Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
Configuration Guide
Last Modified: 2021-12-15
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2022 Cisco Systems, Inc. All rights reserved.
CONTENTS
PREFACE Preface xv
Objectives xv
Important Information on Features and Commands xv
Related Documentation xv
Document Conventions xvi
Obtaining Documentation and Submitting a Service Request xvii
CHAPTER 1 Overview 1
Introduction 1
Switch Between Controller and Autonomous Modes Using Cisco CLI 2
Switch Between Controller and Autonomous Modes using Bootstrap Configuration Files 2
Supported Modules and Features-on Cisco 8300 and 8200 Series Edge Platforms 3
Default Configuration 5
Configuring Global Parameters 9
Configuring Gigabit Ethernet Interfaces 10
Configuring a Loopback Interface 11
Configuring Module Interfaces 12
Dynamic Allocation of Cores 12
Enabling Cisco Discovery Protocol 14
Configuring Command-Line Access 14
Configuring Static Routes 16
Configuring Dynamic Routes 18
Configuring Routing Information Protocol 18
Configuring Enhanced Interior Gateway Routing Protocol 22
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
iii
Contents
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
iv
Contents
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
v
Contents
Overview 99
ROMMON Images 100
Provisioning Files 100
File Systems 100
Autogenerated File Directories and Files 101
Flash Storage 102
Configuring the Configuration Register for Autoboot 102
How to Install and Upgrade the Software 103
Managing and Configuring a Device to Run Using a Consolidated Package 103
Managing and Configuring a Consolidated Package Using Copy and Boot Commands 103
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
vi
Contents
Configuring a Device to Boot the Consolidated Package via TFTP Using the Boot Command:
Example 105
Installing the Software Using install Commands 108
Restrictions for Installing the Software Using install Commands 108
Information About Installing the Software Using install Commands 108
Install Mode Process Flow 109
Booting the Platform in Install Mode 114
One-Step Installation or Converting from Bundle Mode to Install Mode 115
Three-Step Installation 116
Upgrading in Install Mode 117
Downgrading in Install Mode 118
Terminating a Software Installation 118
Configuration Examples for Installing the Software Using install Commands 118
Troubleshooting Software Installation Using install Commands 130
Managing and Configuring a Device to Run Using Individual Packages 131
Installing Subpackages from a Consolidated Package 131
Installing Subpackages from a Consolidated Package on a Flash Drive 137
Upgrading the Firmware on NIMs 138
Installing a Firmware Subpackage 147
Configuring No Service Password-Recovery 153
How to Enable No Service Password-Recovery 153
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
vii
Contents
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
viii
Contents
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
ix
Contents
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
x
Contents
CHAPTER 18 Managing Cisco Enhanced Services and Network Interface Modules 283
Information About Cisco Service Modules and Network Interface Modules 283
Modules Supported 284
Network Interface Modules and Enhanced Service Modules 284
Implementing SMs and NIMs on Your Platforms 284
Downloading the Module Firmware 284
Installing SMs and NIMs 284
Accessing Your Module Through a Console Connection or Telnet 284
Online Insertion and Removal 285
Preparing for Online Removal of a Module 285
Deactivating a Module 286
Deactivating Modules and Interfaces in Different Command Modes 287
Deactivating and Reactivating an SSD/HDD Carrier Card NIM 288
Reactivating a Module 289
Verifying the Deactivation and Activation of a Module 289
Managing Modules and Interfaces 292
Managing Module Interfaces 292
Configuration Examples 292
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xi
Contents
CHAPTER 22 Dying Gasp Through SNMP, Syslog and Ethernet OAM 319
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xii
Contents
Troubleshooting 323
System Report 323
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xiii
Contents
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xiv
Preface
This section briefly describes the objectives of this document and provides links to additional information on
related products and services:
• Objectives, on page xv
• Important Information on Features and Commands, on page xv
• Related Documentation, on page xv
• Document Conventions, on page xvi
• Obtaining Documentation and Submitting a Service Request, on page xvii
Objectives
This guide provides an overview of the Cisco Catalyst 8300 and 8200 Series Edge Platforms and explains
how to configure the various features on these routers.
Related Documentation
• Hardware Installation Guide for the Cisco C8000 Series Router
• Release Notes for the Cisco C8000 Series Routers
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xv
Preface
Document Conventions
Commands
Cisco IOS XE commands are identical in look, feel, and usage to Cisco IOS commands on most platforms.
To find reference information for a specific Cisco IOS XE command, see the Cisco IOS Master Command
List, All Releases document.
Features
The router runs Cisco IOS XE software which is used on multiple platforms. To verify support for specific
features, use the Cisco Feature Navigator tool. For more information, see Using Cisco Feature Navigator, on
page 37.
Document Conventions
This documentation uses the following conventions:
Convention Description
Convention Description
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xvi
Preface
Obtaining Documentation and Submitting a Service Request
Nested sets of square brackets or braces indicate optional or required choices within optional or required
elements. For example:
Convention Description
Convention Description
bold screen Examples of text that you must enter are set in Courier
bold font.
Caution Means reader be careful. In this situation, you might do something that could result in equipment damage or
loss of data.
Note Means reader take note. Notes contain helpful suggestions or references to materials that may not be contained
in this manual.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xvii
Preface
Preface
• To find warranty information for a specific product or product family, access Cisco Warranty Finder.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
xviii
CHAPTER 1
Overview
This chapter includes information about Cisco Catalyst 8300 and 8200 Series Edge Platforms and describes
the autonomous mode and controller mode. It contains the following sections:
• Introduction, on page 1
• Supported Modules and Features-on Cisco 8300 and 8200 Series Edge Platforms, on page 3
Introduction
The Cisco Catalyst 8300 and 8200 Series Edge Platforms are best-of-breed, 5G-ready, cloud edge platforms
designed for accelerated services, multi-layer security, cloud-native agility, and edge intelligence to accelerate
your journey to cloud.
Cisco Catalyst 8300 and 8200 Series Edge Platforms with Cisco IOS XE SD-WAN Software deliver Cisco’s
secure, cloud-scale SD-WAN solution for the branch. The Cisco Catalyst 8300 and 8200 Series Edge Platforms
is built for high performance and integrated SD-WAN Services along with flexibility to deliver security and
networking services together from the cloud or on premises. It provides higher WAN port density and a
redundant power supply capability. The Cisco Catalyst 8300 and 8200 Series Edge Platforms have a wide
variety of interface options to choose from—ranging from lower and higher module density with backward
compatibility to a variety of existing WAN, LAN, LTE, voice, and compute modules. Powered by Cisco IOS
XE, fully programmable software architecture, and API support, these platforms can facilitate automation at
scale to achieve zero-touch IT capability while migrating workloads to the cloud. The Cisco Catalyst 8300
and 8200 Series Edge Platforms also come with Trustworthy Solutions 2.0 infrastructure that secures the
platforms against threats and vulnerabilities with integrity verification and remediation of threats.
The Cisco Catalyst 8300 and 8200 Series Edge Platforms are well suited for medium-sized and large enterprise
branch offices for high WAN IPsec performance with integrated SD-WAN services.
Cisco Catalyst 8300 and 8200 Series Edge Platforms target these use-cases:
• Enterprise Branch office, Managed Service Provide CPE, Internet Gateway for DIA, SASE cloud platform
with SD-WAN
• Next-generation of Software Defined (SD) Branch routing platforms
This document is a summary of software functionality that is specific to the Cisco Catalyst 8300 and 8200
Series Edge Platforms. You can access the Cisco IOS XE and Cisco IOS XE SD-WAN functionality through
Autonomous and Controller execution modes, respectively. The Autonomous mode is the default mode for
the device and includes the Cisco IOS XE functionality. To access Cisco IOS XE SD-WAN functionality
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
1
Overview
Switch Between Controller and Autonomous Modes Using Cisco CLI
switch to the Controller mode. You can use the existing Plug and Play workflow to determine the mode of
the device.
You can use the universalk9 image to deploy both Cisco IOS XE SD-WAN and Cisco IOS XE on Cisco IOS
XE platforms. The Cisco IOS XE Amsterdam 17.3 helps in seamless upgrades of both the SD-WAN and
non-SDWAN features and deployments.
Note When the device mode is switched from autonomous to controller, the startup configuration and the information
in NVRAM (certificates), are erased. This action is same as the write erase.
When the device mode is switched from controller to autonomous, all Yang-based configuration is preserved
and can be reused if you switch back to controller mode. If you want to switch the mode from controller to
autonomous, ensue that the configuration on the device is set to auto-boot.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
2
Overview
Supported Modules and Features-on Cisco 8300 and 8200 Series Edge Platforms
• C8300-1N1S-6T
• C8200-1N-4T
• C8200L-1N-4T
Table 1: Supported Modules and Features on Cisco 8300 and 8200 Series Edge Platforms
CPU Memory 8G 8G 4G
Backplane Support 10 G 10 G 1G
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
3
Overview
Supported Modules and Features-on Cisco 8300 and 8200 Series Edge Platforms
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
4
CHAPTER 2
Basic Platform Configuration
This section includes information about some basic platform configuration in Autonomous mode, and contains
the following sections:
• Default Configuration, on page 5
• Configuring Global Parameters, on page 9
• Configuring Gigabit Ethernet Interfaces, on page 10
• Configuring a Loopback Interface, on page 11
• Configuring Module Interfaces, on page 12
• Dynamic Allocation of Cores, on page 12
• Enabling Cisco Discovery Protocol, on page 14
• Configuring Command-Line Access, on page 14
• Configuring Static Routes, on page 16
• Configuring Dynamic Routes, on page 18
Default Configuration
When you boot up the device in autonomous mode, the device looks for a default file name-the PID of the
device. For example, the Cisco Catalyst 8000 Series Edge Platforms look for a file named c8000.cfg. The
device looks for this file before finding the standard files-router-confg or the ciscortr.cfg.
The device looks for the c8000.cfg file in the bootflash. If the file is not found in the bootflash, the device
then looks for the standard files-router-confg and ciscortr.cfg. If none of the files are found, the device then
checks for any inserted USB that may have stored these files in the same particular order.
Note If there is a configuration file with the PID as its name in an inserted USB, but one of the standard files are
in bootflash, the system finds the standard file for use.
Use the show running-config command to view the initial configuration, as shown in the following example:
Router# show running-config
Building configuration...
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
5
Basic Platform Configuration
Default Configuration
version 17.3
service config
service timestamps debug datetime msec
service timestamps log datetime msec
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
platform hardware throughput crypto 1G
!
hostname Router
!
boot-start-marker
boot system bootflash:c8000be-universalk9.17.03.01prd8.SPA.bin
boot-end-marker
!
!
!
no aaa new-model
!
!
!
login on-success log
!
!
subscriber templating
!
!
multilink bundle-name authenticated
no device-tracking logging theft
!
!
!
crypto pki trustpoint TP-self-signed-2347094934
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2347094934
revocation-check none
rsakeypair TP-self-signed-2347094934
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
!
crypto pki certificate chain TP-self-signed-2347094934
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32333437 30393439 3334301E 170D3230 30353238 32333331
30325A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 33343730
39343933 34308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
6
Basic Platform Configuration
Default Configuration
!
!
license feature hseck9
license udi pid C8300-1N1S-6T sn FDO2320A0CF
!
!
!
interface GigabitEthernet0/0/0
ip dhcp client client-id ascii FDO2320A0CF
ip address dhcp
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
7
Basic Platform Configuration
Default Configuration
negotiation auto
!
interface GigabitEthernet0/0/1
no ip address
negotiation auto
!
interface GigabitEthernet0/0/2
no ip address
negotiation auto
!
interface GigabitEthernet0/0/3
no ip address
negotiation auto
!
interface GigabitEthernet0/0/4
no ip address
negotiation auto
!
interface GigabitEthernet0/0/5
no ip address
negotiation auto
!
ip http server
ip http authentication local
ip http secure-server
ip http client source-interface GigabitEthernet0/0/0
ip forward-protocol nd
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
dspfarm profile 7 conference security
shutdown
!
line con 0
exec-timeout 0 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login
transport input ssh
!
call-home
! If contact email address in call-home is configured as [email protected]
! the email address configured in Cisco Smart License Portal will be used as contact email
address to send SCH notifications.
contact-email-addr [email protected]
profile "CiscoTAC-1"
active
destination transport-method http
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
8
Basic Platform Configuration
Configuring Global Parameters
!
!
end
SUMMARY STEPS
1. configure terminal
2. hostname name
3. enable secret password
4. no ip domain-lookup
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
9
Basic Platform Configuration
Configuring Gigabit Ethernet Interfaces
SUMMARY STEPS
1. interface gigabitethernet slot/bay/port
2. ip address ip-address mask
3. ipv6 address ipv6-address/prefix
4. no shutdown
5. exit
DETAILED STEPS
Step 2 ip address ip-address mask Sets the IP address and subnet mask for the specified
Gigabit Ethernet interface. Use this Step if you are
Example:
configuring an IPv4 address.
