Packet Session Status = INACTIVE
Profile 3, Packet Session Status = INACTIVE
Router Call end mode = 3GPP
Router Session disconnect reason type = 3GPP specification defined(6)
Session disconnect reason = Option unsubscribed(33)
Enforcing cellular interface back-off
Period of back-off = 1 minute(s)
Profile 4, Packet Session Status = INACTIVE
...
Profile 16, Packet Session Status = INACTIVE
Router#
Router#show cell 0/2/0 cn
Sending 5, 100-byte ICMP Echos to 192.0.2.2, timeout is 2 seconds:
Router.....
Success rate is 0 percent (0/5)
Router#
Router#ping 192.0.2.5
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.0.2.5, timeout is 2 seconds:
Router.....
Success rate is 0 percent (0/5)
Router#show cell 0/2/0 cping 192.0.2.6 Type escape sequence to abort.
RouterSending 5, 100-byte ICMP Echos to 192.0.2.6 , timeout is 2 seconds:
Router.....
RouterSuccess rate is 0 percent (0/5)
Router#ping 192.0.2.6
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.0.2.6 , timeout is 2 seconds:
.....
Success rate is 0 percent (0/5)
Router#ping 192.0.2.6
Router#sh cell 0/2/0 c
Profile 1, Packet Session Status = INACTIVE
Profile 2, Packet Session Status = INACTIVE
Profile 3, Packet Session Status = INACTIVE
RouterCall end mode = 3GPP
RouterSession disconnect reason type = 3GPP specification defined(6)
RouterSession disconnect reason = Option unsubscribed(33)
RouterEnforcing cellular interface back-off
Note The GRE tunnel configuration is supported only if the service providers provide a public IP address on the
LTE interface.
Note For service providers using a private IP address, the point-to-point static GRE tunnel cannot be set up with a
private IP address at one end and a public IP address on the other end.
interface Tunnel2
ip unnumbered <internal LAN interface GE0/0 etc.>
tunnel source Cellular0/2/0
tunnel destination a.b.c.d
interface Cellular0/2/0
ip address negotiated
no ip mroute-cache
dialer in-band
dialer-group 1
encr 3des
authentication pre-share
crypto isakmp key address a.b.c.d
!
!
crypto ipsec transform-set ah-sha-hmac esp-3des
!
crypto map gsm1 10 ipsec-isakmp
set peer a.b.c.d
set transform-set
match address 103
!
interface ATM0/2/0
no ip address
ip virtual-reassembly
load-interval 30
no atm ilmi-keepalive
dsl operating-mode auto
!
interface ATM0/2/0.1 point-to-point
backup interface Cellular0/2/0
ip address negotiated
ip mtu 1492
ip nat outside
ip virtual-reassembly
encapsulation ppp
load-interval 30
dialer pool 2
dialer-group 2
ppp authentication chap callin
ppp chap hostname cisco@dsl.com
ppp chap password 0 cisco
ppp ipcp dns request
crypto map gsm1
ip nat outside
ip virtual-reassembly
no snmp trap link-status
pvc 0/35
pppoe-client dial-pool-number 2
!
!
interface Cellular0/2/0
ip address negotiated
ip nat outside
ip virtual-reassembly
no ip mroute-cache
dialer in-band
dialer idle-timeout 0
dialer-group 1
crypto map gsm1
!
interface Vlan1
description used as default gateway address for DHCP clients
ip address 10.4.0.254 255.255.0.0
ip nat inside
ip virtual-reassembly
!
ip local policy route-map track-primary-if
ip route 0.0.0.0 0.0.0.0 Dialer2 track 234
ip route 0.0.0.0 0.0.0.0 Cellular0/3/0 254
!
!
ip nat inside source route-map nat2cell interface Cellular0/2/0 overload
SNMP MIBs
Note It is recommended that you configure SNMP V3 with authentication/privacy when implementing SNMP SET
operation.
The following Simple Management Network Protocol (SNMP) MIBs are supported on Cisco LTE/5G:
• IF-MIB
• ENTITY-MIB
• CISCO-WAN-3G-MIB
• CISCO-WAN-CELL-EXT-MIB
For the CISCO-WAN-3G-MIB, the following tables and sub-tables are supported for 3G and LTE technologies:
• ciscoWan3gMIB(661)
• ciscoWan3gMIBNotifs(0)
• ciscoWan3gMIBObjects(1)
• c3gWanCommonTable(1)
• c3gWanGsm(3)
• c3gGsmIdentityTable(1)
• c3gGsmNetworkTable(2)
• c3gGsmPdpProfile(3)
• c3gGsmPdpProfileTable(1)
• c3gGsmPacketSessionTable(2)
• c3gGsmRadio(4)
• c3gGsmRadioTable(1)
• c3gGsmSecurity(5)
• c3gGsmSecurityTable(1)
For the CISCO-WAN-CELL-EXT-MIB, the following tables and sub-tables are supported for LTE technology
only:
• ciscoWanCellExtMIB(817)
• ciscoWanCellExtMIBNotifs(0)
• ciscoWanCellExtMIBObjects(1)
• ciscoWanCellExtLte(1)
• cwceLteRadio(1)
• cwceLteProfile(2)
You can download the MIBs from the Cisco MIB Locator at http://www.cisco.com/go/mibs.
The following example describes how to configure SNMP capability on the router:
snmp-server group neomobilityTeam v3 auth notify 3gView
snmp-server view 3gView ciscoWan3gMIB included
snmp-server community neomobility-test RW snmp-server community public RW
snmp-server enable traps c3g
snmp server enable traps LTE
snmp-server host 172.19.153.53 neomobility c3g snmp-server host 172.19.152.77 public c3g
snmp-server host 172.19.152.77 public udp-port 6059
The following example describes how to configure an external host device to communicate with the router
through SNMP:
Troubleshooting
This section provides the essential information and resources available for troubleshooting the Cisco LTE/5G
feature.
Procedure
Profile Information
====================
Profile 1 = ACTIVE* **
--------
PDP Type = IPv4v6
PDP address = 29.29.29.196
PDP IPV6 address = 2001:2678:2680:5FD7:DDE7:70E1:DC07:CCB7/64 Scope: Global
Access Point Name (APN) = broadband
Authentication = None
Primary DNS address = 8.0.0.8
Secondary DNS address = 8.8.4.4
Primary DNS IPV6 address = 2001:4860:4860:0:0:0:0:8888
Secondary DNS IPV6 address = 2001:4860:4860:0:0:0:0:8844
Profile 2 = ACTIVE
--------
PDP Type = IPv4v6
PDP address = 21.21.21.206
PDP IPV6 address = 2001:567A:567A:1480:5DD6:18D1:BD63:49DA/64 Scope: Global
Access Point Name (APN) = basic
Authentication = None
Primary DNS address = 171.70.168.183
Secondary DNS address = 8.8.8.8
Primary DNS IPV6 address = 2001:4860:4860:0:0:0:0:8888
Secondary DNS IPV6 address = 2001:4860:4860:0:0:0:0:8844
Profile 3 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = mpdn
Authentication = None
Profile 4 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = broadband
Authentication = None
Profile 5 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = cisco.gw4.vzwentp
Authentication = None
Profile 6 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = mobility-de1
Authentication = None
Profile 7 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = mobility-de2
Authentication = None
Profile 8 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = broadband
Authentication = None
Profile 9 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = mpdndt-qos
Authentication = None
Profile 10 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = mobility-de2
Authentication = None
Profile 11 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = broadband
Authentication = None
Profile 12 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = wfqos
Authentication = CHAP
Username: ipv4v6
Password:
Profile 13 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = broadband
Authentication = CHAP
Username: ipv4v6
Password:
Profile 14 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = mobility-de2
Authentication = CHAP
Username: ipv4v6
Password:
Profile 15 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = aaaauth
Authentication = CHAP
Username: ipv4v6
Password:
Profile 16 = INACTIVE
--------
PDP Type = IPv4
Access Point Name (APN) = broadband
Authentication = CHAP
Username: ipv4v6
Password:
* - Default profile
** - LTE attach profile
Network Information
===================
Current System Time = Tue Jan 8 23:24:22 1980
--More--
*Jun 19 06:13:14.665: %IOSXE_OIR-6-INSSPA: SPA inserted in sCurrent Service Status = Normal
Current Service = Packet switched
Current Roaming Status = Roaming
Network Selection Mode = Automatic
Network = 123 456
Mobile Country Code (MCC) = 123
Mobile Network Code (MNC) = 456
Packet switch domain(PS) state = Attached
LTE Carrier Aggregation state = Deconfigured
Registration state(EMM) = Registered
EMM Sub State = Normal Service
Tracking Area Code (TAC) = 1801
Cell ID = 768001
Network MTU is not Available
Radio Information
=================
Radio power mode = online
LTE Rx Channel Number = 2000
LTE Tx Channel Number = 20000
LTE Band = 4
LTE Bandwidth = 10 MHz
Current RSSI = -71 dBm
Current RSRP = -95 dBm
Current RSRQ = -7 dB
Current SNR = 26.4 dB
Physical Cell Id = 12
Number of nearby cells = 1
Idx PCI (Physical Cell Id)
--------------------------------
1 12
Radio Access Technology(RAT) Preference = LTE
Radio Access Technology(RAT) Selected = LTE
GPS Information
==========================
GPS Info
-------------
GPS Feature: enabled
GPS Mode Configured: not configured
GPS Status: NMEA Disabled
SMS Information
===============
Incoming Message Information
----------------------------
SMS stored in modem = 0
SMS archived since booting up = 0
Total SMS deleted since booting up = 0
Storage records allocated = 25
Storage records used = 0
Number of callbacks triggered by SMS = 0
Number of successful archive since booting up = 0
Number of failed archive since booting up = 0
Error Information
=================
debug dialer
debug cellular 0/2/0 messages callcontrol
Modem Settings for North America and Carriers Operating on 700 MHz Band
For LTE-EA deployments in North America and for carriers operating in the 700 MHz band, the following
changes to the modem settings are required to prevent long network attach times.
The output of show cellular x/x/x all command shows the following:
• Current RSSI is –125 dBM
• LTE Technology Preference = No preference specified (AUTO)
The following sections explain useful commands for changing modem settings:
Hardware Information
====================
Electronic Serial Number (ESN) = 0x603c9854 [09603971156]
Electronic Serial Number (ESN) = <specific ESN in hexadecimal> [specific ESN in decimal]
Additional References
Related Documents
http://www.cisco.com/c/en/us/td/docs/routers/access/interfaces/NIM/hardware/installation/guide/4GLTEN
http://www.cisco.com/en/US/docs/routers/access/wireless/hardware/notes/antcm4gin.html
• Cisco Outdoor Omnidirectional Antenna for 2G/3G/4G Cellular (ANT-4G-OMNI-OUT-N)
http://www.cisco.com/en/US/docs/routers/connectedgrid/antennas/installing/Outdoor_Omni_for_2G_3G_
• Cisco Integrated 4G Low-Profile Outdoor Saucer Antenna (ANT-4G-SR-OUT-TNC)
http://www.cisco.com/en/US/docs/routers/connectedgrid/antennas/installing/4G_LowProfile_Outdoor_Sa
• Cisco Single-Port Antenna Stand for Multiband TNC Male-Terminated Portable Antenna (Cisco 4G-
http://www.cisco.com/en/US/docs/routers/access/wireless/hardware/notes/4Gantex15-10r.html
• Cisco 4G Lightning Arrestor (4G-ACC-OUT-LA)
http://www.cisco.com/en/US/docs/routers/access/wireless/hardware/notes/4Glar.html
• Lightning Arrestor for the Cisco 1240 Connected Grid Router
http://www.cisco.com/en/US/docs/routers/connectedgrid/lightning_arrestor/Lightning_Arrestor_for_the_C
Cisco 4G Indoor/Outdoor Active GPS Antenna (GPS-ACT-ANTM-SMA)
http://www.cisco.com/c/en/us/products/routers/4000-series-integrated-services-routers-isr/datasheet-listing.h
• LTE datasheet
http://www.cisco.com/en/US/docs/routers/access/wireless/hardware/notes/4Gantex15-10r.html
http://www.cisco.com/c/en/us/td/docs/routers/access/4400/roadmap/isr4400roadmap.html
MIBs
RFCs
RFC Title
Technical Assistance
Description Link
Configuring VLANs
A VLAN is a switched network that is logically segmented by function, project team, or application, without
regard to the physical locations of the users. VLANs have the same attributes as physical LANs, but you can
group end stations even if they are not physically located on the same LAN segment. Any switch port can
belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only to end
stations in the VLAN. Each VLAN is considered a logical network, and packets destined for stations that do
not belong to the VLAN must be forwarded through a router. A VLAN is a switched network that is logically
segmented by function, project team, or application, without regard to the physical locations of the users.