Router(config-if)# ip address 192.0.2.2
255.255.255.0
Step 3 ipv6 address ipv6-address/prefix Sets the IPv6 address and prefix for the specified Gigabit
Ethernet interface. Use this step instead of Step 2, if you
Example:
are configuring an IPv6 address.
Router(config-if)# ipv6 address
2001.db8::ffff:1/128
Step 4 no shutdown Enables the Gigabit Ethernet interface and changes its state
from administratively down to administratively up.
Example:
Router(config-if)# no shutdown
Step 5 exit Exits configuration mode for the Gigabit Ethernet interface
and returns to privileged EXEC mode.
Example:
Router(config-if)# exit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
10
Basic Platform Configuration
Configuring a Loopback Interface
SUMMARY STEPS
1. interface type number
2. (Option 1) ip address ip-address mask
3. (Option 2) ipv6 address ipv6-address/prefix
4. exit
DETAILED STEPS
Step 2 (Option 1) ip address ip-address mask Sets the IP address and subnet mask on the loopback
interface. (If you are configuring an IPv6 address, use the
Example:
ipv6 address ipv6-address/prefix command described
below.
Router(config-if)# ip address 10.108.1.1
255.255.255.0
Step 3 (Option 2) ipv6 address ipv6-address/prefix Sets the IPv6 address and prefix on the loopback interface.
Example:
Router(config-if)# 2001:db8::ffff:1/128
Step 4 exit Exits configuration mode for the loopback interface and
returns to global configuration mode.
Example:
Router(config-if)# exit
Example
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
11
Basic Platform Configuration
Configuring Module Interfaces
!
interface loopback 0
ip address 203.0.113.1 255.255.255.255 (static IP address)
ip nat outside
!
interface Virtual-Template1
ip unnumbered loopback0
no ip directed-broadcast
ip nat outside
Enter the show interface loopback command. You should see an output similar to the following
example:
Alternatively, use the ping command to verify the loopback interface, as shown in the following
example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
12
Basic Platform Configuration
Dynamic Allocation of Cores
from the data plane. The core allocation is based on the customer configuration of the different services
available on these platforms.
From Cisco IOS XE Release 17.4 onwards, you can use the platform resource { service-plane-heavy |
data-plane-heavy } command to adjust the cores across service plane and data plane. However, you have to
reboot the device for the configured profile to take effect.
Router(config)# platform resource { service-plane-heavy | data-plane-heavy }
From Cisco IOS XE Release 17.5.1 onwards, Catalyst 8000 Series Edge Platforms supports changing the core
allocation dynamically. You do not have to reboot the devices to have the new allocation to take effect.
Following are the list of Catalyst 8000 Series Edge platforms that support changing the core allocations
dynamically:
• C8300-2N1S-6T
• C8300-2N1S-4T2X
• C8300-2N2S-6T
• C8300-2N2S-4T2X
• C8200-1N-4T
The following show command output shows the CPU cores allocaiton for the data plane :
Router# show platform software cpu alloc
Note In the above example, the maximum data plane core allocation is 7.
The following show command output shows the CPU cores allocaiton for the service plane:
Router# show platform software cpu alloc
Credits Usage:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
13
Basic Platform Configuration
Enabling Cisco Discovery Protocol
SUMMARY STEPS
1. line [| console | tty | vty] line-number
2. password password
3. login
4. exec-timeout minutes [seconds]
5. exit
6. line [| console | tty | vty] line-number
7. password password
8. login
9. end
DETAILED STEPS
Step 2 password password Specifies a unique password for the console terminal line.
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
14
Basic Platform Configuration
Configuring Command-Line Access
Router(config-line)# login
Step 4 exec-timeout minutes [seconds] Sets the interval during which the EXEC command
interpreter waits until user input is detected. The default is
Example:
10 minutes. Optionally, adds seconds to the interval value.
Router(config-line)# exec-timeout 5 30 The example provided here shows a timeout of 5 minutes
Router(config-line)# and 30 seconds. Entering a timeout of 0 0 specifies never
to time out.
Router(config-line)# exit
Step 6 line [| console | tty | vty] line-number Specifies a virtual terminal for remote console access.
Example:
Step 7 password password Specifies a unique password for the virtual terminal line.
Example:
Router(config-line)# login
Router(config-line)# end
Example
The following configuration shows the command-line access commands.
You do not have to input the commands marked default. These commands appear automatically in
the configuration file that is generated when you use the show running-config command.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
15
Basic Platform Configuration
Configuring Static Routes
!
line console 0
exec-timeout 10 0
password 4youreyesonly
login
transport input none (default)
stopbits 1 (default)
line vty 0 4
password secret
login
!
SUMMARY STEPS
1. (Option 1) ip route prefix mask {ip-address | interface-type interface-number [ip-address]}
2. (Option 2) ipv6 route prefix/mask {ipv6-address | interface-type interface-number [ipv6-address]}
3. end
DETAILED STEPS
Step 2 (Option 2) ipv6 route prefix/mask {ipv6-address | Specifies a static route for the IP packets.
interface-type interface-number [ipv6-address]}
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
16
Basic Platform Configuration
Configuring Static Routes
Router(config)# end
Verifying Configuration
In the following configuration example, the static route sends out all IP packets with a destination
IP address of 192.0.2.8 and a subnet mask of 255.255.255.0 on the Gigabit Ethernet interface to
another device with an IP address of 10.10.10.2. Specifically, the packets are sent to the configured
interface.
You do not have to enter the command marked default. This command appears automatically in the
configuration file generated when you use the running-config command.
!
ip classless (default)
ip route 192.0.2.8 255.255.255.0 10.10.10.2
To verify that you have configured static routing correctly, enter the show ip route command (or
show ipv6 route command) and look for static routes marked with the letter S.
When you use an IPv4 address, you should see verification output similar to the following:
When you use an IPv6 address, you should see verification output similar to the following:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
17
Basic Platform Configuration
Configuring Dynamic Routes
C 2001:DB8:3::/64 [0/0]
via GigabitEthernet0/0/2, directly connected
S 2001:DB8:2::/64 [1/0]
via 2001:DB8:3::1
SUMMARY STEPS
1. router rip
2. version {1 | 2}
3. network ip-address
4. no auto-summary
5. end
DETAILED STEPS
Router(config-router)# version 2
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
18
Basic Platform Configuration
Configuring Routing Information Protocol
Router(config-router)# end
Example
Verifying Configuration
To see this configuration, use the show running-config command from privileged EXEC mode.
!
Router# show running-config
Building configuration...
!
subscriber templating
!
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
19
Basic Platform Configuration
Configuring Routing Information Protocol
!
multilink bundle-name authenticated
no device-tracking logging theft
!
crypto pki trustpoint TP-self-signed-2347094934
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2347094934
revocation-check none
rsakeypair TP-self-signed-2347094934
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
!
!
!
license feature hseck9
license udi pid C8300-1N1S-6T sn FDO2320A0CF
!
interface GigabitEthernet0/0/0
ip dhcp client client-id ascii FDO2320A0CF
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
20
Basic Platform Configuration
Configuring Routing Information Protocol
ip address dhcp
negotiation auto
!
interface GigabitEthernet0/0/1
no ip address
negotiation auto
!
!
ip http server
ip http authentication local
ip http secure-server
ip http client source-interface GigabitEthernet0/0/0
ip forward-protocol nd
!
!
!
control-plane
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
dspfarm profile 7 conference security
shutdown
!
line con 0
exec-timeout 0 0
stopbits 1
line aux 0
stopbits 1
line vty 0 4
login
transport input ssh
!
call-home
! If contact email address in call-home is configured as [email protected]
! the email address configured in Cisco Smart License Portal will be used as contact email
address to send SCH notifications.
contact-email-addr [email protected]
profile "CiscoTAC-1"
active
destination transport-method http
!
!
end
To verify that you have configured RIP correctly, enter the show ip route command and look for
RIP routes marked with the letter R. You should see an output similar to the one shown in the
following example:
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
21
Basic Platform Configuration
Configuring Enhanced Interior Gateway Routing Protocol
SUMMARY STEPS
1. router eigrp as-number
2. network ip-address
3. end
DETAILED STEPS
Router(config-router)# end
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
22
Basic Platform Configuration
Configuring Enhanced Interior Gateway Routing Protocol
To verify that you have configured IP EIGRP correctly, enter the show ip route command, and look
for EIGRP routes marked by the letter D. You should see verification output similar to the following:
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
23
Basic Platform Configuration
Configuring Enhanced Interior Gateway Routing Protocol
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
24
CHAPTER 3
Using Cisco IOS XE Software
This chapter describes the basics of using the Cisco IOS XE software in autonomous mode and includes the
following section:
• Using Cisco IOS XE Software, on page 25
Procedure
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
25
Using Cisco IOS XE Software
Connecting to the Console Port
Step 1 Configure your terminal emulation software with the following settings:
• 9600 bits per second (bps)
• 8 data bits
• No parity
• No flow control
Step 2 Connect to the CON port using the RJ-45-to-RJ-45 cable and the RJ-45-to-DB-25 DTE adapter or the RJ-45-to-DB-9
DTE adapter (labeled Terminal).
Step 2 (Go to Step 3 if the enable password has not been configured.) At the password prompt, enter your system password:
Password: enablepass
When your password is accepted, the privileged EXEC mode prompt is displayed.
Router#
You now have access to the CLI in privileged EXEC mode and you can enter the necessary commands to complete your
desired tasks.
Step 3 If you enter the setup command, see “Using Cisco Setup Command Facility” in the “Initial Configuration” section of
the Hardware Installation Guide for Cisco Catalyst 8300 Series Edge Platform.
Step 4 To exit the console session, enter the quit command:
Router# quit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
26
Using Cisco IOS XE Software
Accessing the CLI from a Remote Console Using Telnet
of 360 to 4096 for your General Purpose Keys. Choosing a key modulus greater than 512 may take a few
minutes.
How many bits in the modulus [512]: 1024 % Generating 1024 bit RSA keys, keys will be non-exportable...
[OK] (elapsed time was 0 seconds)
Router(config)#
Step 4 By default, the vtys? transport is Telnet. In this case, Telnet is disabled and only SSH is supported:
Router(config)#line vty 0 4
xxx_lab(config-line)#transport input ssh
Step 5 Create a username for SSH authentication and enable login authentication:
Router(config)# username jsmith privilege 15 secret 0 p@ss3456
Router(config)#line vty 0 4
Router(config-line)# login local
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
27
Using Cisco IOS XE Software
Using Telnet to Access a Console Interface
In addition, before you make a Telnet connection to the device, you must have a valid hostname for the device
or have an IP address configured on the device. For more information about the requirements for connecting
to the device using Telnet, information about customizing your Telnet services, and using Telnet key sequences,
see the Cisco IOS Configuration Fundamentals Configuration Guide.
Step 1 From your terminal or PC, enter one of the following commands:
• connect host [port] [keyword]
• telnet host [port] [keyword]
Here, host is the device hostname or IP address, port is a decimal port number (23 is the default), and keyword is a
supported keyword. For more information about these commands, see the Cisco IOS Terminal Services Command
Reference document.
Note If you are using an access server, specify a valid port number, such as telnet 198.51.100.2 2004, in addition to
the hostname or IP address.
The following example shows how to use the telnet command to connect to a device named router:
unix_host% telnet router
Trying 198.51.100.2...
Connected to 198.51.100.2.
Escape character is '^]'.
unix_host% connect
Step 5 When the enable password is accepted, the privileged EXEC mode prompt is displayed:
Router#
Step 6 You now have access to the CLI in privileged EXEC mode and you can enter the necessary commands to complete your
desired tasks.
Step 7 To exit the Telnet session, use the exit or logout command.
Router# logout
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
28
Using Cisco IOS XE Software
Accessing the CLI from a USB Serial Console Port
Ctrl-B or the Left Arrow key1 Move the cursor back one character.
Ctrl-F or the Right Arrow key1 Move the cursor forward one character.
Command Purpose
Ctrl-P or the Up Arrow key1 Recalls commands in the history buffer, beginning
with the most recent command. Repeat the key
sequence to recall successively older commands.
Ctrl-N or the Down Arrow key1 Returns to more recent commands in the history buffer
after recalling commands with Ctrl-P or the Up
Arrow key.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
29
Using Cisco IOS XE Software
Understanding Command Modes
Command Purpose
Router# show history While in EXEC mode, lists the last few commands
you entered.