VLANs have the same attributes as physical LANs, but you can group end stations even if they are not
physically located on the same LAN segment. Any switch port can belong to a VLAN, and unicast, broadcast,
and multicast packets are forwarded and flooded only to end stations in the VLAN. Each VLAN is considered
a logical network, and packets destined for stations that do not belong to the VLAN must be forwarded through
a router.
Note From Cisco IOS XE Release 17.1 through 17.10, the internal VLAN IDs from 2350 – 2449 are configurable.
From Cisco IOS XE Release 17.11.1a, the internal VLAN IDs from 2350 to 2449 are configurable, except
those dynamically allocated after the port is switched to L3.
Configuring VTP
VTP is a Layer 2 messaging protocol that maintains VLAN configuration consistency by managing the
addition, deletion, and renaming of VLANs on a network-wide basis. VTP minimizes misconfigurations and
configuration inconsistencies that can cause several problems, such as duplicate VLAN names, incorrect
VLAN-type specifications, and security violations.
Before you create VLANs, you must decide whether to use VTP in your network. Using VTP, you can make
configuration changes centrally on one or more switches and have those changes automatically communicated
to all the other switches in the network. Without VTP, you cannot send information about VLANs to other
switches.VTP is designed to work in an environment where updates are made on a single switch and are sent
through VTP to other switches in the domain. It does not work well in a situation where multiple updates to
the VLAN database occur simultaneously on switches in the same domain, which would result in an
inconsistency in the VLAN database.
You should understand the following concepts for configuring VTP.
• VTP domain: A VTP domain (also called a VLAN management domain) consists of one switch or several
interconnected switches or switch stacks under the same administrative responsibility sharing the same
VTP domain name. A switch can be in only one VTP domain. You make global VLAN configuration
changes for the domain.
• VTP server: In VTP server mode, you can create, modify, and delete VLANs, and specify other
configuration parameters (such as the VTP version) for the entire VTP domain. VTP Version 3 should
be configured on each switch manually including the VTP server and client. VTP servers advertise their
VLAN configurations to other switches in the same VTP domain and synchronize their VLAN
configurations with other switches based on advertisements received over trunk links.VTP server is the
default mode.
• VTP client: A VTP client behaves like a VTP server and transmits and receives VTP updates on its
trunks, but you cannot create, change, or delete VLANs on a VTP client. VLANs are configured on
another switch in the domain that is in server mode.
• VTP transparent: VTP transparent switches do not participate in VTP. A VTP transparent switch does
not advertise its VLAN configuration and does not synchronize its VLAN configuration based on received
advertisements. However, in VTP version 2 or version 3, transparent switches do forward VTP
advertisements that they receive from other switches through their trunk interfaces. You can create,
modify, and delete VLANs on a switch in VTP transparent mode.
• VTP pruning is not supported.
The following example shows how to configure the switch as a VTP client:
Router# configure terminal
Router(config)# vtp domain Lab_Network
Router(config)# vtp mode client
Router(config)# exit
The following example shows how to configure the switch as VTP transparent:
Router# configure terminal
Router(config)# vtp mode transparent
Router(config)# exit
• Authenticator—Router that controls the physical access to the network based on the authentication status
of the supplicant. The router acts as an intermediary between the supplicant and the authentication server,
requesting identity information from the supplicant, verifying that information with the authentication
server, and relaying a response to the supplicant. The router includes the RADIUS client, which is
responsible for encapsulating and decapsulating the EAP frames and interacting with the authentication
server.
For detailed information on how to configure 802.1x port-based authentication, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-mt/
sec-user-8021x-15-mt-book/config-ieee-802x-pba.html
Example: Enabling IEEE 802.1x and AAA on a Switch Port
This example shows how to configure Cisco 1100 series router as 802.1x authenticator:
Router> enable
Router# configure terminal
Router(config)# dot1x system-auth-control
Router(config)# aaa new-model
Router(config)# aaa authentication dot1x default group radius
Router(config)# interface gigabitethernet 0/1/0
Router(config-if)# switchport mode access
Router(config-if)# access-session port-control auto
Router(config-if)# dot1x pae authenticator
Router(config-if)# access-session closed
Router(config-if)# access-session host-mode single-host
Router(config-if)# end
Note Cisco 1000 Series Integrated Services Routers switchport do not support the authentication timer
inactivity command. Due to this, when the MAB client behind the hub is peered, the MAB session
is not terminated for prolonged inactivity. mac-move is not supported under this condition.
Instead if you can directly connect to the endpoint or use the dot1x configuration, mac-move works
as expected.
The switch that has all of its ports as the designated role or as the backup role is the root switch. The switch
that has at least one of its ports in the designated role is called the designated switch.Spanning tree forces
redundant data paths into a standby (blocked) state. If a network segment in the spanning tree fails and a
redundant path exists, the spanning-tree algorithm recalculates the spanning-tree topology and activates the
standby path. Switches send and receive spanning-tree frames, called bridge protocol data units (BPDUs), at
regular intervals. The switches do not forward these frames but use them to construct a loop-free path. BPDUs
contain information about the sending switch and its ports, including switch and MAC addresses, switch
priority, port priority, and path cost. Spanning tree uses this information to elect the root switch and root port
for the switched network and the root port and designated port for each switched segment.
When two ports on a switch are part of a loop, the spanning-tree port priority and path cost settings control
which port is put in the forwarding state and which is put in the blocking state. The spanning-tree port priority
value represents the location of a port in the network topology and how well it is located to pass traffic. The
path cost value represents the media speed.
For detailed configuration information on STP see the following link:
http://www.cisco.com/c/en/us/td/docs/routers/access/interfaces/NIM/software/configuration/guide/4_
8PortGENIM.html#pgfId-1079138
Example: Spanning Tree Protocol Configuration
The following example shows configuring spanning-tree port priority of a Gigabit Ethernet interface.
If a loop occurs, spanning tree uses the port priority when selecting an interface to put in the forwarding
state.
Router# configure terminal
Router(config)# interface gigabitethernet 0/1/0
Router(config-if)# spanning-tree vlan 1 port-priority 64
Router(config-if)# end
The following example shows how to change the spanning-tree port cost of a Gigabit Ethernet
interface. If a loop occurs, spanning tree uses cost when selecting an interface to put in the forwarding
state.
Router#configure terminal
Router(config)# interface gigabitethernet 0/1/0
Router(config-if)# spanning-tree cost 18
Router(config-if)# end
The following example shows configuring the bridge priority of VLAN 10 to 33792:
Router# configure terminal
Router(config)# spanning-tree vlan 10 priority 33792
Router(config)# end
The following example shows configuring the hello time for VLAN 10 being configured to 7 seconds.
The hello time is the interval between the generation of configuration messages by the root switch.
Router# configure terminal
Router(config)# spanning-tree vlan 10 hello-time 7
Router(config)# end
The following example shows configuring forward delay time. The forward delay is the number of
seconds an interface waits before changing from its spanning-tree learning and listening states to the
forwarding state.
Router# configure terminal
Router(config)# spanning-tree vlan 10 forward-time 21
Router(config)# end
The following example shows configuring maximum age interval for the spanning tree. The
maximum-aging time is the number of seconds a switch waits without receiving spanning-tree
configuration messages before attempting a reconfiguration.
Router# configure terminal
Router(config)# spanning-tree vlan 20 max-age 36
Router(config)# end
The following example shows the switch being configured as the root bridge for VLAN 10, with a
network diameter of 4.
Router# configure terminal
Router(config)# spanning-tree vlan 10 root primary diameter 4
Router(config)# exit
The address table lists the destination MAC address, the associated VLAN ID, and port associated with the
address and the type (static or dynamic).
See the “Example: MAC Address Table Manipulation” for sample configurations for enabling secure MAC
address, creating a statc entry, set the maximum number of secure MAC addresses and set the aging time.
For detailed configuration information on MAC address table manipulation see the following link:
http://www.cisco.com/c/en/us/td/docs/routers/access/interfaces/software/feature/guide/geshwic_
cfg.html#wp1048223
Example: MAC Address Table Manipulation
The following example shows creating a static entry in the MAC address table.
Router# configure terminal
Router(config)# mac address-table static 0002.0003.0004 interface GigabitEthernet 0/1/0
vlan 3
Router(config)# end
The following example shows how to configure a gigabit ethernet interface as the destination for a
SPAN session:
Router# configure terminal
Router(config)# monitor session 1 destination gigabitethernet 0/1/0
Router(config)# end
The following example shows how to remove gigabit ethernet as a SPAN source for SPAN session
1:
Router# configure terminal
Router(config)# no monitor session 1 source gigabitethernet 0/1/0
Router(config)# end
Supported Platforms
From Cisco IOS XE Release 17.11.1a, the flex support on Layer 2 and Layer 3 ports is available on the Cisco
1000 Series Integrated Services Routers platform.
Procedure
Step 3 interface type number Enters configuration mode for the specified
interface on the device.
Example:
Step 5 ip address address mask Sets the IP address and subnet mask for the
specified interface.
Example:
Device(config-if)# ip address 10.10.0.1
255.255.255.0
Procedure
Step 3 interface type number Enters configuration mode for the specified
interface on the device.
Example:
Device(config-if)# interface
GigabitEthernet 0/1/6
Step 5 switchport mode {access | dynamic | trunk Configures the operational mode on a Layer 2
trunk interface.
Example:
Device(config-if)# switchport mode access
Configuration Examples
The following are examples of Layer 2 and Layer 3 port configurations.
The multicast router sends out periodic general queries to all VLANs. All hosts interested in this multicast
traffic send join requests and are added to the forwarding table entry.
Use the [no] ip igmp snooping enable command to configure IGMP Snooping on Cisco 1100
Series ISRs.
By default, IGMP snooping is globally enabled in Cisco 1100 Series ISRs.
When IGMP snooping is enabled on Cisco 1000 Series Integrated Services Routers, and there are no local
receivers for multicast traffic in the VLAN, the multicast traffic floods to all ports in the VLAN.
Configuring LACP
EtherChannel Overview
EtherChannel provides fault-tolerant high-speed links between switches, routers, and servers. You can use
the EtherChannel to increase the bandwidth between the wiring closets and the data center, and you can deploy
it anywhere in the network where bottlenecks are likely to occur. EtherChannel provides automatic recovery
for the loss of a link by redistributing the load across the remaining links. If a link fails, EtherChannel redirects
traffic from the failed link to the remaining links in the channel without intervention.
An EtherChannel consists of individual Ethernet links bundled into a single logical link.
The EtherChannel provides full-duplex bandwidth up to 4 Gb/s (Gigabit EtherChannel) between your switch
and another switch or host.
Each EtherChannel can consist of up to four compatibly configured Ethernet ports.
Note Port Channel on switchport described in this section is only supported on the C1131 series with enhanced
built-in switching hardware and capabilities. It is not supported on other Cisco 1000 Series Integrated Services
Routers. Alternatively, you can check L3 port channel on L3 physical interface.
From Cisco IOS XE Dublin 17.11.x release, up to 2 switchports can be configured on the L3 interface for the
entire Cisco 1000 Series Integrated Services Routers. For more information, see Configuring LACP (802.3ad)
for Gigabit Interfaces.
Auto-LAG
globally and is enabled on all port interfaces. The auto-LAG applies to a switch only when it is enabled
globally.
On enabling auto-LAG globally, the following scenarios are possible:
• All port interfaces participate in creation of auto EtherChannels provided the partner port interfaces have
EtherChannel configured on them. For more information, see the "The supported auto-LAG configurations
between the actor and partner devices" table below.
• Ports that are already part of manual EtherChannels cannot participate in creation of auto EtherChannels.
• When auto-LAG is disabled on a port interface that is already a part of an auto created EtherChannel,
the port interface will unbundle from the auto EtherChannel.
• The following table shows the supported auto-LAG configurations between the actor and partner devices:
Table 37: The supported auto-LAG configurations between the actor and partner devices
On disabling auto-LAG globally, all auto created Etherchannels become manual EtherChannels.