1
The arrow keys function only on ANSI-compatible terminals such as VT100s.
Privileged EXEC From user EXEC mode, Router# To return to user EXEC
use the enable command. mode, use the disable
command.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
30
Using Cisco IOS XE Software
Understanding Diagnostic Mode
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
31
Using Cisco IOS XE Software
Getting Help
• The IOS process or processes fail, in some scenarios. In other scenarios, the system resets when the IOS
process or processes fail.
• A user-configured access policy was configured using the transport-map command that directs the user
into the diagnostic mode.
• A send break signal (Ctrl-C or Ctrl-Shift-6) was entered while accessing the device, and the device was
configured to enter diagnostic mode when a break signal was sent.
In the diagnostic mode, a subset of the commands that are available in user EXEC mode are made available
to the users. Among other things, these commands can be used to:
• Inspect various states on the device, including the IOS state.
• Replace or roll back the configuration.
• Provide methods of restarting the IOS or other processes.
• Reboot hardware, such as the entire device, a module, or possibly other hardware components.
• Transfer files into or off of the device using remote access methods such as FTP, TFTP, and SCP.
The diagnostic mode provides a more comprehensive user interface for troubleshooting than previous devices,
which relied on limited access methods during failures, such as ROMMON, to diagnose and troubleshoot
Cisco IOS problems. The diagnostic mode commands can work when the Cisco IOS process is not working
properly. These commands are also available in privileged EXEC mode on the device when the device is
working normally.
Getting Help
Entering a question mark (?) at the CLI prompt displays a list of commands available for each command
mode. You can also get a list of keywords and arguments associated with any command by using the
context-sensitive help feature.
To get help that is specific to a command mode, a command, a keyword, or an argument, use one of the
following commands.
Command Purpose
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
32
Using Cisco IOS XE Software
Finding Command Options: Example
Command Purpose
Command Comment
Router> enable Enter the enable command and password to access
Password: <password>
privileged EXEC commands. You are in privileged
Router#
EXEC mode when the prompt changes to a “ # ”
from the “ > ”, for example, Router> to Router#
Router# configure terminal Enter the configure terminal privileged EXEC
Enter configuration commands, one per line.
command to enter global configuration mode. You
End with CNTL/Z.
Router(config)# are in global configuration mode when the prompt
changes to Router (config)#
Router(config)# interface GigabitEthernet ? Enter interface configuration mode by specifying
<0-1> GigabitEthernet interface number the interface that you want to configure, using the
Router(config)# interface GigabitEthernet 0/? interface GigabitEthernet global configuration
<0-5> Port Adapter number command.
Router (config)# interface GigabitEthernet 0/0/? Enter ? to display what you must enter next on the
command line.
<0-63> GigabitEthernet interface number
When the <cr> symbol is displayed, you can press
Router (config)# interface GigabitEthernet0/0/1? Enter to complete the command.
. <0-5>
Router(config-if)# You are in interface configuration mode when the
prompt changes to Router(config-if)#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
33
Using Cisco IOS XE Software
Finding Command Options: Example
Command Comment
Router(config-if)# ? Enter ? to display a list of all the interface
Interface configuration commands:
configuration commands available for the interface.
.
. This example shows only some of the available
. interface configuration commands.
ip Interface Internet Protocol
config commands
keepalive Enable keepalive
lan-name LAN Name command
llc2 LLC2 Interface Subcommands
logging Configure logging for interface
mls mls router sub/interface commands
mpoa MPOA interface configuration
commands
mtu Set the interface MTU
no Negate a command or set its
defaults
ntp Configure NTP
.
.
.
Router(config-if)#
Router(config-if)# ip address ? Enter the command that you want to configure for
A.B.C.D IP address the interface. This example uses the ip address
negotiated IP Address negotiated over
PPP command.
Router(config-if)# ip address
Enter ? to display what you must enter next on the
command line. In this example, you must enter an
IP address or the negotiated keyword.
A carriage return (<cr>) is not displayed. Therefore,
you must enter additional keywords or arguments
to complete the command.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
34
Using Cisco IOS XE Software
Using the no and default Forms of Commands
Command Comment
Router(config-if)# ip address 198.51.100.5 ? Enter the keyword or argument that you want to
A.B.C.D IP subnet mask use. This example uses the 198.51.100.5 IP address.
Router(config-if)# ip address 198.51.100.5
Enter ? to display what you must enter next on the
command line. In this example, you must enter an
IP subnet mask.
<cr> is not displayed. Therefore, you must enter
additional keywords or arguments to complete the
command.
Router(config-if)# ip address 198.51.100.5 Enter the IP subnet mask. This example uses the
255.255.255.0 ? 255.255.255.0 IP subnet mask.
secondary Make this IP address a
secondary address Enter ? to display what you must enter next on the
<cr>
Router(config-if)# ip address 198.51.100.5
command line. In this example, you can enter the
255.255.255.0 secondary keyword, or you can press Enter.
<cr> is displayed. Press Enter to complete the
command, or enter another keyword.
Router(config-if)# ip address 198.51.100.5 Press Enter to complete the command.
255.255.255.0
Router(config-if)#
It may take a few minutes to save the configuration. After the configuration has been saved, the following
output is displayed:
[OK]
Router#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
35
Using Cisco IOS XE Software
Managing Configuration Files
Example
In this example, a modifier of the show interface command (include protocol) is used to provide only the
output lines in which the expression protocol is displayed:
Router# show interface | include protocol
GigabitEthernet0/0/0 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0/0/1 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0/0/2 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0/0/3 is administratively down, line protocol is down
0 unknown protocol drops
GigabitEthernet0 is up, line protocol is up
0 unknown protocol drops
Loopback0 is up, line protocol is up
0 unknown protocol drops
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
36
Using Cisco IOS XE Software
Finding Support Information for Platforms and Cisco Software Images
Ensure that any configuration needed after startup is saved before powering off the device. The copy
running-config startup-config command saves the configuration in NVRAM and after the device is powered
up, the device initializes with the saved configuration.
Release notes are intended to be release-specific for the most current release, and the information provided
in these documents may not be cumulative in providing information about features that first appeared in
previous releases. For cumulative feature information, refer to the Cisco Feature Navigator at:
http://www.cisco.com/go/cfn/.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
37
Using Cisco IOS XE Software
Information About CLI Session Management
The value of minutes sets the amount of time that the CLI waits before timing out. Setting the CLI session timeout
increases the security of a CLI session. Specify a value of 0 for minutes to disable session timeout.
Step 2 Enter the line upon which you want to be able to use the lock command.
Router(config)# line console 0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
38
CHAPTER 4
Licenses and Licensing Models
This chapter provides information about the licenses that are available on Cisco Catalyst 8000 Edge Platforms
Family, supported throughput options, and how to configure the available licenses and throughput. It also
outlines the licensing models available on Cisco Catalyst 8000 Edge Platforms Family.
Note The information in this chapter applies predominantly to a device operating in the autonomous mode. References
to the controller mode are included in certain sections for the sake of comparison and completeness. Where
the information applies to controller mode, this has been called-out categorically.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
39
Licenses and Licensing Models
Feature Information for Available Licenses and Licensing Models
Aggregate Throughput Cisco IOS XE Cupertino On the physical platforms of Cisco Catalyst 8000
Throttling 17.8.1a Edge Platforms Family, for throughput levels greater
than 250 Mbps and Tier 2 and higher tiers, when you
configure the bidirectional throughput value on the
device, aggregate throughput throttling is effective.
This means that traffic is throttled in an aggregate
manner irrespective of the distribution of the traffic
in the upstream and downstream direction.
The bidirectional throughput is represented in the
license PID (For example, DNA-C-500M-E-3Y and
DNA-C-T2-E-3Y). The aggregate throughput is
double the bidirectional throughput.
See Throughput as a Numeric Value , on page 46 and
Throughput as a Tier, on page 50.
Tier-Based Licenses Cisco IOS XE Cupertino Support for tier-based throughput configuration was
17.7.1a introduced in addition to existing bandwidth-based
(numeric) throughput configuration.
Starting with the lowest throughput level, the available
tiers are Tier 0 (T0), Tier 1 (T1), Tier 2 (T2), and
Tier3 (T3). Each tier represents a throughput level.
If the license PID for a product is tier-based, the
license is displayed with the tier value in the CSSM
Web UI.
For a product with a tier-based license, you can
configure a tier-based throughput value, and you can
also convert to a tier-based throughput value.
Cisco Digital Network Cisco IOS XE Amsterdam Support for Cisco DNA licenses was introduced on
Architecture (DNA) 17.3.2 Cisco Catalyst 8000 Edge Platforms Family.
licenses
Cisco DNA Licenses are categorised into
network-stack licenses and a DNA-stack add-on
licenses.
High Security License Cisco IOS XE Amsterdam Support for the HSECK9 license was introduced on
(HSECK9) 17.3.2 Cisco Catalyst 8000 Edge Platforms Family.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
40
Licenses and Licensing Models
Available Licenses
Cisco Unified Border Cisco IOS XE Amsterdam Support for Cisco UBE, Cisco Unified CME, Cisco
Element license (Cisco 17.3.2 Unified SRST licenses was introduced on Cisco
UBE license) Catalyst 8000 Edge Platforms Family
Cisco Unified
Communications Manager
Express license (Cisco
Unified CME license)
Cisco Unified Survivable
Remote Site Telephony
license (Cisco Unified
SRST license)
Available Licenses
This section lists all the licenses that are available on Cisco Catalyst 8000 Edge Platforms Family, usage
guidelines, and ordering considerations.
Note A Cisco DNA license includes all feature licenses except the following: High Security (HSECK9), Cisco
Unified Border Element (Cisco UBE), Cisco Unified Communications Manager Express (Cisco Unified
CME), and Cisco Unified Survivable Remote Site Telephony (Cisco Unified SRST). See Ordering
Considerations for a Cisco DNA License, on page 43.
Cisco DNA licenses are categorized into network-stack licenses and DNA-stack add-on licenses.
Cisco DNA Licenses Available on Catalyst 8000V Edge Software, Catalyst 8200, and 8300 Series Edge
Platforms:
Network-stack licenses:
• Network Essentials
• Network Advantage: includes features available with Network Essentials, and more.
• Network Premier: includes features available Network Essentials, Network Advantage, and more.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
41
Licenses and Licensing Models
Guidelines for Using a Cisco DNA License
• Cisco DNA Premier: add-on license available only with Network Premier. Includes features available
with DNA Essentials, DNA Advantage and more.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
42
Licenses and Licensing Models
Ordering Considerations for a Cisco DNA License
If the throughput you order is greater than 250 Mbps, or Tier 2 or a higher tier, an HSECK9 license is also
required. See High Security License , on page 43.
Note The term "throughput" refers to encrypted throughput on physical platforms. On virtual platforms, it refers
to encrypted and unencrypted throughput - combined.
On all devices in the Cisco Catalyst 8000 Edge Platforms Family, the HSECK9 license as displayed as: Router
US Export Lic. for DNA (DNA_HSEC). For example:
Device# show license authorization
Overall status:
Active: PID:C8300-1N1S-4T2X,SN:FDO2250A0J5
Status: SMART AUTHORIZATION INSTALLED on Dec 03 08:24:35 2021 UTC
Last Confirmation code: 418b11b3
Authorizations:
Router US Export Lic. for DNA (DNA_HSEC):
Description: U.S. Export Restriction Compliance license for DNA based Routers
Total available count: 1
Enforcement type: EXPORT RESTRICTED
Term information:
Active: PID:C8300-1N1S-4T2X,SN:FDO2250A0J5
Authorization type: SMART AUTHORIZATION INSTALLED
License type: PERPETUAL
Term Count: 1
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
43
Licenses and Licensing Models
Guidelines for Using an HSECK9 License
Purchased Licenses:
No Purchase Information Available
Note If the HSECK9 license is ordered separately (not with the hardware order), SLAC cannot be factory-installed.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
44
Licenses and Licensing Models
Cisco Unified SRST License
For information about the features available with a Cisco Unified CME license, see the Cisco Unified
Communications Manager Express System Administrator Guide.
For information about supported platforms and about purchasing a Cisco Unified CME license, see the
datasheet at:
https://www.cisco.com/c/en/us/products/collateral/unified-communications/unified-communications-manager-express/datasheet-c78-744069.html.
You must order a Cisco Unified CME license separately if required. It is not automatically included with any
other license.
For information about how to report usage of a Cisco Unified CME license, see Smart Licensing Using Policy
for Cisco Enterprise Routing Platforms. In the context of this licensing model, a Cisco UBE license is an
unenforced license.
Throughput
The throughput tells you how much data is allowed to be transferred on the device. You can configure this
value in the autonomous mode. If you don’t explicitly configure a throughput, the default throughput is
effective.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
45
Licenses and Licensing Models
Throughput as a Numeric Value
Important For physical platforms (Catalyst 8200, 8300, and 8500 Series Edge Platforms), all references to “throughput”
in this document refer to crypto throughput. Further, on physical platforms unencrypted throughput is unthrottled
by default.
For virtual platforms (Catalyst 8000V Edge Software), all references to “throughput” in this document refer
to crypto throughput and unencrypted throughput - combined.
Throughput Value
The throughput you are entitled to, is represented in the License product ID (PID) when you order a Cisco
DNA license.
• An example of a license PID with a numeric throughput value: DNA-C-10M-E-3Y
• An example of a license PID with a tier-based throughput value: DNA-C-T0-E-3Y
Depending on the software version running on the device and the license PID you have purchased, refer to
the corresponding section below for further details.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
46
Licenses and Licensing Models
Throughput and System Hardware Throttling Specifications in the Autonomous Mode
You order license PID DNA-C-250M-A-3Y. 250 Mbps is the bi-directional throughput, 500 Mbps is
the aggregate throughput. The release-wise configuration and behaviour is as follows:
For all releases, on physical and virtual plaforms, you configure a throughput of 250 Mbps on the device.
A maximum of 250 Mbps upstream and 250 Mbps downstream throughput is available.
The recommended way to arrive at the required throughput for your network is to first calculate the aggregate
throughput (upstream and downstream) and divide that by 2 to arrive at the bidirectional throughput value.
Finally, select the license PID that is equal to or greater than the bidirectional throughput.
The tables below provide throughput specifications for all devices in the Cisco Catalyst 8000 Edge Platforms
Family:
Note Separate tables are provided for throughput specifications in the autonomous mode and SD-WAN controller
mode.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
47
Licenses and Licensing Models
Throughput and System Hardware Throttling Specifications in the Autonomous Mode
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
48
Licenses and Licensing Models
Throughput and System Hardware Throttling Specifications in the SD-WAN Controller Mode
Throughput and System Hardware Throttling Specifications in the SD-WAN Controller Mode
PID Throughput Throughput With Supported Throughput Type
Without HSECK9 HSECK9 Release
C8300-1N1S-4T2X 250M unthrottled >=17.4.1 Bi-directional; encrypted
(default 250M)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
49
Licenses and Licensing Models
Throughput as a Tier
Throughput as a Tier
Tier-based throughput configuration is supported starting with Cisco IOS XE Cupertino 17.7.1a.
A tier represents a throughput level. Starting with the lowest throughput level, the available tiers are Tier 0
(T0), Tier 1 (T1), Tier 2 (T2), and Tier 3 (T3). T2 and higher tiers require an HSECK9 license.
All tiers are not available with all Cisco DNA licenses. For example, T3 is not available with the Network
Essentials and DNA-Essentials licenses. This also means that if you have T3 as the configured throughput,
you cannot change the boot level license to Network Essentials and DNA Essentials.
The tier-based throughput value in a license PID is bi-directional - it is the maximum throughput that is allowed
in each direction (upstream and downstream). The aggregate throughput is a sum of the throughput in both
directions and therefore double the bi-directional throughput. For example, if you order license PID
DNA-C-T0-A-3Y, T0 is the bi-directional throughput, and the throughput value you configure on the device.
When you configure this value, T0 upstream and T0 downstream, is supported. T0 tier supports upto 15 Mbps
throughput. Therefore the aggregate throughput is 30 Mbps.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
50
Licenses and Licensing Models
Throughput as a Tier
Note Different platforms support different maximum throughput levels, therefore each tier means a different value
for different platforms. For example, T2 means 1G throughput for C8300-2N2S-4T2, 500M for C8200-1N-4T,
and 250M for C8200-1N-4T-L. See table Tier and Numeric Throughput Mapping for information about how
numeric throughput values are mapped to tiers.
Starting with Cisco IOS XE Cupertino 17.8.1a, when you configure T2 or a highter tier, aggregate throughput
throttling is effective. This means that traffic is throttled in an aggregate manner irrespective of the distribution
of the traffic in the upstream and downstream direction. This is supported only on physical platforms.
• Example: Throttling when throughput is T2 or a higher tier
You order license PID DNA-C-T2-A-3Y. With T2, the bi-directional throughput can be upto 1 Gbps
and the aggregate throughput can be upto 2 Gbps. The release-wise configuration and behaviour is as
follows:
• Until Cisco IOS XE Cupertino 17.7.x, on physical and virtual plaforms: You configure T2 on the
device, and depending on the device a maximum of up to 1 Gbps upstream and up to 1 Gbps
downstream throughput is supported.
• From Cisco IOS XE Cupertino 17.8.1a:
On physical platforms, you configure T2, and depending on the device, up to 2 Gbps of aggregate
throughput is available for use in any upstream and downstream ratio.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
51
Licenses and Licensing Models
Numeric vs. Tier-Based Throughput Configuration
C8300-1N1S-6T
C8300-2N2S-6T
C8300-1N1S-4T2X
C8300-2N2S-4T2X
C8200-1N-4T
C8200-1N-4T-L
C8500-12X
C8500-12X4QC
C8500L-8S4X
C8000v
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
52
Licenses and Licensing Models
Numeric vs. Tier-Based Throughput Configuration
The following scenarios further clarify when you can convert from numeric to tier-based throughput
configuration, or from tier-based throughput configuration to numeric, when conversion is required, and when
it is optional:
• You have configured a numeric throughput value on the device and the license PID is a numeric license:
You must not convert to tier-based throughput value.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
53
Licenses and Licensing Models
How to Configure Available Licenses and Throughput
• You have configured a numeric throughput value on the device and the license PID is a tier-based license:
You can convert the throughput configuration to tier-based value - but this is optional. There is no
functional impact if you do not convert to a tier-based throughput value.
If you want to convert to a tier-based value, see Converting From a Numeric Throughput Value to a Tier,
on page 65
• You are upgrading to a release where tier-based throughput values are supported and the license PID is
tier-based: You can convert the throughput to tier-based value after upgrade - but this is optional. There
is no functional impact if you do not convert to a tier-based throughput value.
See Upgrading from a Release Supporting Numeric Throughput to a Release Supporting Tiers, on page
68.
• You are upgrading to a release where tier-based throughput values are supported, and your license PID
is numeric: You must not convert to a tier-based throughput value.
• You are downgrading to a release where only numeric throughput values are supported and your license
PID and throughput configuration are tier-based: You must change configuration to a numeric throughput
value, before you downgrade.
See Downgrading from a Release Supporting Tiers to a Release Supporting Only Numeric Throughput,
on page 68.
1
If a SLAC has been factory-installed by Cisco manufactory (in case of new hardware), skip this step
2
Enter the license feature hseck9 command in global configuration mode for Catalyst 8200, and 8300 Series Edge Platforms only.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
54
Licenses and Licensing Models
Configuring a Boot Level License
SUMMARY STEPS
1. show version
2. configure terminal
3. Depending on whether the device is a physical or virtual one, configure the applicable command:
• For physical platforms: [no] license boot level {network-advantage [addon dna-advantage] |
network-essentials [addon dna-essentials] | network-premier [addon dna-premier] }
• For virtual platforms: [no] license boot level {network-advantage {addon dna-advantage} |
network-essentials {addon dna-essentials} | network-premier {addon dna-premier} }
4. exit
5. copy running-config startup-config
6. reload
7. show version
8. show license summary
9. Complete usage reporting - if required
DETAILED STEPS
-----------------------------------------------------------------
Technology Type Technology-package
Technology-package
Current Next
Reboot
-----------------------------------------------------------------
Smart License Perpetual network-advantage
network-advantage
Smart License Subscription dna-advantage
dna-advantage
<output truncated>
Step 3 Depending on whether the device is a physical or virtual Sets a boot level license.
one, configure the applicable command:
On all platforms, first configure a network-stack license.
• For physical platforms: [no] license boot level Only after this can you configure the corresponding add-on
{network-advantage [addon dna-advantage] | license.
network-essentials [addon dna-essentials] |
In the command syntax note how the configuration of a
network-premier [addon dna-premier] }
DNA-stack add-on license is optional on physical platforms,
• For virtual platforms: [no] license boot level but mandatory on virtual platforms.
{network-advantage {addon dna-advantage} |
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
55
Licenses and Licensing Models
Configuring a Boot Level License
Step 5 copy running-config startup-config Saves your entries in the configuration file.
Example:
Device# copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
<output truncated>
Step 6 reload Reloads the device. License levels configured in Step 3 are
effective and displayed only after this reload.
Example:
Device# reload
Proceed with reload? [confirm]
Step 7 show version Displays the currently set boot level license.
Example: In the accompanying example, the output confirms that
Device# show version Network Premier and DNA-Premier licenses are configured.
<output truncated>
Technology Package License Information:
-----------------------------------------------------------------
Technology Type Technology-package
Technology-package
Current Next
Reboot
-----------------------------------------------------------------
Smart License Perpetual network-premier
network-premier
Smart License Subscription dna-premier
dna-premier
<output truncated>
Step 8 show license summary Displays a summary of license usage, which includes
information about licenses being used, the count, and status.
Example:
Device# show license summary
Account Information:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
56
Licenses and Licensing Models
Installing SLAC for an HSECK9 License
License Usage:
License Entitlement Tag
Count Status
-----------------------------------------------------------------------------
network-premier_T2 (NWSTACK_T2_P)
1 IN USE
dna-premier_T2 (DSTACK_T2_P)
1 IN USE
Step 9 Complete usage reporting - if required After you configure a license level, you may have to send
a RUM report (Resource Utilization Measurement Report)
to CSSM to report license usage information. To know if
reporting is required, you can wait for a system message or
refer to the policy using show commands.
• The system message, which indicates that reporting is
required:
%SMART_LIC-6-REPORTING_REQUIRED: A
Usage report acknowledgement will be required in
[dec] days. [dec] is the amount of time (in days) left
to meet reporting requirements.
• If using show commands, refer to the output of the
show license status privileged EXEC command and
check the Next ACK deadline field. This means a
RUM report must be sent and the acknolwedgement
(ACK) from CSSM must be installed by this date.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
57
Licenses and Licensing Models
Configuring a Numeric Throughput
For Catalyst 8200 and 8300 Series Enter the license feature hseck9 command in global configuration
Edge Platforms mode. This enables the HSECK9 license on these platforms.
For the C8500L models of the Reload the device after installing SLAC.
Catalyst 8500 Series Edge
Platforms
SUMMARY STEPS
1. Depending on whether the device is a physical or virtual one, enter the applicable command:
• For physical platforms: show platform hardware throughput crypto
• For virtual platforms: show platform hardware throughput level
2. configure terminal
3. Depending on whether the device is a physical or virtual one, configure the applicable command:
• For physical platforms: platform hardware throughput crypto {100M | 10M | 15M | 1G | 2.5G |
250M | 25M | 500M | 50M}
• For virtual platforms: platform hardware throughput level MB {100 | 1000 | 10000 | 15 | 25 | 250
| 2500 | 50 | 500 | 5000}
4. exit
5. copy running-config startup-config
6. reload
7. Depending on whether the device is a physical or virtual one, enter the applicable command:
• For physical platforms: show platform hardware throughput crypto
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
58
Licenses and Licensing Models
Configuring a Numeric Throughput
DETAILED STEPS
OR
Step 3 Depending on whether the device is a physical or virtual Configures the throughput level. The displayed throughput
one, configure the applicable command: options depend on the device.
• For physical platforms: platform hardware The following apply to both physical and virtual platforms:
throughput crypto {100M | 10M | 15M | 1G | 2.5G
• At a minimum, you must have configured a
| 250M | 25M | 500M | 50M}
network-stack license already. Otherwise the command
• For virtual platforms: platform hardware throughput is not recognized as a valid one on the command line
level MB {100 | 1000 | 10000 | 15 | 25 | 250 | 2500 | interface.
50 | 500 | 5000}
• If you are configuring throughput greater than 250
Example:
Mbps, you must have already installed SLAC. Options
Device(config)# platform hardware throughput crypto greater than 250 Mbps are displayed only if SLAC is
?
100M 100 mbps bidirectional thput
installed.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
59
Licenses and Licensing Models
Configuring a Numeric Throughput
OR
Step 5 copy running-config startup-config Saves your entries in the configuration file.