You cannot add any configurations in an existing auto created EtherChannel. To add, you should first
convert it into a manual EtherChannel by executing the port-channel <channel-number> persistent.
Procedure
Step 5 switchport access vlan vlan-id (Optional) If you configure the port as a
static-access port, assign it to only one VLAN.
Example:
The range is 1 to 4094.
Device(config-if)# switchport access vlan
22
Step 6 channel-group channel-group-number mode Assigns the port to a channel group and
{on}|{active|passive} specifies the LACP mode.
Example: For mode, select one of these keywords:
Device(config-if)# channel-group 5 mode • on —Forces the port to channel without
passive
LACP. In the on mode, an EtherChannel
exists only when a port-group in the on
mode is connected to another port group
in the on mode.
• active—Enables LACP only if a LACP
device is detected. It places the port into
an active negotiating state in which the
port starts negotiations with other ports by
sending LACP packets.
In the above table, the port-channel interface is created implicitly through the "channel-group" command. An
alternate way is to create the port-channel interface explicitly with the following steps:
Procedure
Procedure
Procedure
Procedure
Example:
For C1131
Device(config)# interface gigabitEthernet
0/1/x
Procedure
Configuring HSRP
The Hot Standby Router Protocol (HSRP) is Cisco's standard method of providing high network availability
by providing first-hop redundancy for IP hosts on an IEEE 802 LAN configured with a default gateway IP
address. HSRP routes IP traffic without relying on the availability of any single router. It enables a set of
router interfaces to work together to present the appearance of a single virtual router or default gateway to
the hosts on a LAN. When HSRP is configured on a network or segment, it provides a virtual Media Access
Control (MAC) address and an IP address that is shared among a group of configured routers. HSRP allows
two or more HSRP-configured routers to use the MAC address and IP network address of a virtual router.
The virtual router does not exist; it represents the common target for routers that are configured to provide
backup to each other. One of the routers is selected to be the active router and another to be the standby router,
which assumes control of the group MAC address and IP address should the designated active router fail.
HSRP uses a priority mechanism to determine which HSRP configured device is to be the default active
device. To configure a device as the active device, you assign it a priority that is higher than the priority of
all the other HSRP-configured devices. The default priority is 100, so if you configure just one device to have
a higher priority, that device will be the default active device. In case of ties, the primary IP addresses are
compared, and the higher IP address has priority. If you do not use the standby preempt interface configuration
command in the configuration for a router, that router will not become the active router, even if its priority is
higher than all other routers.
For more information about configuring HSRP, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-hsrp.html
Example: Configuring HSRP
In this example, Router A is configured to be the active device for group 1 and standby device for
group 2. Device B is configured as the active device for group 2 and standby device for group 1.
RouterA# configure terminal
RouterA(config)# interface vlan 2
RouterA(config-if)# ip address 10.1.0.21 255.255.0.0
RouterA(config-if)# standby 1 priority 110
RouterA(config-if)# standby 1 preempt
RouterA(config-if)# standby 1 ip 10.1.0.3
RouterA(config-if)# standby 2 priority 95
RouterA(config-if)# standby 2 preempt
RouterA(config-if)# standby 2 ip 10.1.0.4
RouterA(config-if)# end
Configuring VRRP
The Virtual Router Redundancy Protocol (VRRP) is an election protocol that dynamically assigns responsibility
for one or more virtual routers to the VRRP routers on a LAN, allowing several routers on a multiaccess link
to utilize the same virtual IP address. A VRRP router is configured to run the VRRP protocol in conjunction
with one or more other routers attached to a LAN. In a VRRP configuration, one router is elected as the
primary virtual router, with the other routers acting as backups in case the primary virtual router fails.
An important aspect of the VRRP is VRRP router priority. Priority determines the role that each VRRP router
plays and what happens if the primary virtual router fails. If a VRRP router owns the IP address of the virtual
router and the IP address of the physical interface, this router will function as a primary virtual router. Priority
also determines if a VRRP router functions as a virtual router backup and the order of ascendancy to becoming
a primary virtual router if the primary virtual router fails. You can configure the priority of each virtual router
backup using the vrrp priority command.
By default, a preemptive scheme is enabled whereby a higher priority virtual router backup that becomes
available takes over for the virtual router backup that was elected to become primary virtual router. You can
disable this preemptive scheme using the no vrrp preempt command. If preemption is disabled, the virtual
router backup that is elected to become virtual router primary remains the primary until the original primary
virtual router recovers and becomes primary again.
The primary virtual router sends VRRP advertisements to other VRRP routers in the same group. The
advertisements communicate the priority and state of the primary virtual router. The VRRP advertisements
are encapsulated in IP packets and sent to the IP Version 4 multicast address assigned to the VRRP group.
The advertisements are sent every second by default; the interval is configurable.
For more information on VRRP, see the following link:
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipapp_fhrp/configuration/15-mt/fhp-15-mt-book/fhp-vrrp.html
Group 5:
• Router B will become the primary for this group with priority 200.
• Advertising interval is 30 seconds.
• Preemption is enabled.
Note Several Cisco platforms, NIMs, and SM cards support configuring multiple-rate SFPs on same interface, e.g.,
1G SFP or 10G SFP+ on a 10G port.
In a port-channel bundle, all member interfaces should be of same speed, and duplex. It is recommended to
use duplex interfaces of the same speed as member interfaces for configuring a port-channel.
For more information about interfaces that support multiple-rate SFPs, see the corresponding datasheets.
Wait for the module to power off and then remove the module. Insert another pluggable LTE module into the
slot, which is automatically detected, powers-up, and is authenticated.
Router# hw-module subslot 0/2 stop
Proceed with stop of module? [confirm]
Router#
*Oct 26 21:50:15.498: %SPA_OIR-6-OFFLINECARD: SPA (C1111-2x1GE) offline in subslot 0/2
*Oct 26 21:50:15.499: %IOSXE_OIR-6-SOFT_STOPSPA: SPA(C1111-2x1GE) stopped in subslot 0/2,
interfaces disabled
• In EFM mode, you can configure a DSL group with any one of the lines in 2-wire non-bonding mode
or with multiple lines in bonding mode.
• Depending on the mode (ATM or EFM), the corresponding interface (ATM or EFM) is automatically
created.
Router# conf t
Router(config)# controller shdsl 0/1/0
Router(config-controller)# termination cpe
Additional References
The following sections provide references related to the power efficiency management feature.
MIBs
CISCO-ENTITY-FRU-CONTROL-MIB To locate and download MIBs for selected platforms, Cisco IOS
releases, and feature sets, use the Cisco MIB Locator at:
http://www.cisco.com/go/mibs.
Also see the "MIB Specifications Guide for the Cisco 1100 Series
Integrated Service Routers".
Technical Assistance
Description Link
Enabling Auto-Detect
When the media-type is not configured, the Auto-Detect feature is enabled by default. The Auto-Detect feature
automatically detects the media that is connected and links up. If both the media are connected, whichever
media comes up first is linked. By default, the media-type on FPGE ports is set to auto-select. User can
overwrite the media-type configuration to either RJ-45 or SFP using the media-type rj45/sfp command under
the FPGE interface. The media type configuration also falls back to “Auto-select” mode when the no
media-type command is configured. You can use the no media-type command in interface configuration
mode to enable the Auto-Detect feature.
Configuring Auto-Detect
The Auto-Detect feature is enabled by default on the Front Panel Gige Ports. Auto-Failure is enabled by
default when auto-select is enabled. To configure the Auto-Detect, perform these steps:
Procedure
Examples
The following example shows the default configuration and the show running configuration does
not show any media type when the no media-type is selected.
Router(config)# show running interface gigabitethernet 0/0/0
Building configuration...
Procedure
Step 2 interface gigabitethernet {slot | bay | port} Enters interface configuration mode.
Example:
Router(config)# interface gigabitethernet
slot/bay/port
Examples
The following example shows the primary configuration.
Router(config)# show running interface gigabitethernet 0/0/0
Building configuration...
IPv6 addresses commonly contain successive hexadecimal fields of zeros. Two colons (::) may be used to
compress successive hexadecimal fields of zeros at the beginning, middle, or end of an IPv6 address (the
colons represent successive hexadecimal fields of zeros). The table below lists compressed IPv6 address
formats.
An IPv6 address prefix, in the format ipv6-prefix/prefix-length, can be used to represent bit-wise contiguous
blocks of the entire address space. The ipv6-prefix must be in the form documented in RFC 2373 where the
address is specified in hexadecimal using 16-bit values between colons. The prefix length is a decimal value
that indicates how many of the high-order contiguous bits of the address comprise the prefix (the network
portion of the address). For example, 2001:DB8::1/64 is a valid IPv6 prefix.
Link-Lock Address
A link-local address is an IPv6 unicast address that can be automatically configured on any interface using
the link-local prefix FE80::/10 (1111 1110 10) and the interface identifier in the modified EUI-64 format. An
link-local address is automatically configured on the cellular interface when an IPv6 address is enabled.
After the data call is established, the link-local address on the celluar interface is updated with the host generated
link-local address that consists of the link-local prefix FF80::/10 (1111 1110 10) and the auto-generated
interface identifier from the USB hardware address. The figure below shows the structure of a link-local
address.
Global Address
A global IPv6 unicast address is defined by a global routing prefix, a subnet ID, and an interface ID. The
routing prefix is obtained from the PGW. The Interface Identifier is automatically generated from the USB
hardware address using the interface identifier in the modified EUI-64 format. The USB hardware address
changes after the router reloads.
Procedure
Step 6 dialer idle-timeout seonds Specifies the dialer idle timeout period.
Example:
Router(config-if)# dialer idle-timeout
0
Step 9 no peer default ip address Removes the default address from your
configuration.
Example:
Router(config-if)# no peer default ip
address
Examples
The following example shows the Cellular IPv6 configuration .
This type of condition is vendor specific. An Ethernet Operations, Administration, and Maintenance (OAM)
notification about the condition may be sent immediately.
• Prerequisites for Dying Gasp Support, on page 427
• Restrictions for Dying Gasp Support, on page 427
• Information About Dying Gasp Through SNMP, Syslog and Ethernet OAM, on page 428
• How to Configure Dying Gasp Through SNMP, Syslog and Ethernet OAM, on page 428
• Configuration Examples for Dying Gasp Through SNMP, Syslog and Ethernet OAM, on page 429
• Feature Information for Dying Gasp Support, on page 430
Note You can configure up to five different SNMP server host/port configurations.
After performing a power cycle, the following output is displayed on the router console:
Router#
System Bootstrap, Version 16.6(2r), RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1994-2017 by cisco Systems, Inc.
Current image running: Boot ROM0
Last reset cause: LocalSoft
C1111-8PLTELA platform with 4194304 Kbytes of main memory
rommon 1 >
=======================================
Dying Gasp Trap Received for the Power failure event:
-----------------------------------------------------
Trap on the Host
++++++++++++++
Router> enable
Router# configure terminal
Router(config)# snmp-server community public RW
Router(config)# exit
For more information on command syntax and examples, refer to the Cisco IOS Network Management
Command Reference.
Router> enable
Router# configure terminal
Router(config)# snmp-server host X.X.X.XXX vrf mgmt-intf version 2c public udp-port 9800
Router(config)# exit
For more information on command syntax and examples, refer to the Cisco IOS Network Management
Command Reference.
Dying Gasp Cisco IOS XE Ethernet OAM provides a mechanism for an OAM entity to convey
Release 16.6.2 failure conditions to its peer via specific flags in the OAM PDU. One
of the failure condition method to communicate is Dying Gasp, which
indicates that an unrecoverable condition has occurred; for example,
when an interface is shut down. This type of condition is vendor specific.
A notification about the condition may be sent immediately and
continuously.
Cisco Umbrella Cisco IOS XE Everest The Cisco Umbrella Integration feature enables cloud-based
Integration Release 16.6.1 security service by inspecting the DNS query that is sent to
the DNS server through Cisco 1000 Series Integrated
Services Routers (ISR). The security administrator
configures policies on the Umbrella cloud to either allow or
deny traffic towards the fully qualified domain name
(FQDN).
• A maximum of 64 local domains can be configured, and the allowed domain name length is 100 characters.
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
• Verify that the PEM import is successful. A message is displayed after importing the certificate.
exit
Note For Cisco 1000 Series ISRs, the length of the hostname and umbrella tag should not exceed 49 characters.