Example:
Device# copy running-config startup-config
Step 7 Depending on whether the device is a physical or virtual Displays the currently running throughput on the device.
one, enter the applicable command:
Note On physical platforms, you can also enter the
• For physical platforms: show platform hardware show platform hardware qfp active feature
throughput crypto ipsec state privileged EXEC command to display
• For virtual platforms: show platform hardware the configured throughput level.
throughput level
Example:
Device# show platform hardware throughput crypto
Current configured crypto throughput level: 1G
Level is saved, reboot is not required
Current enforced crypto throughput level: 1G
Crypto Throughput is throttled at 2G(Aggregate)
Default Crypto throughput level: 10M
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
60
Licenses and Licensing Models
Configuring a Tier-Based Throughput
• Note the throughput you are entitled to. This is indicated in the Cisco DNA license PID you purchase.
SUMMARY STEPS
1. Depending on whether the device is a physical or virtual one, enter the applicable command:
• For physical platforms: show platform hardware throughput crypto
• For virtual platforms: show platform hardware throughput level
2. show license authorization
3. configure terminal
4. Depending on whether the device is a physical or virtual one, configure the applicable command:
• For physical platforms: platform hardware throughput crypto {T0 | T1 | T2 | T3}
• For virtual platforms: platform hardware throughput level MB {T0 | T1 | T2 | T3 }
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
61
Licenses and Licensing Models
Configuring a Tier-Based Throughput
5. exit
6. copy running-config startup-config
7. reload
8. Depending on whether the device is a physical or virtual one, enter the applicable command:
• For physical platforms: show platform hardware throughput crypto
• For virtual platforms: show platform hardware throughput level
DETAILED STEPS
OR
Step 2 show license authorization (Optional) Displays SLAC information on the product
instance.
Example:
Device# show license authorization In the accompanying example:
Overall status:
Active: PID:C8300-2N2S-4T2X,SN:FDO2250A0J5 • SLAC is installed on the physical platform. This is so
Status: SMART AUTHORIZATION INSTALLED on Mar we can configure T2 in the subsequent steps.
02 05:05:19 2022 UTC
Last Confirmation code: 418b11b3 • SLAC is not available on the virtual platform. Note
how this affects throughput configuration in the
Authorizations: subsequent steps.
Router US Export Lic. for DNA (DNA_HSEC):
Description: U.S. Export Restriction Compliance
license for
DNA based Routers
Total available count: 1
Enforcement type: EXPORT RESTRICTED
Term information:
Active: PID:C8300-1N1S-4T2X,SN:FDO2250A0J5
Authorization type: SMART AUTHORIZATION
INSTALLED
License type: PERPETUAL
Term Count: 1
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
62
Licenses and Licensing Models
Configuring a Tier-Based Throughput
Purchased Licenses:
No Purchase Information Available
OR
Step 4 Depending on whether the device is a physical or virtual Configures a tier-based throughput. The throughput options
one, configure the applicable command: that are displayed, depend on the device.
• For physical platforms: platform hardware Note Only tiers are mentioned in command, for the
throughput crypto {T0 | T1 | T2 | T3} sake of clarity. When you enter the command on
• For virtual platforms: platform hardware throughput the CLI, numeric and tier values are displayed -
level MB {T0 | T1 | T2 | T3 } as shown in the accompanying examples.
Example: The following apply to both physical and virtual platforms:
Device(config)# platform hardware throughput crypto
? • You have configured a boot level license already.
100M 100 mbps bidirectional thput Otherwise the command for throughput configuration
is not recognized as a valid one on the command line
10M 10 mbps bidirectional thput
interface.
15M 15 mbps bidirectional thput
• If you are configuring T2 or a higher tier, you have
1G 2 gbps aggregate thput installed SLAC.
2.5G 5 gbps aggregate thput Note On a physical platform, you will not be able
to configure T2 or a higher tier if SLAC is
250M 250 mbps bidirectional thput not installed.
25M 25 mbps bidirectional thput On a virtual platform, if you configure T2
or a higher tier without SLAC, the product
500M 1gbps aggregate thput
instance automatically tries to reach CSSM
50M 50 mbps bidirectional thput to request and install SLAC. If it is
successful, throughput is set to the
T0 T0(up to 15 mbps) bidirectional thput configured tier. If it is not successful, the
T1 T1(up to 100 mbps) bidirectional thput
system sets the throughput to 250 Mbps. If
and when SLAC is installed, the throughput
T2 T2(up to 2 gbps) aggregate thput is automatically set to the last configured
value.
T3 T3(up to 5 gbps) aggregate thput
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
63
Licenses and Licensing Models
Configuring a Tier-Based Throughput
Step 6 copy running-config startup-config Saves your entries in the configuration file.
Example:
Device# copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
Step 8 Depending on whether the device is a physical or virtual Displays the currently running throughput on the device.
one, enter the applicable command:
In the accompanying examples:
• For physical platforms: show platform hardware
• On the physical platform, the tier value is set to T2.
throughput crypto
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
64
Licenses and Licensing Models
Converting From a Numeric Throughput Value to a Tier
SUMMARY STEPS
1. Depending on whether the device is a physical or virtual one, enter the applicable command:
• For physical platforms: show platform hardware throughput crypto
• For virtual platforms: show platform hardware throughput level
2. Depending on whether the device is a physical or virtual one, enter the applicable command:
• For physical platforms: license throughput crypto auto-convert
• For virtual platforms: license throughput level auto-convert
3. copy running-config startup-config
4. reload
5. Depending on whether the device is a physical or virtual one, enter the applicable command:
• For physical platforms: show platform hardware throughput crypto
• For virtual platforms: show platform hardware throughput level
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
65
Licenses and Licensing Models
Converting From a Numeric Throughput Value to a Tier
DETAILED STEPS
OR
Step 2 Depending on whether the device is a physical or virtual Converts the numeric throughput to a tier-based throughput
one, enter the applicable command: value. The converted tier value is displayed on the CLI.
• For physical platforms: license throughput crypto
auto-convert
• For virtual platforms: license throughput level
auto-convert
Example:
Device# license throughput crypto auto-convert
Crypto throughput auto-convert from level 500M to
T2
OR
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
66
Licenses and Licensing Models
Converting From a Numeric Throughput Value to a Tier
Step 5 Depending on whether the device is a physical or virtual Displays the currently running throughput on the device.
one, enter the applicable command:
• For physical platforms: show platform hardware
throughput crypto
• For virtual platforms: show platform hardware
throughput level
Example:
Device# show platform hardware throughput crypto
Current configured crypto throughput level: T2
Level is saved, reboot is not required
Current enforced crypto throughput level: 1G
Crypto Throughput is throttled at 1G
Default Crypto throughput level: 10M
Current boot level is network-premier
OR
Step 6 Verify that conversion is complete. Tip To cross-check that conversion is complete, you
can also enter the conversion command again.
• For physical platforms: license throughput crypto
If the numeric throughput value has already been
auto-convert
converted, the system displays a message
• For virtual platforms: license throughput level confirming this.
auto-convert
Example:
Device# license throughput crypto auto-convert
Crypto throughput is already tier based, no need
to convert.
OR
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
67
Licenses and Licensing Models
Upgrading from a Release Supporting Numeric Throughput to a Release Supporting Tiers
Note There is no functional impact if you have tier-based license PID in CSSM and a numeric throughput value is
configured on the device.
If you want to convert to a tier-based value note the required action depending on the throughput level that
is configured:
Throughput Configuration Action Before Upgrade Action After Upgrade to 17.7.1 or Later
Before Upgrade
Lesser than 250 Mbps No action required. Converting From a Numeric Throughput
Value to a Tier, on page 65
Equal to 250 Mbps Obtain an HSECK9 license and install Converting From a Numeric Throughput
SLAC if you want to convert to T2. Value to a Tier, on page 65
Greater than 250 Mbps No action required. Converting From a Numeric Throughput
Value to a Tier, on page 65
Caution If a tier-based throughput value was configured before downgrade and you downgrade without changing to
a numeric value, tier configuration is not recognized by a pre-17.7.1 image and configuration fails. Further,
throughput may not be restored to the pre-downgrade level and you have to configure a numeric throughput
level after downgrade.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
68
Licenses and Licensing Models
Available Licensing Models
Note This licensing model is available only on Catalyst 8000V Edge Software.
Cisco Catalyst 8000V supports the PAYG licensing model with Amazon Web Services (AWS) and Microsoft
Azure Marketplace - in both the autonomous mode and the controller mode. The Cisco Catalyst 8000V
hourly-billed Amazon Machine Image (AMI) or the Pay As You Go licensing model allows you to consume
an instance for a defined period of time.
• In the autonomous mode, you can directly launch an instance from the AWS or Azure Marketplace and
start using it. The licenses are embedded in the image and the selected license package and configured
throughput level are effective when you launch the instance
• In the controller mode, which is supported from Cisco IOS-XE Bengaluru 17.5.1, you must first onboard
the device into Cisco SD-WAN as per Onboard Cisco Catalyst 8000V Edge Software Hosted by a Cloud
Service, Using PAYG Licensing. After this, when you launch the instance from AWS, the device comes-up
with the license already installed for unlimited throughput.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
69
Licenses and Licensing Models
Available Licensing Models
Note This licensing model is supported on all products in the Cisco Catalyst 8000 Edge Platforms Family in the
Cisco SD-WAN controller mode.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
70
CHAPTER 5
Change of Authorization
Change of Authorization (CoA) provides a mechanism to change the attributes of an authentication,
authorization, and accounting (AAA) session after it is authenticated.
Identity-Based Networking Services supports change of authorization (CoA) commands for session query,
reauthentication, and termination, port bounce and port shutdown, and service template activation and
deactivation.
• Feature Information for Change of Authorization, on page 71
• Information About Change of Authorization, on page 72
• Restrictions for Change of Authorization, on page 74
• How to Configure Change of Authorization, on page 75
• Configuration Examples for Change of Authorization, on page 76
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
71
Change of Authorization
Information About Change of Authorization
When a policy changes for a user or user group in AAA, administrators can send RADIUS CoA packets from
the AAA server, such as a Cisco Identity Secure Engine (ISE) to reinitialize authentication and apply the new
policy. This section provides an overview of the RADIUS interface including available primitives and how
they are used during a CoA.
The RADIUS CoA provides a mechanism to change the attributes of an AAA session after it is authenticated.
When policy changed on user or user group in RADIUS server, administrators can initiate RADIUS CoA
process from RADIUS server to re-authenticate or re-authorize new policy
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
72
Change of Authorization
Change of Authorization-Reauthentication Procedure
By default, the RADIUS interface is enabled on the device. However, some basic configuration is required
for the following attributes:
• Security and Password
• Accounting
After posture assessment is succeessful, full network access is pushed down to the device for specific client
through CoA re-authentication command based on its compliance state derived from last assessment. It is
optional to enforce downloadable ACLs with Permit-ALL or limited access to certain resources to corresponding
clients. Per-session CoA requests are supported for session identification, session termination, host
reauthentication, port shutdown, and port bounce. This model comprises one request (CoA-Request) and two
possible response codes:
• CoA acknowledgement (ACK) [CoA-ACK]
• CoA nonacknowledgement (NAK) [CoA-NAK]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
73
Change of Authorization
Change of Authorization
Change of Authorization
Change of Authorization (CoA) is a critical part of a solution to initiate re-authenticate or re-authorization to
an endpoint’s network access based on its posture assessment result. This feature is integrated with Cisco
AnyConnect, version 4.8 and Cisco ISE, version 2.6.
The network topology below shows a typical Cisco 1000 Series Integrated Services Router as a branch router
in a network for secure access with ISE and other network services deployed in Campus or Data Center.
Figure 2: Cisco ISR1000 in a Network for Secure Access with ISE and other Network Services
CoA is critical part of the solution to initiate re-authenticate or re-authorization to endpoint’s network access
based on its posture assessment result. Downloadable ACL is the Target/Purpose of the entire solution. The
per-client basis customized security policies are achieved by it.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
74
Change of Authorization
How to Configure Change of Authorization
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
75
Change of Authorization
Configuration Examples for Change of Authorization
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
76
Change of Authorization
Example: Device Tracking Policy
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
77
Change of Authorization
Example: Device Tracking Policy
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
78
CHAPTER 6
Managing the Device Using Web User Interface
The Web User Interface (Web UI) is an embedded GUI-based device-management tool that provides the
ability to provision the device, to simplify device deployment and manageability, and to enhance the user
experience. It comes with the default image, so there is no need to enable anything or install any license on
the device. You can use WebUI to build configurations, and to monitor and troubleshoot the device without
having CLI expertise. This chapter includes the these sections:
• Setting Up Factory Default Device Using Web UI , on page 79
• Using Web User Interface for Day One Setup, on page 83
• Monitor and Troubleshoot Device Plug and Play (PnP) Onboarding using WebUI , on page 84
Note Before you access the Web UI, you need to have the basic configuration on the device.
Step 1 Connect the RJ-45 end of a serial cable to the RJ-45 console port on the router.
Step 2 After the device initial configuration wizard appears, enter No to get into the device prompt when the following system
message appears on the router.
Would you like to enter the initial configuration dialog? [yes/no]: no
Step 3 From the configuration mode, enter the following configuration parameters.
!
ip dhcp pool WEBUIPool
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
Step 4 Connect the PC to the router using an Ethernet cable to the gig 0/0/1 interface.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
79
Managing the Device Using Web User Interface
Using Basic or Advanced Mode Setup Wizard
Step 5 Set up your PC as a DHCP client to obtain the IP address of the router automatically.
Step 6 Launch the browser and enter the device IP address in your browser’s address line. For a secure connection, type
https://192.168.1.1/#/dayZeroRouting. For a less secure connection, enter http://192.168.1.1/#/dayZeroRouting.
Step 7 Enter the default username (admin) and the password as default.
Step 1 Choose the Basic Mode or Advanced Mode and click Go To Account Creation Page.
Step 2 Enter the username and password. Reenter the password to confirm.
Step 3 Click Create and Launch Wizard.
Step 4 Enter the device name and domain name.
Step 5 Select the appropriate time zone from the Time Zone drop-down list.
Step 6 Select the appropriate date and time mode from the Date and Time drop-down list.
Step 7 Click LAN Settings.
Step 1 Choose the Web DHCP Pool/DHCP Pool name or the Create and Associate Access VLAN option.
a) If you choose the Web DHCP Pool, specify the following:
Pool Name—Enter the DHCP Pool Name.
Network—Enter network address and the subnet mask.
b) If you choose the Create and Associate Access VLAN option, specify the following:
Access VLAN—Enter the Access VLAN identification number. The range is from 1 to 4094.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
80
Managing the Device Using Web User Interface
Configure Primary WAN Settings
Step 1 Select the primary WAN type. You con configure Serial, 3G/4G, Ethernet, or Broadband (xDSL) as primary WAN
depending on the WAN types supported by the router.
Step 2 Select the interface from the drop-down list.
Step 3 Check the Get DNS Server info directly from ISP check box to get the DNS server information directly from the service
provider. You can also manually enter the Primary DNS and Secondary DNS.
Step 4 Check the Get IP automatically from ISP check box to get the IP address information directly from the service provider.
You can also manually enter the IP address and subnet mask.
Step 5 Check the Enable NAT check box to enable NAT. It is recommended to enable NAT.
Step 6 Check the Enable PPPOE check box to enable PPPoE. If you have enabled PPPoE, select the required authentication
mode. The options are: PAP and CHAP.
Step 7 Enter the user name and password provided by the service provider.
Step 8 Click Security / APP Visibility WAN Settings.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
81
Managing the Device Using Web User Interface
Configure Secondary WAN Settings
Step 1 Select the secondary WAN type. You con configure Serial, 3G/4G, Ethernet, or Broadband (xDSL) as a secondary WAN
depending on the WAN types supported by the router.
Step 2 Select the interface from the drop-down list.
Step 3 Check the Get DNS Server info directly from ISP check box to get the DNS server information directly from the service
provider. You can also manually enter the Primary DNS and Secondary DNS.
Step 4 Check the Get IP automatically from ISP check box to get the IP address information directly from the service provider.
You can also manually enter the IP address and subnet mask.
Step 5 Check the Enable NAT check box to enable NAT. It is recommended to enable NAT.
Step 6 Check the Enable PPPOE check box to enable PPPoE. If you have enabled PPPoE, select the required authentication
mode. The options are PAP and CHAP .
Step 7 Enter the user name and password provided by the service provider.
Step 8 Click Security / APP Visibility WAN Settings.
Step 1 Check the Enable Cisco Recommended Security Settings check box to ensure that all passwords are not shown in plain
text. The passwords are encrypted.
Step 2 Click Day 0 Config Summary.
Step 3 To preview the configuration, click CLI Preview to preview the configuration.
Step 4 Click Finish to complete the Day Zero setup.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
82
Managing the Device Using Web User Interface
Using Web User Interface for Day One Setup
Step 1 Configure the HTTP server. By default, the HTTP server configuration should be present on the device. Ensure the
configuration by checking if the ip http server and ip http secure-server commands are present in the running
configuration.
Device #configure terminal
Device (config)#ip http server
Device (config)#ip http secure-server
Step 2 Set up the authentication options to log into Web UI. You can use one of these methods to authenticate:
a) You can authenicate using local database. To use a local database for Web UI authentication, ensure to have the ip
http authentication local command in the running configuration. This command is preconfigured on the device. If
the command is not present, configure the device as shown in this example:
Device #configure terminal
Device (config)#ip http authentication local
Note You need a user with privilege 15 to access the configuration screens on Web UI. If the privilege is less
than 15, you can access only the Dashboard and Monitoring screens on Web UI.
To create a user account, use the username <username> privilege <privilege> password 0 <passwordtext>
Device #configure terminal
Device (config)# username <username> privilege <privilege> password 0 <passwordtext>
b) Authenticate using AAA options. To use AAA authentication for Web UI, ensure to configure ‘ip http authentication
aaa’ on the device. Also, ensure that the required AAA server configuration is present on the device.
Device #configure terminal
Device (config)#ip http authentication local
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
83
Managing the Device Using Web User Interface
Monitor and Troubleshoot Device Plug and Play (PnP) Onboarding using WebUI
Step 3 Launch the browser. In the address bar, type the IP address of the device. For a secure connection, type https://ip-address.
Step 4 Enter the default username (cisco) and password provided with the device
Step 5 Click Log In.
Monitor and Troubleshoot Device Cisco IOS XE Release 17.5.1a You can now monitor and
PnP Onboarding using WebUI troubleshoot your Day-0 device
onboarding using WebUI through
PnP onboarding. If the automated
PnP onboarding fails, you can
manually onboard your device.
A device can be automatically onboarded to Cisco vManage through either Zero Touch Provisioning (ZTP)
or the Plug and Play (PnP) process. This section describes the procedure to monitor and troubleshoot device
onboarding through the PnP method. This feature on WebUI enables you to monitor and troubleshoot the PnP
onboarding process, and also see its real-time status. If this onboarding is stuck or fails, you can terminate
the process and onboard your device manually.
Prerequisites
• Your device (a computer that can run a web browser) running the WebUI and the device you are
onboarding must be connected through an L2 switch port (NIM) on the device.
• The DHCP client-identifier on your device must be set to string “webui”.
• Your device must support Cisco SD-WAN Day-0 device onboarding on WebUI.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
84
Managing the Device Using Web User Interface
Monitor and Troubleshoot Device Plug and Play (PnP) Onboarding using WebUI
Note If the device does not have start-up configuration at the time of PnP onboarding, the WebUI is
enabled by default on supported devices.
2. On the Welcome to Cisco SDWAN Onboarding Wizard page, click Reset Default Password.
Note The default password of your Day-0 device is weak. Therefore, for a secure log in, you must reset
the password when you first log in to the device on WebUI. The WebUI configuration is
automatically deleted after the device is onboarded successfully. In rare cases where the template
configuration for your device on Cisco vManage has the WebUI configuration, it is not deleted
even after a successful device onboarding.
3. You are redirected to the Device hardware and software details page. Enter your password and click
Submit.
4. The next page displays the onboarding progress and lists statuses of different components of the PnP
Connect Portal and Cisco SD-WAN controllers. If the PnP IPv4 component fails, it indicates that the
device PnP onboarding has failed.
To view and download logs for the onboarding process, click the information icon on the right hand
side of the SDWAN Onboarding Progress bar.
5. If the automated PnP onboarding fails, click Terminate Automated Onboarding. This allows you to
onboard your device manually.
6. A dialogue box appears. To continue with the termination, click Yes. It might take a few minutes for
the termination to complete.
7. On the Bootstrap Configuration page click Select File and choose the bootstrap file for your device.
This file can be either a generic bootstrap file (common platform-specific file) or a full configuration
bootstrap file that you can download from Cisco vManage. This file must contain details such as the
vBond number, UUID, WAN interface, root CA and configuration.
8. Click Upload.
9. After your file is successfully uploaded, click Submit.
10. You can see the SDWAN Onboarding Progress page again with statuses of the Cisco SD-WAN
controllers. To open the Controller Connection History table click the information icon on the right
hand side of the SDWAN Control Connections bar. In this table you can see the state of your onboarded
device. After the onboarding is complete, the state of your device changes to connect.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
85
Managing the Device Using Web User Interface
Monitor and Troubleshoot Device Plug and Play (PnP) Onboarding using WebUI
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
86
CHAPTER 7
Console Port, Telnet, and SSH Handling
This chapter includes the following sections:
• Notes and Restrictions for Console Port, Telnet, and SSH, on page 87
• Console Port Overview, on page 87
• Console Port Handling Overview, on page 88
• Telnet and SSH Overview, on page 88
• Configuring a Console Port Transport Map, on page 88
• Configuring Persistent SSH, on page 90
• Viewing Console Port, SSH, and Telnet Handling Configurations, on page 93
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
87
Console Port, Telnet, and SSH Handling
Console Port Handling Overview
SUMMARY STEPS
1. enable
2. configure terminal
3. transport-map type console transport-map-name
4. connection wait [allow [interruptible] | none [disconnect]]
5. (Optional) banner [diagnostic | wait] banner-message
6. exit
7. transport type console console-line-number input transport-map-name
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
88
Console Port, Telnet, and SSH Handling
Configuring a Console Port Transport Map
Router> enable
Step 3 transport-map type console transport-map-name Creates and names a transport map for handling console
connections, and enters transport map configuration mode.
Example:
Step 4 connection wait [allow [interruptible] | none Specifies how a console connection will be handled using
[disconnect]] this transport map.
Example: • allow interruptible—The console connection waits
for a Cisco IOS VTY line to become available, and
Router(config-tmap)# connection wait none also allows users to enter diagnostic mode by
interrupting a console connection that is waiting for a
Cisco IOS VTY line to become available. This is the
default setting.
Note Users can interrupt a waiting connection by
entering Ctrl-C or Ctrl-Shift-6.
• none—The console connection immediately enters
diagnostic mode.
Step 5 (Optional) banner [diagnostic | wait] banner-message (Optional) Creates a banner message that will be seen by
users entering diagnostic mode or waiting for the Cisco IOS
Example:
VTY line because of the console transport map
configuration.
Router(config-tmap)# banner diagnostic X
Enter TEXT message. End with the character 'X'. • diagnostic—Creates a banner message seen by users
--Welcome to Diagnostic Mode--
directed to diagnostic mode because of the console
X
Router(config-tmap)# transport map configuration.
Note Users can interrupt a waiting connection by
entering Ctrl-C or Ctrl-Shift-6.
• wait—Creates a banner message seen by users waiting
for Cisco IOS VTY to become available.
• banner-message—Banner message, which begins and
ends with the same delimiting character.
Router(config-tmap)# exit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
89
Console Port, Telnet, and SSH Handling
Configuring Persistent SSH
Examples
The following example shows how to create a transport map to set console port access policies and
attach to console port 0:
Router(config)# transport-map type console consolehandler
Router(config-tmap)# connection wait allow interruptible
Router(config-tmap)# banner diagnostic X
Enter TEXT message. End with the character 'X'.
--Welcome to diagnostic mode--
X
Router(config-tmap)# banner wait X
Enter TEXT message. End with the character 'X'.
Waiting for IOS vty line
X
Router(config-tmap)# exit
Router(config)# transport type console 0 input consolehandler
SUMMARY STEPS
1. enable
2. configure terminal
3. transport-map type persistent ssh transport-map-name
4. connection wait [allow [interruptible] | none [disconnect]]
5. rsa keypair-name rsa-keypair-name
6. (Optional) authentication-retries number-of-retries
7. (Optional) banner [diagnostic | wait] banner-message
8. (Optional) time-out timeout-interval
9. transport interface gigabitethernet 0
10. exit
11. transport type persistent ssh input transport-map-name
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
90
Console Port, Telnet, and SSH Handling
Configuring Persistent SSH
Router> enable
Step 3 transport-map type persistent ssh Creates and names a transport map for handling persistent
transport-map-name SSH connections, and enters transport map configuration
mode.
Example:
Step 4 connection wait [allow [interruptible] | none Specifies how a persistent SSH connection will be handled
[disconnect]] using this transport map:
Example: • allow—The SSH connection waits for a Cisco IOS
VTY line to become available, and exits the device
Router(config-tmap)# connection wait interruptible if interrupted.
• allow interruptible—The SSH connection waits for
the VTY line to become available, and also allows a
user to enter diagnostic mode by interrupting an SSH
connection waiting for the VTY line to become
available. This is the default setting.
Note Users can interrupt a waiting connection
by entering Ctrl-C or Ctrl-Shift-6.