4. After you configure umbrella in with a tag using the umbrella in mydevice_tag command,
the Cisco 1000 Series ISR registers the tag to the Cisco Umbrella portal.
5. The Cisco 1000 Series ISR initiates the registration process by resolving api.opendns.com. You need to
have a name server (ip name-server x.x.x.x) and domain lookup (ip domain-lookup) configured on Cisco
1000 Series ISR to successfully resolve the FQDN.
Note You should configure the umbrella out command before you configure opendns in command.
Registration is successful only when the port 443 is in open state and allows the traffic to pass through the
existing firewall.
Attach the regex param-map with the umbrella global configuration as shown below:
Show Commands
Show Commands at FP Layer
Clear Command
clear platform hardware qfp active feature umbrella datapath stats
The clear platform hardware qfp active feature umbrella datapath stats command clears the Umbrella
connector statistics in datapath.
Device# clear platform hardware qfp active feature umbrella datapath stats
Umbrella Connector Stats Cleared
Depending on the OS, run either of these two commands from the client device:
• The nslookup -type=txt debug.umbrella.com command from the command prompt of the Windows
machine
• The nslookup -type=txt debug.umbrella.com command from the terminal window or shell of the Linux
machine
Non-authoritative answer:
debug.opendns.com text = "server r6.mum1"
debug.opendns.com text = "device 010A826AAABB6C3D"
debug.opendns.com text = "organization id 1892929"
debug.opendns.com text = "remoteip 172.16.0.1"
debug.opendns.com text = "flags 436 0 6040 39FF000000000000000"
debug.opendns.com text = "originid 119211936"
debug.opendns.com text = "orgid 1892929"
Configuration Examples
This example shows how to enable Cisco Umbrella Integration on Cisco 1000 Series ISRs:
Note The Cisco Prime CLI templates is supported only on Cisco Prime version 3.1 or later.
To use the Cisco Prime CLI templates to provision the Cisco Umbrella Integration deployment, perform these
steps:
Procedure
Step 1 Download the Cisco Prime templates corresponding to the Cisco IOS XE version running on your system.
Step 2 Unzip the file, if it is a zipped version.
Step 3 From Cisco Prime Web UI, choose Configuration > Templates > Features and Technologies, and then
select CLI Templates (User Defined).
Step 4 Click Import.
Step 5 Select the folder where you want to import the templates and click Select Templates and choose the templates
that you just downloaded.
Step 6 The following Cisco Umbrella Integration templates are available:
• Umbrella—Use this template to provision Umbrella Connector on Cisco 1000 Series ISR.
• Umbrella Cleanup—Use this template to remove previously configured Umbrella Connector on Cisco
1000 Series ISR.
Technical Assistance
Description Link
The Cisco Support website provides extensive online resources, including http://www.cisco.com/support
documentation and tools for troubleshooting and resolving technical issues
with Cisco products and technologies.
To receive security and technical information about your products, you can
subscribe to various services, such as the Product Alert Tool (accessed from
Field Notices), the Cisco Technical Services Newsletter, and Really Simple
Syndication (RSS) Feeds.
Access to most tools on the Cisco Support website requires a Cisco.com user
ID and password.
The WiFi card is connected to the internal switch interface, the Wlan-GigabitEthernet interface. The
configuration of this interface is identical to the GigabitEthernet 0/1/0 interface.
For Cisco 1111-8P Series of ISRs, it is always Wlan-GigabitEthernet 0/1/8; and for Cisco 1111-4P, 1116-4P,
and 1117-4P Series of ISRs, is always Wlan-GigabitEthernet 0/1/4.
Router# show run int Wlan-GigabitEthernet 0/1/4
Building configuration...
Router#
Module Managment
The router configures, manages, and controls the supported interfaces and modules using the module
management facility built in its architecture. This new centralized module management facility provides a
common way to control and monitor all the modules in the system regardless of their type and application.
Table 40: Slot Numbers for Cisco 1100 Series ISR Models
C1111-8PWB 0/2
C1111-8PLTEEAWB 0/3
C1113-8PWE 0/2
C1113-8PMWE 0/3
C1113-8PLTEEAWE 0/4
C1111-4PWE 0/2
C1116-4PLTEEAWE 0/4
C1116-4PWE 0/3
C1117-4PLTEEAWE 0/4
C1117-4PWE 0/3
C1117-4PMLTEEAWE 0/4
C1117-4PMWE 0/3
Note • The WiFi slot is 0/2, if there is no 4G-LTE Advanced capability or no DSL configured.
• The WiFi slot is 0/3, if the model has either the 4G-LTE Advanced or VDSL/ADSL funtionalities.
• The WiFi slot is 0/4, if the model has both 4G-LTE Advanced or VDSL/ADSL funtionalities
• There will be no WiFi slot on the non-WiFi SKUs.
Router#show platform
Router#
• The following example shows how to exit a session from the router, by pressing Ctrl-A followed by
Ctrl-Q on your keyboard:
type ^a^q
picocom v1.7
port is : /dev/ttyS3
flowcontrol : none
baudrate is : 9600
parity is : none
databits are : 8
escape is : C-a
local echo is : no
noinit is : no
noreset is : no
nolock is : yes
send_cmd is : sz -vv
receive_cmd is : rz -vv
imap is :
omap is :
emap is : crcrlf,delbs,
Terminal ready
Deactivating a Module
A module can be removed from the router without first being deactivated. However, we recommend that you
perform a graceful deactivation (or graceful power down) of the module before removing it. To perform a
graceful deactivation, use the hw-module subslot slot/subslot stop command in EXEC mode.
Note When you are preparing for an OIR of a module, it is not necessary to independently shut down each of the
interfaces before deactivating the module. The hw-module subslot slot/subslot stop command in EXEC mode
automatically stops traffic on the interfaces and deactivates them along with the module in preparation for
OIR. Similarly, you do not have to independently restart any of the interfaces on a module after OIR.
The following example shows how to use the show facility-alarm status command to verify if any critical
alarm is generated when a module is removed from the system:
Device# show facility-alarm status
System Totals Critical: 5 Major: 1 Minor: 0
Note A critical alarm (Active Card Removed OIR Alarm) is generated even if a module is removed after performing
graceful deactivation.
To deactivate a module and all of its interfaces before removing the module, use one of the following commands
in global configuration mode.
Procedure
Step 2 hw-module subslot slot/subslot [reload | Deactivates the module in the specified slot and
stop | start] subslot, where:
Example: • slot—Specifies the chassis slot number
Router# hw-module subslot 0/2 stop where the module is installed.
• subslot—Specifies the subslot number of
the chassis where the module is installed.
• reload—Stops and restarts the specified
module.
• stop—Removes all interfaces from the
module and the module is powered off.
• start—Powers on the module similar to a
physically inserted module in the specified
slot. The module firmware reboots and the
entire module initialization sequence is
executed in the IOSd and Input/Output
Module daemon (IOMd) processes.
Reactivating a Module
If, after deactivating a module using the hw-module subslot slot/subslot stop command, you want to reactivate
it without performing an OIR, use one of the following commands (in privileged EXEC mode):
• hw-module subslot slot/subslot start
• hw-module subslot slot/subslot reload
Access Points
An access point connected directly to a wired LAN provides a connection point for wireless users. If more
than one access point is connected to the LAN, users can roam from one area of a facility to another without
losing their connection to the network. As users move out of range of one access point, they automatically
connect to the network (associate) through another access point. The roaming process is seamless and transparent
to the user. The figure below shows access points acting as root units on a wired LAN.
In an all-wireless network, an access point acts as a stand-alone root unit. The access point is not attached to
a wired LAN; it functions as a hub linking all stations together. The access point serves as the focal point for
communications, increasing the communication range of wireless users. Figure below shows an access point
in an all-wireless network.
The functionality provided by the controller does not change except for customers who have Layer 2
deployments, which CAPWAP does not support.
In a CAPWAP environment, a wireless access point discovers a controller by using CAPWAP discovery
mechanisms and then sends it a CAPWAP join request. The controller sends the access point a CAPWAP
join response allowing the access point to join the controller. When the access point joins the controller, the
controller manages its configuration, firmware, control transactions, and data transactions.
Note For additional information about the discovery process and CAPWAP, see the Cisco Wireless LAN Controller
Software Configuration Guide. This document is available on Cisco.com.
Note CAPWAP support is provided in controller software release 8.5 or later. However, your controller must be
running the release that supports Cisco 1100 Series access points.
Note You cannot edit or query any access point using the controller CLI if the name of the access point contains a
space.
Note Make sure that the controller is set to the current time. If the controller is set to a time that has already passed,
the access point might not join the controller because its certificate may not be valid for that time.
Access points must be discovered by a controller before they can become an active part of the network. The
access point supports these controller discovery processes:
• Layer 3 CAPWAP discovery—Can occur on different subnets than the access point and uses IP addresses
and UDP packets.
• Locally stored controller IP address discovery—If the access point was previously joined to a controller,
the IP addresses of the primary, secondary, and tertiary controllers are stored in the access point’s
non-volatile memory. This process of storing controller IP addresses on an access point for later
deployment is called priming the access point. For more information about priming, see the “Performing
a Pre-Installation Configuration” section.
• DHCP server discovery—This feature uses DHCP option 43 to provide controller IP addresses to the
access points. Cisco switches support a DHCP server option that is typically used for this capability. For
more information about DHCP option 43, see the “Configuring DHCP Option 43” section.
• DNS discovery—The access point can discover controllers through your domain name server (DNS).
For the access point to do so, you must configure your DNS to return controller IP addresses in response
to CISCO-CAPWAP-CONTROLLER.localdomain, where localdomain is the access point domain name.
Configuring the CISCO-CAPWAP-CONTROLLER provides backwards compatibility in an existing
customer deployment. When an access point receives an IP address and DNS information from a DHCP
server, it contacts the DNS to resolve CISCO-CAPWAP-CONTROLLER.localdomain. When the DNS
sends a list of controller IP addresses, the access point sends discovery requests to the controllers.
Procedure
Note It is expected that there will be small variations in the LED color intensity and hue from unit to unit. This is
within the normal range of the LED manufacturer’s specifications and is not a defect.
The wireless LAN status LED indicates various conditions which are described in Table.
Boot loader status sequence Blinking Green DRAM memory test in progress
DRAM memory test OK
Initializing Ethernet
Ethernet OK
Initialization successful
Note Since this is an IOS command, you must run this command on the Cisco 1100 router console, instead of the
AP console.
The AP configuration files are cleared. This resets all configuration settings to factory defaults, including
passwords, encryption keys, the IP address, and the SSID. However, the regulatory domain provisioning is
not reset.
Note When you run the hw-module subslot x/y error-recovery password_reset command, the AP module
automatically reloads to restore the configuration settings and enters the maintenance mode. In the maintenance
mode, the AP module is on power on mode. When the module configuration reset is confirmed through the
console or web UI, the hw-module subslot x/x reload force command reloads the AP and then quits the
maintenance mode.
On Mobility Express, management traffic is untagged. If Access Points and WLANs are all on different
VLANs, Mobility Express capable Access Points will connect to a trunk port on the switch and traffic for
individual WLANs will be switched locally on individual VLANs. Shown below is a deployment with Access
Points and WLANs on different VLANs.
interface GigabitEthernet1/0/37
description » Connected to Master AP «
switchport trunk native vlan 40
switchport trunk allowed vlan 10,20,30,40
switchport mode trunk
Procedure
Note If the CAPWAP image on the Access Point is older than the minimum AireOS release capable of supporting
Cisco Mobility Express, Access Point MUST first join a WLC running the minimum AireOS release or higher
to upgrade its CAPWAP image. After the CAPWAP image of the AP has been upgraded, conversion of AP
from CAPWAP to Mobility Express can be performed.
To perform a conversion on an Access Point running CAPWAP to Mobility Express, follow the procedure
below:
Procedure
Example:
cisco ISR-AP1100AC-E ARMv7 Processor rev
5 (v7l) with 1016284/840700K bytes of
memory.
Processor board ID
AP Running Image : 192.0.2.1
Primary Boot Image : 192.0.2.2
Backup Boot Image : 192.0.2.3
1 Gigabit Ethernet interfaces
2 802.11 Radios
Radio FW version :
e1c63a0bb171f78c5800c1478007abc1
NSS FW version : not available
Router#ap-type mobility-express
Changing AP Type to Mobility Express
Note
Since the Access Point has AP Image type:
MOBILITY EXPRESS IMAGE, a new image
will not be downloaded. After the command is
executed, the Access Point will reboot and after
it comes up, the AP Configuration will be
changed to MOBILITY EXPRESS CAPABLE.