• none—The SSH connection immediately enters
diagnostic mode.
• none disconnect—The SSH connection does not wait
for the VTY line and does not enter diagnostic mode.
Therefore, all SSH connections are rejected if no VTY
line is immediately available.
Step 5 rsa keypair-name rsa-keypair-name Names the RSA keypair to be used for persistent SSH
connections.
Example:
For persistent SSH connections, the RSA keypair name
Router(config)# rsa keypair-name sshkeys must be defined using this command in transport map
configuration mode. The RSA keypair definitions defined
elsewhere on the device, such as through the use of the ip
ssh rsa keypair-name command, do not apply to persistent
SSH connections.
No rsa-keypair-name is defined by default.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
91
Console Port, Telnet, and SSH Handling
Configuring Persistent SSH
Step 7 (Optional) banner [diagnostic | wait] (Optional) Creates a banner message that will be seen by
banner-message users entering diagnostic mode or waiting for the VTY
line because of the persistent SSH configuration.
Example:
• diagnostic—Creates a banner message seen by users
Router(config-tmap)# banner diagnostic X directed to diagnostic mode because of the persistent
Enter TEXT message. End with the character 'X'. SSH configuration.
--Welcome to Diagnostic Mode--
X • wait—Creates a banner message seen by users
Router(config-tmap)#
waiting for the VTY line to become available.
• banner-message—The banner message, which begins
and ends with the same delimiting character.
Step 8 (Optional) time-out timeout-interval (Optional) Specifies the SSH time-out interval, in seconds.
Example: The default timeout-interval is 120 seconds.
Router(config-tmap)# time-out 30
Step 9 transport interface gigabitethernet 0 Applies the transport map settings to the Ethernet
management interface (interface gigabitethernet 0).
Example:
Persistent SSH can be applied only to the Ethernet
Router(config-tmap)# transport interface management interface on the router.
gigabitethernet 0/0/0
Router(config-tmap)# exit
Step 11 transport type persistent ssh input Applies the settings defined in the transport map to the
transport-map-name Ethernet management interface.
Example: The transport-map-name for this command must match
the transport-map-name defined in the transport-map
Router(config)# transport type persistent ssh type persistent ssh command.
input sshhandler
Examples
The following example shows a transport map that will make all SSH connections wait for the VTY
line to become active before connecting to the router being configured and applied to the Ethernet
management interface (interface gigabitethernet 0/0/0). The RSA keypair is named sshkeys.
This example only uses the commands required to configure persistent SSH.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
92
Console Port, Telnet, and SSH Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
In the following example, a transport map is configured and will apply the following settings to users
attempting to access the Ethernet management port via SSH:
• SSH users will wait for the VTY line to become active, but will enter diagnostic mode if the
attempt to access the Cisco IOS software through the VTY line is interrupted.
• The RSA keypair name is sshkeys.
• The connection allows one authentication retry.
• The banner --Welcome to Diagnostic Mode-- will appear if diagnostic mode is entered as
a result of SSH handling through this transport map.
• The banner --Waiting for vty line-- will appear if the connection is waiting for the VTY
line to become active.
• The transport map is then applied to the interface when the transport type persistent ssh input
command is entered to enable persistent SSH:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
93
Console Port, Telnet, and SSH Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
Example
The following example shows transport maps that are configured on the device: a console port
(consolehandler), persistent SSH (sshhandler), and persistent Telnet transport (telnethandler):
Router# show transport-map all
Transport Map:
Name: consolehandler
Type: Console Transport
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
bshell banner:
Transport Map:
Name: sshhandler
Type: Persistent SSH Transport
Interface:
GigabitEthernet0/0/0
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Bshell banner:
Welcome to Diagnostic Mode
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Bshell banner:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
94
Console Port, Telnet, and SSH Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
Name: sshhandler
Type: Persistent SSH Transport
Interface:
GigabitEthernet0
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Bshell banner:
SSH:
Timeout: 120
Authentication retries: 5
RSA keypair: sshkeys
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Bshell banner:
Use the show platform software configuration access policy command to view the current configurations
for handling the incoming console port, SSH, and Telnet connections. The output of this command provides
the current wait policy for each type of connection (Telnet, SSH, and console), as well as information on the
currently configured banners.
Unlike the show transport-map command, the show platform software configuration access policy
command is available in diagnostic mode so that it can be entered in scenarios where you need transport map
configuration information, but cannot access the Cisco IOS CLI.
Example
Router# show platform software configuration access policy
The current access-policies
Method : telnet
Rule : wait
Shell banner:
Wait banner :
Method : ssh
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
95
Console Port, Telnet, and SSH Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
Rule : wait
Shell banner:
Wait banner :
Method : console
Rule : wait with interrupt
Shell banner:
Wait banner :
Example
The following example shows the show platform software configuration access policy command
being issued both before and after a new transport map for SSH are configured. During the
configuration, the connection policy and banners are set for a persistent SSH transport map, and the
transport map for SSH is enabled.
Router# show platform software configuration access policy
The current access-policies
Method : telnet
Rule : wait with interrupt
Shell banner:
Welcome to Diagnostic Mode
Wait banner :
Waiting for IOS Process
Method : ssh
Rule : wait
Shell banner:
Wait banner :
Method : console
Rule : wait with interrupt
Shell banner:
Wait banner :
Method : telnet
Rule : wait with interrupt
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
96
Console Port, Telnet, and SSH Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
Shell banner:
Welcome to Diagnostic Mode
Wait banner :
Waiting for IOS process
Method : ssh
Rule : wait with interrupt
Shell banner:
Welcome to Diag Mode
Wait banner :
Waiting for IOS
Method : console
Rule : wait with interrupt
Shell banner:
Wait banner :
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
97
Console Port, Telnet, and SSH Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
98
CHAPTER 8
Installing the Software
This chapter includes the following sections:
• Overview, on page 99
• ROMMON Images, on page 100
• Provisioning Files, on page 100
• File Systems, on page 100
• Autogenerated File Directories and Files, on page 101
• Flash Storage, on page 102
• Configuring the Configuration Register for Autoboot, on page 102
• How to Install and Upgrade the Software, on page 103
• Installing the Software Using install Commands, on page 108
• Managing and Configuring a Device to Run Using Individual Packages, on page 131
• Upgrading the Firmware on NIMs, on page 138
• Installing a Firmware Subpackage, on page 147
• Configuring No Service Password-Recovery, on page 153
Overview
Installing software on the router involves installing a consolidated package (bootable image). This consists
of a bundle of subpackages (modular software units), with each subpackage controlling a different set of
functions.
These are the two main methods to install the software:
• Managing and Configuring a Device to Run Using a Consolidated Package, on page 103—This method
allows for individual upgrade of subpackages and generally has reduced boot times compared to the
method below. Use this method if you want to individually upgrade a module's software.
• Managing and Configuring a Device to Run Using Individual Packages, on page 131—This a simple
method that is similar to a typical Cisco router image installation and management that is supported
across Cisco routers.
It is better to upgrade software in a planned period of maintenance when an interruption in service is acceptable.
The router needs to be rebooted for a software upgrade to take effect.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
99
Installing the Software
ROMMON Images
ROMMON Images
A ROMMON image is a software package used by ROM Monitor (ROMMON) software on a router. The
software package is separate from the consolidated package normally used to boot the router. For more
information on ROMMON, see Hardware Installation Guide for the Cisco Catalyst 8000 Series Edge Platforms..
An independent ROMMON image (software package) may occasionally be released and the router can be
upgraded with the new ROMMON software. For detailed instructions, see the documentation that accompanies
the ROMMON image.
Note A new version of the ROMMON image is not necessarily released at the same time as a consolidated package
for a router.
Provisioning Files
This section provides background information about the files and processes used in Managing and Configuring
a Device to Run Using Individual Packages, on page 131.
The consolidated package on a device consists of a collection of subpackages and a provisioning file titled
packages.conf. To run the software, the usual method used is to boot the consolidated package, which is
copied into memory, expanded, mounted, and run within memory. The provisioning file's name can be renamed
but subpackage file's names cannot be renamed. The provisioning file and subpackage files must be kept in
the same directory. The provisioning file does not work properly if any individual subpackage file is contained
within a different directory.
Note An exception to this is that if a new or upgraded module firmware package is subsequently installed, it need
not be in the same directory as the provisioning file.
Configuring a device to boot, using the provisioning file packages.conf, is beneficial because no changes have
to be made to the boot statement after the Cisco IOS XE software is upgraded.
File Systems
The following table provides a list of file systems that can be seen on the Cisco Catalyst 8000 Series Edge
Platform.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
100
Installing the Software
Autogenerated File Directories and Files
harddisk: Hard disk file system (NVME-M2-600G or USB-M2-16G or USB-M2-32G with the
CLI command harddisk).
nvram: Device NVRAM. You can copy the startup configuration to NVRAM or from
NVRAM.
system: System memory file system, which includes the running configuration.
usb0: USB 3.0 Type- The Universal Serial Bus (USB) flash drive file systems.
A
Note The USB flash drive file system is visible only if a USB drive is installed
usb1: USB 3.0 in usb0: or usb1: ports.
Type-B
Use the ? help option, or use the copy command in command reference guides, if you find a file system that
is not listed in the table above.
crashinfo files Crashinfo files may appear in the bootflash: file system.
These files provide descriptive information of a crash and may be useful for
tuning or troubleshooting purposes. However, the files are not part of device
operations, and can be erased without impacting the functioning of the device.
lost+found directory This directory is created on bootup if a system check is performed. Its
appearance is completely normal and does not indicate any issues with the
device.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
101
Installing the Software
Flash Storage
Flash Storage
Subpackages are installed to local media storage, such as flash. For flash storage, use the dir bootflash:
command to list the file names.
For more information about the configuration register, see Use of the Configuration Register on All Cisco
Routers.
Note Setting the configuration register to 0x2102 will set the device to autoboot the Cisco IOS XE software.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
102
Installing the Software
How to Install and Upgrade the Software
Note The console baud rate is set to 9600 after changing the confreg to 0x2102 or 0x0. If you cannot establish a
console session after setting confreg, or garbage output appears, change the setting on your terminal emulation
software to 9600.
Note Do not use these procedures if you also need to install any optional subpackages or plan to upgrade individual
subpackages. See Managing and Configuring a Device to Run Using Individual Packages, on page 131.
• Managing and Configuring a Consolidated Package Using Copy and Boot Commands, on page 103
• Configuring a Device to Boot the Consolidated Package via TFTP Using the Boot Command: Example,
on page 105
Managing and Configuring a Consolidated Package Using Copy and Boot Commands
To upgrade a consolidated package, copy the consolidated package to the bootflash: directory on the router
using the copy command. After making this copy of the consolidated package, configure the router to boot
using the consolidated package file.
The following example shows the consolidated package file being copied to the bootflash: file system via
TFTP. The config register is then set to boot using boot system commands, and the boot system commands
instruct the router to boot using the consolidated package stored in the bootflash: file system. The new
configuration is then saved using the copy running-config startup-config command, and the system is then
reloaded to complete the process.
Router# dir bootflash:
Directory of bootflash:/
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
103
Installing the Software
Managing and Configuring a Consolidated Package Using Copy and Boot Commands
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
104
Installing the Software
Configuring a Device to Boot the Consolidated Package via TFTP Using the Boot Command: Example
[OK]
Router# reload
Configuring a Device to Boot the Consolidated Package via TFTP Using the
Boot Command: Example
Router#configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#boot system
tftp://10.81.116.4/auto/cebu-tftpboot/test/release/rommon/bin/test-17-3-2r
Router(config)#config-register 0x2102
Router(config)#exit
Router#
*Jul 7 01:43:52.098: %SYS-5-CONFIG_I: Configured from console by console
Router#show run | include boot
boot-start-marker
boot system bootflash:c8000be-universalk9.17.03.01prd14.SPA.bin
boot system tftp://10.81.116.4/auto/mcebu-tftpboot/test/release/rommon/bin/test-17-3-1r
boot-end-marker
license boot level network-essentials
diagnostic bootup level minimal
Router#copy running-config startup-config
Destination filename [startup-config]?
Building configuration...
[OK]
Router#reload
Proceed with reload? [confirm]
........
Located c8000be-universalk9.17.03.01prd14.SPA.bin
#############################################################################################################################################################################################
#############################################################################################################################################################################################
#############################################################################################################################################################################################
#############################################################################################################################################################################################
#############################################################################################################################################################################################
#############################################################################################################################################################################################
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
105
Installing the Software
Configuring a Device to Boot the Consolidated Package via TFTP Using the Boot Command: Example
This software version supports only Smart Licensing as the software licensing mechanism.
Your use of the Software is subject to the Cisco End User License Agreement
(EULA) and any relevant supplemental terms (SEULA) found at
http://www.cisco.com/c/en/us/about/legal/cloud-and-software/software-terms.html.