Example:
Router#ap-type mobility-express
tftp://10.74.5.99/8.4CCO/ap1g5
Starting the ME image download...
It may take a few minutes to finish
download.
If it is longer, please abort command,
check network connection and try again
########################################################################
100.0%
Image transfer complete.
Image downloaded, writing to flash...
do CHECK_ME, part1 is active part
Image signing verify success.
upgrade.sh: btldr rel is 33 vs 33, does
not need update
upgrade.sh: part to upgrade is part2
upgrade.sh: activate part2, set BOOT to
part2
upgrade.sh: AP primary version: 8.4.100.0
Archive done.
[*10/11/2017 23:05:22.7599] AP Type
changed: CAPWAP to ME. AP Mode changed
to flexconnect. AP Rebooting...
[*10/11/2017 23:05:22.7699] AP Rebooting:
Reset Request from Controller(AP Type
Changed from CAPWAP to ME)
Note
After the image download is complete, it will
be written to the flash followed by a reboot.
After the AP comes up, AP Image type will be
MOBILITY EXPRESS IMAGE and AP
Note The above command converts all connected Access Points with AP Configuration: MOBILITY EXPRESS
CAPABLE to AP Configuration: NOT MOBILITY EXPRESS CAPABLE . When this command is issued,
the APs are reloaded, and they come back up and look for the controller (switch_ip_address) to join.
Configuration correct? If yes, system will save it and reset. [yes][NO]: yes
Cleaning up Provisioning SSID
Note The Access Point will reboot and after it comes back up, login to the Mobility Express controller WebUI from
the browser using https://<mangement_ip_address> Cisco Mobility Express controller uses a self-signed
certificate for HTTPS. Therefore, all browsers display a warning message and asks whether you wish to
proceed with an exception or not when the certificate is presented to the browser. Accept the risk and proceed
to access the Mobility Express Wireless LAN Controller login page.
Procedure
Step 4 In the Set up Your Controller section, • Enter the System Name
configure the following:
Step 8 One can also enable RF Parameter • Move the Client Density slider as needed
Optimization and configure the following:
• From the Traffic Type, select Data or
Data and Voice
Pre-Requisites
• APIC-EM Release 1.4 with Cisco Network Plug and Play, virtually hosted in a Cisco UCS or equivalent
server.
• Access Points–Cisco 802.11ac Wave 2 access points running Cisco Mobility Express software.
• Controller Configuration–Cisco Mobility Express controller configuration file to be uploaded on Network
PnP.
2. On–prem PnP server can be added to DNS using ‘pnpserver.yourlocal.domain’ If DHCP discovery fails
to get the IP address of the APIC-EM controller, for example, because option 43 is not configured, the
Cisco Plug and Play Agent falls back on a DNS lookup method. Based on the network domain name
returned by the DHCP server, it constructs a fully qualified domain name (FQDN) for the APIC-EM
controller, using the preset hostname pnpserver. For example, if the DHCP server returns the domain
name " customer.com ", the Cisco Plug and Play IOS Agent constructs the FQDN "pnpserver.customer.com
". It then uses the local name server to resolve the IP address for this FQDN
Cloud redirection service requires a connection to the internet, and valid DNS server that can resolve
‘devicehelper.cisco.com’. The cloud redirection service redirect Cisco Mobility Express Access Point to
APIC-EM.
Procedure
Procedure
Creating a Project
Procedure
Step 4
Adding Cisco Mobility Express Capable Access Point to the Project and Associating the Controller Configuration
Procedure
APIC-EM Network Plug and Play Deployment Options with Cisco Mobility
Express
There are two deployment options supported for deploying Cisco Mobility Express with Network Plug and
Play.
Option 43 points to APIC-EM controller IP address. To configure DHCP scope with Option 43, it is important
follow the format as shown below. In the example below, 192.168.1.123 is the IP address of APIC-EM
controller .
To discover APIC-EM controller using the DNS discovery options, configure the DNS server and domain
name on the DHCP scope.
ip dhcp pool pnp_device_pool
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
domain-name cisco.com
dns-server 172.20.229.8
Procedure
Note
If you select HTTPS, then you would have
import a SSL certificate. Also, optionally one
can enter information of the secondary
controller.
Procedure
Note
If you select HTTPS, then you would have
import a SSL certificate. Also, optionally one
can enter information of the secondary
controller.
Adding Cisco Mobility Express capable Access Point to the Devices List
Procedure
Step 7 Verify that the Device has been added and the
status is Pending (Redirection).
Procedure
Introduction
Cisco 802.11ac Wave 2 access points are capable of running Cisco Mobility Express which a virtual wireless
controller function embedded on an Access Point.
Cisco Mobility Express access point running the wireless controller function will also provide wireless
connectivity to the clients. It also supports internal DHCP server which enables Access Point to be used for
Site Survey.
Procedure
Procedure
Creating Employee WLAN using WPA2 Enterprise with External Radius Server
Procedure
Procedure
Step 3 Click on the WLAN Security and configure the • Select Security as WPA2 Enterprise.
following:
• Select Authentication Server as AP.
Note
AP is the primary AP running the controller
function. In this use case, controller is the
Authentication Server and therefore Local
WLAN user account must exist to onboard the
clients.
Creating Employee WLAN with WPA2 Enterprise/External RADIUS and MAC Filtering
Procedure
Step 3 Click on the WLAN Security tab and configure • Enable MAC Filtering
the following:
• Select Security Type as WPA2 Enterprise
• Select Authentication Server as External
RADIUS
• Select RADIUS Compatibility from the
drop-down list
• Select MAC Delimiter from the drop-down
list
Step 4 Add the Radius server and configure the • Enter the Radius IP
following:
• Enter the Radius Port
• Enter the Shared Secret
• Click on tick icon
Procedure
Procedure
Procedure
Procedure
Procedure
Procedure
Procedure
Procedure
Procedure
The Cisco Wireless infrastructure will allow FT association on the WLAN from devices that can negotiate
FT association on a non-FT WLAN. In addition, with Mobility Express running AireOS 8.4, 802.11k and 11v
features are enabled by default on an SSID. These features help clients roam better by telling them when to
roam and providing them with information about neighboring APs so that no time is wasted scanning when
roaming is needed. Since iOS devices support dual band, the 802.11k neighbor list is updated on dual-band,
adaptively for iOS devices.
To configure 11k, r, v on a WLAN, follow the procedure below:
Procedure
Procedure
Procedure
Procedure
Procedure
Step 2 To modify the parameters on an access point, • Operating Mode(Read only field)-For a
click on the Edit button. The Access Point primary AP, this field displays AP &
window will come up displaying the General Controller. For other associated APs, this
parameters about the Access Point. field displays AP only.
• AP Mac(Read only field)–Displays the
MAC address of the Access Point.
• AP Model(Read only field)-Displays the
model details of the Access Point.
• IP Configuration–Choose Obtain from
DHCP to allow the IP address of the AP
be assigned by a DHCP server on the
network, or choose Static IP address. If
you choose Static IP address, then you can
edit the IP Address, Subnet Mask, and
Gateway fields.
• AP Name–Edit the name of access point.
This is a free text field.
• Location–Edit the location for the access
point. This is a free text field.
Step 3 Under the Controller tab (Available only for • System Name–Enter the System Name for
primary AP), one can modify the following Mobility Express
parameters:
• IP Address–IP address decides the login
URL to the controller's web interface. The
URL is in https://<ip address> format. If
you change this IP address, the login URL
also changes.
• Subnet Mask–Enter the Subnet Mask.
• Country Code–Enter the Country Code.
Step 4 Under Radio 1 (2.4 GHz) and Radio 2 (5 GHz), • Admin Mode–Enabled/Disabled. This
one can edit the following parameters: enables or disables the corresponding radio
on the AP (2.4 GHz for 802.11 b/g/n or 5
Ghz for 802.11 a/n/ac).
• Channel–Default is Automatic. Automatic
enables Dynamic Channel Assignment.
This means that channels are dynamically
assigned to each AP, under the control of
the Mobility Express controller. This
prevents neighboring APs from
broadcasting over the same channel and
hence prevents interference and other
communication problems. For the 2.4GHz
radio, 11 channels are offered in the US,
up to 14 in other parts of the world, but
only 1-6-11 can be considered
non-overlapping if they are used by
neighboring APs. For the 5GHz radio, up
to 23 non-overlapping channels are
offered. Assigning a specific value
statically assigns a channel to that AP.
• 802.11 b/g/n–1 to 11.
• 802.11 a/n/ac –40, 44, 48, 52, 56, 60, 64,
100, 104, 108, 112, 116, 132, 136, 140,
149, 153, 157, 161, 165.
• Channel Width - 20 MHz for 2.4GHz and
for 20, 40 and 80 for 5 GHz.
• Transmit Power - 1 to 8. The default value
is Automatic.
Note Mobility Express uses MAC 00-00-5E-00-01-VRID where VRID is 1 so if there are other instances of VRRP
running in the environment, use VRID other than 1 for those instances.
Primary AP Failover
To have redundancy in the Mobility Express network, it must have two or more Mobility Express capable
Access Points. These Access Points should have AP Image type as MOBILITY EXPRESS IMAGE and AP
Configuration as MOBILITY EXPRESS CAPABLE. In an event of a failure of primary AP, another Mobility
Express capable AP is elected as a primary automatically. The newly elected primary AP has the same IP and
configuration as the original primary AP.
Note Given Access Point models support different scale limits in terms of the number of Access Points supported,
it is highly recommended to have at least two or more Access Points which support the same scale limits.
Note Access Points, which have the Mobility Express Image but AP Configuration, is NOT MOBILITY EXPRESS
CAPABLE, will not participate in the primary AP election process.
Note During the primary Election process, even though the primary AP running the controller function is down,
the remaining Access Points will fall into Standalone mode and will continue to service connected clients and
switch data traffic locally. After the new primary is elected, the Standalone Access points will move to
connected mode.
Procedure
Step 1 User Defined Primary–User can select an Access Point to be the primary Access Point. If such a selection is
made, no new primary will be elected in case of a failure of the active primary. After five minutes, if the
current primary is still not active, it will be assumed dead and primary Election will begin to elect a new
primary. To manually define a primary, follow the procedure below:
a) Navigate to Wireless Settings > Access Points.
b) From the list of Access Points, click Edit icon of the Access Point which you would like to select as the
primary AP.
c) Under the General tab, click on Make me Controller button.
d) Click Yes on the Confirmation window.
Note
The previous primary will reboot and the selected Access Point will immediately launch the controller
and become the active primary.
Step 2 Next Preferred Primary - Admin can configure the Next Preferred Primary from CLI. When this is configured
and the active primary AP fails, the one configured as the Next Preferred Primary will be elected as a primary.
To configure the Next Preferred Primary, follow the procedure below:
a) Login to the CLI of the controller.
b) Execute the following CLI:
To configure the Next Preferred Primary, execute the following CLI:
(Cisco Controller) >config ap next-preferred-master <Cisco AP>
<Cisco AP> Enter the name of the Cisco AP
Step 3 Most Capable Access Point– If the first two priorities are not configured, primary AP election algorithm will
select the new primary based on the capability of the Access Point.
Step 4 Least Client Load– If here are multiple Access Points with the same capability, the one with least client load
is elected as the primary Access Point.
Step 5 Lowest MAC Address–If all of the Access Points are the same and have the same client load, then Access
Point with the lowest MAC will be elected as a primary.
end
Module Managment
The router configures, manages, and controls the supported interfaces and modules using the module
management facility built in its architecture. This new centralized module management facility provides a
common way to control and monitor all the modules in the system regardless of their type and application.
Table 42: Slot Numbers for Cisco 1100 Series ISR Models
C1131X-8PLTEPWx 0/3
C1131-8PLTEPWx 0/3
C1131X-8PWx 0/2
C1131-8PWx 0/2
Router#show platform
• The following example shows how to exit a session from the router, by pressing Ctrl-A followed by
Ctrl-Q on your keyboard:
type ^a^q
picocom v1.7
port is : /dev/ttyS3
flowcontrol : none
baudrate is : 9600
parity is : none
databits are : 8
escape is : C-a
local echo is : no
noinit is : no
noreset is : no
nolock is : yes
send_cmd is : sz -vv
receive_cmd is : rz -vv
imap is :
omap is :
emap is : crcrlf,delbs,
Terminal ready
Deactivating a Module
A module can be removed from the router without first being deactivated. However, we recommend that you
perform a graceful deactivation (or graceful power down) of the module before removing it. To perform a
graceful deactivation, use the hw-module subslot slot/subslot stop command in EXEC mode.
Note When you are preparing for an OIR of a module, it is not necessary to independently shut down each of the
interfaces before deactivating the module. The hw-module subslot slot/subslot stop command in EXEC mode
automatically stops traffic on the interfaces and deactivates them along with the module in preparation for
OIR. Similarly, you do not have to independently restart any of the interfaces on a module after OIR.
The following example shows how to use the show facility-alarm status command to verify if any critical
alarm is generated when a module is removed from the system:
Device# show facility-alarm status
System Totals Critical: 8 Major: 0 Minor: 0
Note A critical alarm (Active Card Removed OIR Alarm) is generated even if a module is removed after performing
graceful deactivation.
• If you choose to use the hw-module subslot slot/subslot stop command in EXEC mode, you cause the
module to gracefully shut down. The module is rebooted when the hw-module subslot slot/subslot start
command is executed.
To deactivate a module and all of its interfaces before removing the module, use one of the following commands
in global configuration mode.
Procedure
Reactivating a Module
If, after deactivating a module using the hw-module subslot slot/subslot stop command, you want to reactivate
it without performing an OIR, use one of the following commands (in privileged EXEC mode):
• hw-module subslot slot/subslot start
• hw-module subslot slot/subslot reload
2. Decide on the first Access Point to be configured as a primary Access Point. This Access Point should
be capable of supporting the Wireless LAN Controller function.
3. A DHCP server must be available on the network so that Access Points and clients can obtain an IP
Address. Starting from Cisco IOS XE Release 17.7.x or later, one can configure a DHCP server on the
primaryAccess Point as well but this is typically used for Site Survey.
4. To configure the EWC and AP integrated into C1100 series router, you must configure a DHCP server,
SVI interface, and NAT on the router. For more information on configuring the AP, see Prerequisites
for Configuring the AP on the Router section.
Procedure
Step 2 networkip address subnet mask Use this command to create a DHCP pool of
IP addresses to be used by the Switched Virtual
Example:
Interface (SVI) (Refer Step 11 and further for
SVI).
Router(dhcp-config)#network 10.10.10.0
255.255.255.0
Router(dhcp-config)#default-router
10.10.10.1
Step 4 dns-serverip address Use this command to assign the DNS server
IP address to clients in this DHCP pool.
Example:
Router(dhcp-config)#dns-server 192.0.2.1
Router(config)#interface
Wlan-GigabitEthernet 0/1/8
Step 9 switchport accessvlan number Use the switchport access vlan command to
assign the port or range of ports into access
Example:
ports.
Router(config-if)#switchport access vlan
199
Step 11 interface vlan number Use the interface vlan number command in
the configuration mode tocreate a Switched
Example:
Virtual Interface (SVI) and enter the interface
configuration (VLAN) mode for a specific
Router(config)#interface vlan 199
VLAN or a range of VLANs.
Step 12 description name Use this command to add a description for the
Switched Virtual Interface (SVI).
Example:
Router(config-if)#description Wireless
Step 16 ip route 10.10.10.10 10.10.10.10 default Use this command to direct all the traffic to
gateway ip-address the default gateway of the router.
Example:
Step 18 number permitip address wildcard mask Use this command to create ACL entries to
permit or deny traffic.
Example:
Procedure
Step 1 To connect the SSID to CiscoAirProvision-XXXX, follow the steps added here: https://www.cisco.com/c/en/
us/products/collateral/wireless/embedded-wireless-controller-catalyst-access-points/
white-paper-c11-743398.html#DeployingtheEWC
Step 2 You can also scan the QR Code by using the Catalyst Wireless Application by following the steps added here:
https://www.cisco.com/c/en/us/td/docs/wireless/controller/ewc/mob-app/user-guide/cisco_catalyst_wireless_
app_user_guide/getting_started.html
Step 3 You can manually configure the AP using CLI by following the steps added here: https://www.cisco.com/c/
en/us/td/docs/wireless/controller/ewc/17-6/config-guide/ewc_cg_17_6/overview_of_the_controller.html#task_
gs1_qzh_kpb
On an Embedded Wireless Controller (EWC), management traffic is untagged. If Access Points and WLANs
are all on different VLANs, the Embedded Wireless Controller (EWC) capable Access Points will connect
to a trunk port on the switch and traffic for individual WLANs will be switched locally on individual VLANs.
Shown below is a deployment with Access Points and WLANs on different VLANs.
ConvertingAccessPointfromCAPWAPtoCiscoEmbeddedWirelessController
(EWC)
One can convert an Access Point running CAPWAP to Embedded Wireless Controller (EWC) and vice versa.
Cisco Embedded Wireless Controller (EWC) support on 802.11ax Access Points is introduced in different
IOS XE releases and it is important to note that before an Access Point can be converted to Cisco Embedded
Wireless Controller (EWC), it must have the minimum IOS XE CAPWAP image which supports Cisco
Embedded Wireless Controller (EWC) capability for that Access Point. Given below is the minimum IOS
XE release for an Access Point which will support conversion from CAPWAP to Cisco Embedded Wireless
Controller (EWC).
Toperform a conversion on an Access Point running CAPWAP to Embedded Wireless Controller (EWC),
follow the procedure below:
Procedure
Example:
APC884.A110.0104#ap-type ewc-ap
tftp://10.74.9.8/ap1g8-tar_CS00012204433_fix
tftp://10.74.9.8/test/C9800-AP-iosxe-wlc.bin
Starting download eWLC image
tftp://10.74.9.8/userid/C9800-AP-iosxe-wlc.bin
...
It may take a few minutes. If longer,
please abort command, check network and
try again.
########################################################################
100.0%
Image download completed.
Checking ...OK
Checking image size...OK
Checking image family...OK
Verifying ...[*08/25/2021 08:18:20.6120]
[*08/25/2021 08:18:20.6120] CAPWAP State:
Discovery
[*08/25/2021 08:18:20.6650] Discovery
Request sent to 255.255.255.255,
discovery type UNKNOWN(0)
OK
Versioning ...ws_management_version:
17.08.01.0.144557
Successfully downloaded and setup eWLC
image.
Starting download AP image
tftp://10.74.9.8/ap1g8-tar_CS00012204433_fix
...
It may take a few minutes. If longer,
please abort command, check network and
try again.
########################################################################
100.0%
Image download completed.
Procedure
Note The web redirection to the Embedded Wireless Controller (EWC) configuration portal only works if you are
connected to the provisioning SSID. It does not work if your laptop is connected to another Wi-Fi network
or on the wired network. You cannot configure the AP from the wired network even if you enter the EWC IP
address when it is in day0 wizard provisioning mode
Procedure
Step 1 Log on to the controller and in the Configuration Setup Wizard, go to the General Settings page.
Step 2 In the Configuration Mode option, select Non Mesh and enter the following fields:
a) Host Name: Enter the hostname.
b) Note
As required by the End User License Agreement, please ensure appropriate country code selection so that
the unleashed network does not violate local and national regulatory restrictions. Improper country code
assignment can disrupt wireless transmissions and may result in government imposed penalties and
sanctions on operators of wireless networks utilizing devices set to improper country codes.
Country: From the drop-down list, choose the appropriate country code.
c) In the Management User Settings section, enter the username and password.
d) In the Wireless Management Settings section, check the DHCP check box, to display the DHCP server
IP address.
e) In the Wireless Network section, click Add to create at least one WLAN.
Step 3 Click Finish.
Procedure
Access Points
An access point connected directly to a wired LAN provides a connection point for wireless users. If more
than one access point is connected to the LAN, users can roam from one area of a facility to another without
losing their connection to the network. As users move out of range of one access point, they automatically
connect to the network (associate) through another access point. The roaming process is seamless and transparent
to the user. The figure below shows access points acting as root units on a wired LAN.
Figure 8: Access Points as Root Units on a Wired LAN
In an all-wireless network, an access point acts as a stand-alone root unit. The access point is not attached to
a wired LAN; it functions as a hub linking all stations together. The access point serves as the focal point for
communications, increasing the communication range of wireless users. Figure below shows an access point
in an all-wireless network.
Note For additional information about the discovery process and CAPWAP, see the Cisco Wireless LAN Controller
Software Configuration Guide. This document is available on Cisco.com.
Note CAPWAP support is provided in controller software release 8.5 or later. However, your controller must be
running the release that supports Cisco 1100 Series access points.
Note You cannot edit or query any access point using the controller CLI if the name of the access point contains a
space.
Note Make sure that the controller is set to the current time. If the controller is set to a time that has already passed,
the access point might not join the controller because its certificate may not be valid for that time.
Access points must be discovered by a controller before they can become an active part of the network. The
access point supports these controller discovery processes:
• Layer 3 CAPWAP discovery—Can occur on different subnets than the access point and uses IP addresses
and UDP packets.
• Locally stored controller IP address discovery—If the access point was previously joined to a controller,
the IP addresses of the primary, secondary, and tertiary controllers are stored in the access point’s
non-volatile memory. This process of storing controller IP addresses on an access point for later
deployment is called priming the access point. For more information about priming, see the “Performing
a Pre-Installation Configuration” section.
• DHCP server discovery—This feature uses DHCP option 43 to provide controller IP addresses to the
access points. Cisco switches support a DHCP server option that is typically used for this capability. For
more information about DHCP option 43, see the “Configuring DHCP Option 43” section.
• DNS discovery—The access point can discover controllers through your domain name server (DNS).
For the access point to do so, you must configure your DNS to return controller IP addresses in response
to CISCO-CAPWAP-CONTROLLER.localdomain, where localdomain is the access point domain name.
Configuring the CISCO-CAPWAP-CONTROLLER provides backwards compatibility in an existing
customer deployment. When an access point receives an IP address and DNS information from a DHCP
server, it contacts the DNS to resolve CISCO-CAPWAP-CONTROLLER.localdomain. When the DNS
sends a list of controller IP addresses, the access point sends discovery requests to the controllers.
Procedure
Note It is expected that there will be small variations in the LED color intensity and hue from unit to unit. This is
within the normal range of the LED manufacturer’s specifications and is not a defect.
The wireless LAN status LED indicates various conditions which are described in Table.
LED port: WLAN (1 LED): 3-color LED: Green, Blue, Red
Access point operating system Cycling through General warning; insufficient inline
errors Red-Off-Green-Off-Blue-Off power
Note Since this is an IOS command, you must run this command on the Cisco 1100 router console, instead of the
AP console.
The AP configuration files are cleared. This resets all configuration settings to factory defaults, including
passwords, encryption keys, the IP address, and the SSID. However, the regulatory domain provisioning is
not reset.
Note When you run the hw-module subslot x/y error-recovery password_reset command, the AP module
automatically reloads to restore the configuration settings and enters the maintenance mode. In the maintenance
mode, the AP module is on power on mode. When the module configuration reset is confirmed through the
console or web UI, the hw-module subslot x/y reload force command reloads the AP and then quits the
maintenance mode.
Note To configure the controller using day 0 wizard (GUI), follow the Non Mesh configuration steps only.
Note For more information on configuring the Embedded Wireless Networks, see the Cisco Embedded Wireless
Controller on Catalyst Access Points Configuration Guide.
Note Cisco does not provide any kind of support for the third-party SFPs because they are not validated by Cisco.
Procedure
Step 3 interface type slot subslot port number Selects an interface to configure.
Example:
Router(config-if)# interface ethernet
0/3/0
Examples
This example shows how to configure a third-party SFP on a Cisco ISR1000 Series Router:
Router# configure terminal
Router(config)# interface ethernet 0/3/0
Router(config-if)# service unsupported-transceiver
Router(config)# interface ethernet 0/3/0
Router(config-if)# media-type sfp
Router(config-if)# speed 100
Router(config-if)# shutdown
Router(config-if)# no shutdown
Router(config-if)# exit
Router(config)# exit
Device> enable
Device(config)# aa new-model
Step 4 aaa authentication dot1x{default | listname} Creates a series of authentication methods that
groupgroup-name are used to determine user privilege to access
the privileged command level so that the
Example:
device can communicate with the AAA server.
Device(config)# aaa authentication dot1x
default group ise
Device(config)# dot1x
system-auth-control
Device(config)# dot1x
system-auth-control
Step 8 aaa group server radius {radius | Defines the AAA server group with a group
tacacs+}group-name name. Example: Device(config)# aaa group
server radius group1 • All members of a group
Example:
must be the same type, that is, RADIUS or
TACACS+. This command puts the device in
Device(config)# aaa group server radius
coa-ise server group RADIUS configuration mode.
Step 9 radius server server-name Specifies the name for the RADIUS server.
Example:
Step 10 server ip-address[ auth-portport-number[ Specifies the name for the RADIUS server.
acct-portport-number
Example:
Device(config-sg-radius)# address ipv4
%{ise.ip} auth-port 1812 acct-port 1813
Step 11 pac key encyrption-key Specifies the PAC encryption key (overrides
the default).
Example:
Device(config-sg-radius)# pac key 0 • The encryption-key can be 0 (specifies
cisco123 that an unencrypted keys follows), 7
(specifies that a hidden key follows), or
a line specifying the unencrypted
(clear-text) server key.
Step 13 event event-name[match-all | match-first] Specifies the type of event that triggers actions
in a control policy if conditions are met.
Example:
Step 14 priority-number class {control-class-name Associates a control class with one or more
| always}[do-all | do-until-failure | actions in a control policy.
do-until-success]
• A named control class must first be
Example: configured before specifying it with the
control-class-name argument..
Device(config-event-control-policymap)#
10 class always do-until-failur • do-until-failure is the default behavior.
Device(config-event-control-policymap)#
10 authenticate using dot1x
Device(config)# interface
gigabitethernet0/1
Step 17 switchport access vlan vlan-id Assign the port to a VLAN. Valid VLAN IDs
are 1 to 4094
Example:
Step 18 switchport access mode Assign the port to a VLAN. Valid VLAN IDs
are 1 to 4094
Example:
Device(config-if)# access-session
port-control auto
Device> enable
Step 3 aaa authorization network{default | lcts-list} Configures the device to use RADIUS
groupgroup-name authorization for all network-related service
requests.
Example:
Step 4 cts authorization listmlist Specifies a Cisco TrustSec AAA server group.
Non-seed devices will obtain the server list
Example:
from the authenticator.
Device(config)# cts authorization list
cts-list
Step 7 cts role-based {sgt-map |sgt } Enables Cisco TrustSec SGACL policy
enforcement on routed interfaces..
Example:
Device(configif)# ip access-list
role-based sgacl1
Step 11 ipv6 access-list role-based rbacl-name Creates a Role-based ACL and enters
Role-based ACL configuration mode.
Example:
Device(configif-rb-acl)# ipv6
access-list role-based v6_acl
Device(configif-rb-acl)# sequence 10
permit icmp echo-reply
Step 13 exit
Example:
Device(configif-rb-acl)# exit
Step 14 cts role-based monitor enable from Enables monitor mode for IPv4/IPv6 Role
{sgt_num} to {dgt_num}[ipv4 | ipv6] Based Access Control List (RBACL) (Security
cts role-based monitor permissions from
Example:
{sgt_num} to {dgt_num} [ipv4 | ipv6] Step 4
Group Tag (SGT)- Destination Group Tag
Device(configif)# cts role-based monitor
enable from 4 to 32 sgacl1 (DGT) pair).
Note The Dynamic Security Group Tagging and Security Group ACL are configured on ISE server, after the 802.1x
client is authenticated by ISE server. Subsequently, the corresponding SGT and SGACL will be downloaded
from ISE and applied to the client.
Cisco TrustSec Support on Cisco IOS XE 17.5.1a Each security group in a Cisco
1000 Series ISR SVI interface TrustSec domain is assigned a
unique 16 bit tag called the Security
Group Tag.
(SGT). The SGT is a single label
indicating the privileges of the
source within the entire network. It
is in turn propagated between
network hops allowing any
intermediary devices (switches,
routers) to enforce polices based on
the identity tag.
Use the Cisco Feature Navigator to find information about platform and software image support. To access
Cisco Feature Navigator, go to http://www.cisco.com/go/cfn.
The process lifecycle notification component failed, Note the time of the message and investigate the
preventing proper detection of a process start and stop. kernel error message logs to learn more about the
This problem is likely the result of a software defect problem and see if it is correctable. If the problem
in the software subpackage. cannot be corrected or the logs are not helpful, copy
the error message exactly as it appears on the console
along with the output of the show tech-support
command and provide the gathered information to a
Cisco technical support representative.
Error Message: %PMAN-0-PROCFAILCRIT A critical process [chars] has failed (rc [dec])
A process important to the functioning of the router Note the time of the message and investigate the error
has failed. message logs to learn more about the problem. If the
problem persists, copy the message exactly as it
appears on the console or in the system log. Research
and attempt to resolve the issue using the tools and
utilities provided at: http://www.cisco.com/tac. With
some messages, these tools and utilities will supply
clarifying information. Search for resolved software
issues using the Bug Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
Error Message: %PMAN-3-PROCFAILOPT An optional process [chars] has failed (rc [dec])
A process that does not affect the forwarding of traffic Note the time of the message and investigate the
has failed. kernel error message logs to learn more about the
problem. Although traffic will still be forwarded after
receiving this message, certain functions on the router
may be disabled because of this message and the error
should be investigated. If the logs are not helpful or
indicate a problem you cannot correct, copy the
message exactly as it appears on the console or in the
system log. Research and attempt to resolve the issue
using the tools and utilities provided at
http://www.cisco.com/tac. With some messages, these
tools and utilities will supply clarifying information.
Search for resolved software issues using the Bug
Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
Error Message: %PMAN-3-PROCFAIL The process [chars] has failed (rc [dec])
The process has failed as the result of an error. This message will appear with other messages related
to the process. Check the other messages to determine
the reason for the failures and see if corrective action
can be taken. If the problem persists, copy the message
exactly as it appears on the console or in the system
log. Research and attempt to resolve the issue using
the tools and utilities provided at:
http://www.cisco.com/tac. With some messages, these
tools and utilities will supply clarifying information.
Search for resolved software issues using the Bug
Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
Error Message: %PMAN-3-PROCFAIL_IGNORE [chars] process exits and failures are being ignored
due to debug settings. Normal router functionality will be affected. Critical router
functions like RP switchover, router reload, FRU resets, etc. may not function properly.
A process failure is being ignored due to the If this behavior is desired and the debug settings are
user-configured debug settings. set according to a user's preference, no action is
needed. If the appearance of this message is viewed
as a problem, change the debug settings. The router
is not expected to behave normally with this debug
setting. Functionalities such as SSO switchover, router
reloads, FRU resets, and so on will be affected. This
setting should only be used in a debug scenario. It is
not normal to run the router with this setting.
Error Message: %PMAN-3-PROCHOLDDOWN The process [chars] has been helddown (rc [dec])
The process was restarted too many times with This message will appear with other messages related
repeated failures and has been placed in the hold-down to the process. Check the other messages to determine
state. the reason for the failures and see if corrective action
can be taken. If the problem persists, copy the message
exactly as it appears on the console or in the system
log. Research and attempt to resolve the issue using
the tools and utilities provided at:
http://www.cisco.com/tac. With some messages, these
tools and utilities will supply clarifying information.
Search for resolved software issues using the Bug
Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
The route processor is being reloaded because there Ensure that the reload is not due to an error condition.
is no ready standby instance.
The RP is being reloaded. Ensure that the reload is not due to an error condition.
If it is due to an error condition, collect information
requested by the other log messages.
The system is being reloaded. Ensure that the reload is not due to an error condition.
If it is due to an error condition, collect information
requested by the other log messages.
The executable file used for the process is bad or has Ensure that the named executable is replaced with the
permission problem. correct executable.
The executable file used for the process is missing, Ensure that the named executable is present and the
or a dependent library is bad. dependent libraries are good.
The executable file used for the process is empty. Ensure that the named executable is non-zero in size.
The process manager is exiting. Ensure that the process manager is not exiting due to
an error condition. If it is due to an error condition,
collect information requested by the other log
messages.
The process has gracefully shut down. No user action is necessary. This message is provided
for informational purposes only.
The process has launched and is operating properly. No user action is necessary. This message is provided
for informational purposes only.
The process has requested a stateless restart. No user action is necessary. This message is provided
for informational purposes only.
ADSL Troubleshooting
If you experience trouble with the ADSL connection, verify the following:
• The ADSL line is connected and is using pins 3 and 4. For more information on the ADSL connection,
see the hardware guide for your router.
• The ADSL CD LED is on. If it is not on, the router may not be connected to the DSL access multiplexer
(DSLAM). For more information on the ADSL LEDs, see the hardware installation guide specific for
your router.
• The correct Asynchronous Transfer Mode (ATM) virtual path identifier/virtual circuit identifier (VPI/VCI)
is being used.
• The DSLAM supports discrete multi-tone (DMT) Issue 2.
• The ADSL cable that you connect to the Cisco router must be 10BASE-T Category 5, unshielded
twisted-pair (UTP) cable. Using regular telephone cable can introduce line errors.
SHDSL Troubleshooting
Symmetrical high-data-rate digital subscriber line (SHDSL) is available on the Cisco 1000 Integrated Services
Routes. If you experience trouble with the SHDSL connection, verify the following:
• The SHDSL line is connected and using pins 3 and 4. For more information on the G.SHDSL connection,
see the hardware guide for your router.
• The G.SHDSL LED is on. If it is not on, the router may not be connected to the DSL access multiplexer
(DSLAM). For more information on the G.SHDSL LED, see the hardware installation guide specific for
your router.
• The correct asynchronous transfer mode (ATM) virtual path identifier/virtual circuit identifier (VPI/VCI)
is being used.
• The DSLAM supports the G.SHDSL signaling protocol.
Use the show controllers dsl 0 command in EXEC mode to view an SHDSL configuration.
VDSL2 Troubleshooting
Very-high-data-rate digital subscriber line 2 (VDSL2) is available on the Cisco 1000 Series Integrated Services
Routers. If you experience trouble with the VDSL2 connection, verify the following:
• The VDSL2 line is connected and using pins 3 and 4. For more information on the VDSL2 connection,
see the hardware guide for your router.
• The VDSL2 LED CD light is on. If it is not on, the router may not be connected to the DSL access
multiplexer (DSLAM). For more information on the VDSL2 LED, see the hardware installation guide
specific for your router.
• The DSLAM supports the VDSL2 signaling protocol.
Use the show controllers vdsl 0 command in EXEC mode to view a VDSL2 configuration. The debug vdsl
0 daemon state command can be used to enable the debug messages that print the state transition of VDSL2
training.
If there is trouble with the VDSL firmware file, you can reload or upgrade it without upgrading your Cisco
IOS image. Use the command:
Note Cisco 1000 series ISRs require that the router be reloaded (IOS reload) before the new VDSL firmware will
be loaded.
If the command is not present or the named firmware file is corrupt or not available, the default firmware file
flash:vdsl.bin is checked to be present and not corrupt. The firmware in this file is then downloaded to the
modem chipset.
Note Cisco 1000 series ISRs will state the reason of failure during bootup if the new VDSL firmware fails to load
after IOS reload.
Router# show interfaces ethernet 0 **similar output for show interfaces fastethernet 0
command **
Ethernet0 is up, line protocol is up
Hardware is PQUICC Ethernet, address is 0000.Oc13.a4db
(bia0010.9181.1281)
Internet address is 192.0.2.1/24
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec,
reliability 255/255., txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
The following example shows how to view the status of ATM Interfaces:
The following example shows how to view the status of Dialer Interfaces:
The table below describes possible command output for the show interfaces command.
Output Cause
ATM 0 is up, line protocol is up The ATM line is up and operating correctly.
ATM 0 is down, line protocol is down • The ATM interface has been disabled with the shutdown
command.
or
• The ATM line is down, possibly because the ADSL cable
is disconnected or because the wrong type of cable is
connected to the ATM port.
ATM 0.n is up, line protocol is up The specified ATM subinterface is up and operating correctly.
ATM 0.n is administratively down, line The specified ATM subinterface has been disabled with the
protocol is down shutdown command.
ATM 0.n is down, line protocol is down The specified ATM subinterface is down, possibly because the
ATM line has been disconnected (by the service provider).
Ethernet/Fast Ethernet n is up, line The specified Ethernet/Fast Ethernet interface is connected to the
protocol is up network and operating correctly.
Ethernet/Fast Ethernet n is up, line The specified Ethernet/Fast Ethernet interface has been correctly
protocol is down configured and enabled, but the Ethernet cable might be
disconnected from the LAN.
Output Cause
Ethernet/Fast Ethernet n is The specified Ethernet/Fast Ethernet interface has been disabled
administratively down, line protocol is with the shutdown command, and the interface is disconnected.
down
Dialer n is up, line protocol is up The specified dialer interface is up and operating correctly.
Dialer n is down, line protocol is down • This is a standard message and may not indicate anything
is actually wrong with the configuration.
or
• If you are having problems with the specified dialer
interface, this can mean it is not operating, possibly because
the interface has been brought down with the shutdown
command, or the ADSL cable is disconnected.
This command sends five OAM F5 loopback packets to the DSLAM (segment OAM packets). If the PVC is
configured at the DSLAM, the ping is successful.
To test whether the PVC is being used at the aggregator, enter the following command:
This command sends end-to-end OAM F5 packets, which are echoed back by the aggregator.
The table below describes some of the fields shown in the command output.
Field Description
ATM interface Interface number. Always 0 for the Cisco 860 and Cisco 880 series access
routers.
AAL enabled Type of AAL enabled. The Cisco 860 and Cisco 880 series access routers
support AAL5.
Max Datagram Size Configured maximum number of bytes in the largest datagram.
Caution Debugging is assigned a high priority in your router CPU process, and it can render your router unusable. For
this reason, use debug commands only to troubleshoot specific problems. The best time to use debug commands
is during periods of low network traffic so that other activity on the network is not adversely affected.
You can find additional information and documentation about the debug commands in the Cisco IOS Debug
Command Reference.
The following example shows how to view the ATM interface processor events—failure:
Caution Because the debug atm packet command generates a significant amount of output for every packet processed,
use it only when network traffic is low, so that other system activities are not adversely affected.
01:23:48:
01:23:48:ATM0(I):
VCD:0x1 VPI:0x1 VCI:0x64 Type:0x0 SAP:AAAA CTL:03 OUI:000000 TYPE:0800 Length:0x70
01:23:48:4500 0064 0008 0000 FE01 A080 0E00 0001 0E00 0010 0000 A903 0AF3 17F7 0000
01:23:48:0000 004C BA10 ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD
01:23:48:ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD ABCD
01:23:48:ABCD ABCD ABCD ABCD ABCD
01:23:48:
The table below describes some of the fields shown in the debug atm packet command output.
Field Description
VCD: 0xn Virtual circuit associated with this packet, where n is some value.
VPI: 0xn Virtual path identifier for this packet, where n is some value.
Length: n Total length of the packet (in bytes) including the ATM headers.
System Report
System reports or crashinfo files save information that helps Cisco technical support representatives to debug
problems that caused the Cisco IOS image to crash. It is necessary to collect critical crash information quickly
and reliably and bundle it in a way that it can be identified with a specific crash occurrence. System reports
are generated and saved into the ‘/core’ directory, either on harddisk: or flash: filesystem. The system does
not generate reports in case of a reload.
In case of a system crash, the following details are collected:
• IOSd core file and IOS crashinfo file if there was an IOSd process crash
2. Tracelogs
4. Bootup logs
This report is generated before the router goes down to rommon/bootloader. The information is stored in
separate files which are then archived and compressed into the tar.gz bundle. This makes it convenient to get
a crash snapshot in one place, and can be then moved off the box for analysis.
Device hostname, the ID of the module that generated the system report and its creation timestamp are
embedded in the file name:
<hostname>_<moduleID>-system-report_<timestamp>.tar.gz
Example:
Router1_RP_0-system-report_20210204-163559-UTC
A device with hostname Router1 experienced an unexpected reload of RP0 module and the system-report
was generated on 4th February 2021 at 4:39:59 PM UTC.
├── bootflash/
│ └── pd_info/
│ ├── dmesg_output-20210204-163538-UTC.log
│ ├── filesystems-20210204-163538-UTC.log
│ ├── memaudit-20210204-163538-UTC.log
│ ├── proc_cpuinfo-20210204-163538-UTC.log
│ ├── proc_diskstats-20210204-163538-UTC.log
│ ├── proc_interrupts-20210204-163538-UTC.log
│ ├── proc_oom_stats-20210204-163538-UTC.log
│ ├── proc_softirqs-20210204-163538-UTC.log
│ ├── system_report_trigger.log
│ └── top_output-20210204-163538-UTC.log
├── harddisk/
│ ├── core/
│ │ └── Router1_RP_0_hman_17716_20210212-123836-UTC.core.gz
│ └── tracelogs/
├── tmp/
│ ├── fp/
│ │ └── trace/
│ ├── maroon_stats/
│ ├── rp/
│ │ └── trace/
│ └── Router1_RP_0-bootuplog-20210204-163559-UTC.log
└── var/
└── log/
└── audit/
└── audit.log
Note Recovering a lost password is only possible when you are connected to the router through the console port.
These procedures cannot be performed through a Telnet session.
Tip See the “Hot Tips” section on Cisco.com for additional information on replacing enable secret passwords.
Procedure
Step 1 Connect an ASCII terminal or a PC running a terminal emulation program to the CONSOLE port on the Fthe
router.
Step 2 Configure the terminal to operate at 9600 baud, 8 data bits, no parity, and 1 stop bit.
Step 3 At the privileged EXEC prompt (router_name #), enter the show version command to display the existing
configuration register value (shown in bold at the bottom of this output example):
Example:
--------------------------------------------------------------------------------
Suite Suite Current Type Suite Next reboot
--------------------------------------------------------------------------------
FoundationSuiteK9 None None None
securityk9
appxk9
-----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
------------------------------------------------------------------
appxk9 None None None
securityk9 None None None
ipbase ipbasek9 None ipbasek9
Router#
Procedure
Step 1 If break is disabled, turn the router off (O), wait 5 seconds, and turn it on (|) again. Within 60 seconds, press
the Break key. The terminal displays the ROM monitor prompt.
Note
Some terminal keyboards have a key labeled Break . If your keyboard does not have a Break key, see the
documentation that came with the terminal for instructions on how to send a break.
rommon 2>
The router cycles its power, and the configuration register is set to 0x142. The router uses the boot ROM
system image, indicated by the system configuration dialog:
Example:
Step 5 Enter no in response to the prompts until the following message is displayed:
Example:
Router>
Step 7 Enter the enable command to enter enable mode. Configuration changes can be made only in enable mode:
Example:
Router> enable
Router#
Step 8 Enter the show startup-config command to display an enable password in the configuration file:
Example:
What to do next
If you are recovering an enable password, do not perform the steps in the Reset the Password and Save Your
Changes section. Instead, complete the password recovery process by performing the steps in the Reset the
Configuration Register Value section.
If you are recovering an enable secret password, it is not displayed in the show startup-config command
output. Complete the password recovery process by performing the steps in the Reset the Password and Save
Your Changes section.
Procedure
Step 1 If break is disabled, turn the router off (O), wait 5 seconds, and turn it on (|) again. Within 60 seconds, press
the Break key. The terminal displays the ROM monitor prompt.
Note
Some terminal keyboards have a key labeled Break . If your keyboard does not have a Break key, see the
documentation that came with the terminal for instructions on how to send a break.
rommon 2>
The router cycles its power, and the configuration register is set to 0x142. The router uses the boot ROM
system image, indicated by the system configuration dialog:
Example:
Step 5 Enter no in response to the prompts until the following message is displayed:
Example:
Router>
Step 7 Enter the enable command to enter enable mode. Configuration changes can be made only in enable mode:
Example:
Router> enable
Router#
Step 8 Enter the show startup-config command to display an enable password in the configuration file:
Example:
What to do next
If you are recovering an enable password, do not perform the steps in the Reset the Password and Save Your
Changes section. Instead, complete the password recovery process by performing the steps in the Reset the
Configuration Register Value section.
If you are recovering an enable secret password, it is not displayed in the show startup-config command
output. Complete the password recovery process by performing the steps in the Reset the Password and Save
Your Changes section.
Procedure
Step 1 Enter the configure terminal command to enter global configuration mode:
Example:
Step 2 Enter the enable secret command to reset the enable secret password in the router:
Example:
Router(config)# exit
Procedure
Step 1 Enter the configure terminal command to enter global configuration mode:
Example:
Step 2 Enter the configure register command and the original configuration register value that you recorded.
Example:
Router(config)# config-reg
value
Router(config)# exit
Note
To return to the configuration being used before you recovered the lost enable password, do not save the
configuration changes before rebooting the router.
References
Refer to the following troubleshooting scenarios from the Cisco ISR guides:
• Monitor CPU Usage - http://www.cisco.com/c/en/us/support/docs/routers/
4000-series-integrated-services-routers/210760-Monitor-CPU-Usage-On-ISR4300-Series.html
• Memory Troubleshooting Guide for Cisco 4000 Series ISRs - http://www.cisco.com/c/en/us/td/docs/
routers/access/4400/troubleshooting/memorytroubleshooting/isr4000_mem.html
• Stuck in ROMMON Trouble Shooting - http://www.cisco.com/c/en/us/support/docs/routers/
4000-series-integrated-services-routers/200678-Troubleshoot-Cisco-4000-Series-ISR-Stuck.html
• Monitoring Control Plane Resource & Hardware Alarms Trouble Shooting - https://www.cisco.com/c/
en/us/td/docs/routers/access/4400/software/configuration/guide/isr4400swcfg/bm_isr_4400_sw_config_
guide_chapter_01000.html#concept_5A8508E657FA48E7B9563BE9073D4884
• SFP Modules Maintenance and Troubleshooting - http://www.cisco.com/c/en/us/support/docs/
interfaces-modules/cwdm-gbic-sfp/72370-sfp-trcvr-mods.html
• How to Find Error Message Details - https://www.cisco.com/c/en/us/td/docs/routers/access/4400/software/
configuration/guide/isr4400swcfg/bm_isr_4400_sw_config_guide_chapter_01001.html#concept_
AD47EC93DC3D4557B99BC155B8BB68FA
• IOS XE Syslog Messages - http://www.cisco.com/c/en/us/td/docs/ios/system/messages/guide/xemsg01.html
• Debugging AppNav/AppNav-XE and ISR-WAAS - http://www.cisco.com/c/en/us/td/docs/routers/access/
4400/appnav/isr/isr_appnav/isr_trblshoot.html
• Troubleshooting for Cisco Smart Licensing Client - https://www.cisco.com/c/en/us/td/docs/routers/access/
4400/software/configuration/guide/isr4400swcfg/isr4400swcfg_chapter_010011.html#reference_
C0E7BB9ED86D4FA18202EE72E87EB3A9
• Retrieving the License and Configuration Files - http://www.cisco.com/c/en/us/td/docs/routers/access/
4400/flashmemory/isr4000_flashmem.html#72593
• Power and Cooling System Trouble Shooting - http://www.cisco.com/c/en/us/td/docs/routers/access/
4400/troubleshooting/guide/isr4400trbl.html
• T1/E1 Data Clocking Trouble Shooting and Configuration - http://www.cisco.com/c/en/us/td/docs/routers/
access/4400/feature/guide/isr4400netclock.html#54707
• Troubleshooting Layer 2/3 Switch SW - http://www.cisco.com/c/en/us/td/docs/routers/access/interfaces/
eesm/software/configuration/guide/4451_config.html#pgfId-1000127
• Best Practices for Implementing WAN MACsec and MKA - http://www.cisco.com/c/en/us/td/docs/
ios-xml/ios/macsec/configuration/xe-16/macsec-xe-16-book/
wan-macsec-mka-support-enhance.html#reference_66BBEB1DDF3147DB8B89B6BB6CEBB7DC
• QoS FAQ - http://www.cisco.com/c/en/us/products/collateral/routers/
asr-1000-series-aggregation-services-routers/q-and-a-c67-731655.html
• SNMB Notification - http://www.cisco.com/c/en/us/td/docs/routers/access/4400/technical_references/
4400_mib_guide/isr4400_MIB/4400mib_04.html#42335
• Monitoring router interface through MIB - http://www.cisco.com/c/en/us/td/docs/routers/access/4400/
technical_references/4400_mib_guide/isr4400_MIB/4400mib_05.html#96205