You hereby acknowledge and agree that certain Software and/or features are
licensed for a particular term, that the license to such Software and/or
features is valid only for the applicable term and that such Software and/or
features may be shut down or otherwise terminated by Cisco after expiration
of the applicable license term (e.g., 90-day trial period). Cisco reserves
the right to terminate any such Software feature electronically or by any
other means available. While Cisco may provide alerts, it is your sole
responsibility to monitor your usage of any such term Software feature to
ensure that your systems and networks are prepared for a shutdown of the
Software feature.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
106
Installing the Software
Configuring a Device to Boot the Consolidated Package via TFTP Using the Boot Command: Example
Dspfarm profile 7 :: No resource, check voice card or dspfarm service is not configured
Press RETURN to get started!
Router>show version
Cisco IOS XE Software, Version 17.03.01prd8
Cisco IOS Software [Amsterdam], c8000be Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version
17.3.1prd8, RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2020 by Cisco Systems, Inc.
Compiled Tue 19-May-20 12:00 by mcpre
ROM: (c)
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
-----------------------------------------------------------------
Technology Type Technology-package Technology-package
Current Next Reboot
-----------------------------------------------------------------
Smart License Perpetual network-essentials network-essentials
Smart License Subscription None None
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
107
Installing the Software
Installing the Software Using install Commands
This mode provides a consolidated boot process, using This mode uses the local (bootflash) packages.conf
local (hard disk, flash) or remote (TFTP) .bin image. file for the boot process.
This mode uses a single .bin file. .bin file is replaced with expanded .pkg files in this
mode.
CLI: CLI:
#boot system file <filename> #install add file bootflash: [activate commit]
To upgrade in this mode, point the boot system to the To upgrade in this mode, use the install commands.
new image.
Image Auto-Upgrade: When a new Field-Replaceable Image Auto-Upgrade: When a new FRU is inserted
Unit (FRU) is inserted in a modular chassis, manual in a modular chassis, the joining FRU is
intervention is required to get the new FRU running auto-upgraded to the image version in sync with the
with the same version as the active FRUs. active FRUs.
Rollback: Rollback to the previous image with Rollback: Enables rollback to an earlier version of
multiple Software Maintenance Updates (SMUs) may Cisco IOS XE software, including multiple patches
require multiple reloads. in single reload.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
108
Installing the Software
Install Mode Process Flow
The install add command copies the software package from a local or remote location to the platform. The
location can be FTP, HTTP, HTTPs, or TFTP. The command extracts individual components of the .package
file into subpackages and packages.conf files. It also validates the file to ensure that the image file is specific
to the platform on which it is being installed.
The install activate command performs the required validations and provisions the packages previously added
using the install add command. It also triggers a system reload.
The install commit command confirms the packages previously activated using the install activate command,
and makes the updates persistent over reloads.
Note Installing an update replaces any previously installed software image. At any time, only one image can be
installed in a device.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
109
Installing the Software
Install Mode Process Flow
install add install add file Copies the contents of the image,
location:filename.bin package, and SMUs to the software
repository. File location may be
local or remote. This command
does the following:
• Validates the file–checksum,
platform compatibility checks,
and so on.
• Extracts individual
components of the package
into subpackages and
packages.conf
• Copies the image into the local
inventory and makes it
available for the next steps.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
110
Installing the Software
Install Mode Process Flow
(install activate) auto abort-timer install activate auto-abort timer The auto-abort timer starts
<30-1200> automatically, with a default value
of 120 minutes. If the install
commit command is not executed
within the time provided, the
activation process is terminated,
and the system returns to the
last-committed state.
• You can change the time value
while executing the install
activate command.
• The install commit command
stops the timer, and continues
the installation process.
• The install activate
auto-abort timer stop
command stops the timer
without committing the
package.
• Use this command with the
prompt-level none keyword
to automatically ignore any
confirmation prompts.
• This command is valid only in
the three-step install variant.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
111
Installing the Software
Install Mode Process Flow
install remove install remove {file <filename> | Deletes inactive packages from the
inactive} platform repository. Use this
command to free up space.
• file: Removes specified files.
• inactive: Removes all the
inactive files.
install rollback to install rollback to {base | label | Rolls back the software set to a
committed | id} saved installation point or to the
last-committed installation point.
The following are the
characteristics of this command:
• Requires reload.
• Is applicable only when the
package is in committed state.
• Use this command with the
prompt-level none keyword
to automatically ignore any
confirmation prompts.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
112
Installing the Software
Install Mode Process Flow
install deactivate install deactivate file <filename> Removes a package from the
platform repository. This command
is supported only for SMUs.
• Use this command with the
prompt-level none keyword
to automatically ignore any
confirmation prompts.
show install log show install log Provides the history and details of
all install operations that have been
performed since the platform was
booted.
show install package show install package <filename> Provides details about the .pkg/.bin
file that is specified.
show install summary show install summary Provides an overview of the image
versions and their corresponding
install states for all the FRUs.
• The table that is displayed will
state for which FRUs this
information is applicable.
• If all the FRUs are in sync in
terms of the images present
and their state, only one table
is displayed.
• If, however, there is a
difference in the image or state
information among the FRUs,
each FRU that differs from the
rest of the stack is listed in a
separate table.
show install active show install active Provides information about the
active packages for all the FRUs.
If there is a difference in the
information among the FRUs, each
FRU that differs from the rest of
the stack is listed in a separate
table.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
113
Installing the Software
Booting the Platform in Install Mode
show install inactive show install inactive Provides information about the
inactive packages, if any, for all the
FRUs.
If there is a difference in the
information among the FRUs, each
FRU that differs from the rest of
the stack is listed in a separate
table.
show install committed show install committed Provides information about the
committed packages for all the
FRUs.
If there is a difference in the
information among the FRUs, each
FRU that differs from the rest of
the stack is listed in a separate
table.
show install rollback show install rollback {point-id | Displays the package associated
label} with a saved installation point.
show version show version [rp-slot] [installed Displays information about the
[user-interface] | provisioned | current package, along with
running] hardware and platform information.
From Cisco IOS XE 17.7.1a, these commands replace the old install workflow as the default mode on supported
platforms. The installation workflow for Cisco IOS XE 17.6.x release or earlier, described in section Overview,
on page 99, is supported for Cisco IOS XE 17.7.x, and is the default for Cisco Catalyst 8000 Edge platforms
with Cisco IOS XE 17.6.x or earlier.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
114
Installing the Software
One-Step Installation or Converting from Bundle Mode to Install Mode
Note • All the CLI actions (for example, add, activate, and so on) are executed on all the available FRUs.
• The configuration save prompt will appear if an unsaved configuration is detected.
• The reload prompt will appear after the second step in this workflow. Use the prompt-level none keyword
to automatically ignore the confirmation prompts.
• If the prompt-level is set to None, and there is an unsaved configuration, the install fails. You must save
the configuration before reissuing the command.
Use the one-step install procedure described below to convert a platform running in bundle boot mode to
install mode. After the command is executed, the platform reboots in install boot mode.
Later, the one-step install procedure can also be used to upgrade the platform.
This procedure uses the install add file activate commit command in privileged EXEC mode to install a
software package, and to upgrade the platform to a new version.
SUMMARY STEPS
1. enable
2. install add file location: filename [activate commit]
3. exit
DETAILED STEPS
Step 2 install add file location: filename [activate commit] Copies the software install package from a local or remote
location (through FTP, HTTP, HTTPs, or TFTP) to the
Example:
platform and extracts the individual components of the
Device#install add file .package file into subpackages and packages.conf files. It
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.bin
activate commit also performs a validation and compatibility check for the
platform and image versions, activates the package, and
commits the package to make it persistent across reloads.
The platform reloads after this command is run.
Step 3 exit Exits privileged EXEC mode and returns to user EXEC
mode.
Example:
Device#exit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
115
Installing the Software
Three-Step Installation
Three-Step Installation
Note • All the CLI actions (for example, add, activate, and so on) are executed on all the available FRUs.
• The configuration save prompt will appear if an unsaved configuration is detected.
• The reload prompt will appear after the install activate step in this workflow. Use the prompt-level none
keyword to automatically ignore the confirmation prompts.
The three-step installation procedure can be used only after the platform is in install mode. This option provides
more flexibility and control to the customer during installation.
This procedure uses individual install add, install activate, and install commit commands for installing a
software package, and to upgrade the platform to a new version.
SUMMARY STEPS
1. enable
2. install add file location: filename
3. show install summary
4. install activate [auto-abort-timer <time>]
5. install abort
6. install commit
7. install rollback to committed
8. install remove {file filesystem: filename | inactive}
9. show install summary
10. exit
DETAILED STEPS
Step 2 install add file location: filename Copies the software install package from a remote location
(through FTP, HTTP, HTTPs, or TFTP) to the platform,
Example:
and extracts the individual components of the .package
Device#install add file file into subpackages and packages.conf files.
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.bin
Step 3 show install summary (Optional) Provides an overview of the image versions
and their corresponding install state for all the FRUs.
Example:
Device#show install summary
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
116
Installing the Software
Upgrading in Install Mode
Step 5 install abort (Optional) Terminates the software install activation and
returns the platform to the last committed version.
Example:
Device#install abort • Use this command only when the image is in activated
state, and not when the image is in committed state.
Step 6 install commit Commits the new package installation and makes the
changes persistent over reloads.
Example:
Device#install commit
Step 7 install rollback to committed (Optional) Rolls back the platform to the last committed
state.
Example:
Device#install rollback to committed
Step 8 install remove {file filesystem: filename | inactive} (Optional) Deletes software installation files.
Example: • file: Deletes a specific file
Device#install remove inactive
• inactive: Deletes all the unused and inactive
installation files.
Step 9 show install summary (Optional) Displays information about the current state of
the system. The output of this command varies according
Example:
to the install commands run prior to this command.
Device#show install summary
Step 10 exit Exits privileged EXEC mode and returns to user EXEC
mode.
Example:
Device#exit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
117
Installing the Software
Downgrading in Install Mode
Note The install rollback command succeeds only if you have not removed the previous file using the install
remove inactive command.
Alternatively, you can downgrade by installing the older image using the install commands.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
118
Installing the Software
Configuration Examples for Installing the Software Using install Commands
This operation may require a reload of the system. Do you want to proceed? [y/n]y
--- Starting Activate ---
Performing Activate on Active/Standby
Building configuration...
[1] Finished Commit on R0
Checking status of Commit on [R0]
Commit: Passed on [R0]
Finished Commit
[OK]
*Oct 28 22:06:55.375: %SYS-6-PRIVCFG_ENCRYPT_SUCCESS: Successfully encrypted private config
fileSend model notification for install_add_activate_commit before reload
Install will reload the system now!
SUCCESS: install_add_activate_commit Thu Oct 28 22:07:22 UTC 2021
Router#
*Oct 28 22:07:22.661: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install one-shot PACKAGE
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.binOct
28 22:07:26.864: %PMAN-5-EXITACTION: R0/0: pvp: Process manager is exiting: reload action
requested
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
119
Installing the Software
Configuration Examples for Installing the Software Using install Commands
Router#
*Oct 28 22:40:25.971: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install add PACKAGE
bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.bin
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
120
Installing the Software
Configuration Examples for Installing the Software Using install Commands
c8000be-firmware_dsp_analogbri.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_dsp_tilegx.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_ngwic_t1e1.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_bri_st_fw.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_cwan.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_shdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_ssd.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_nim_xdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_prince.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_10g.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_1t3e3.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-firmware_sm_nim_adpt.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-mono-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
c8000be-rpboot.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
WARNING: A different version of provisioning file packages.conf already exists in bootflash:
WARNING: The provisioning file from the expanded bundle will be saved as
WARNING: bootflash:c8000be-universalk9.BLD_V177_THROTTLE_LATEST_20211027_0.conf
... package files copied
SUCCESS: Finished expanding all-in-one software package.
Image file expanded
SUCCESS: install_add Thu Oct 28 22:40:10 UTC 2021
[2|install_add]: END SUCCESS Thu Oct 28 22:40:25 UTC 2021
[2|install_add(INFO, )]: cleanup_trap remote_invocation 0 operation install_add .. 0 .. 0
[3|COMP_CHECK]: START Thu Oct 28 22:40:26 UTC 2021
[3|COMP_CHECK]: END FAILED exit(1) Thu Oct 28 22:40:27 UTC 2021
[3|COMP_CHECK(INFO, )]: cleanup_trap remote_invocation 0 operation COMP_CHECK .. 1 .. 1
[4|install_activate]: START Thu Oct 28 22:42:53 UTC 2021
[4|install_activate(INFO, require user prompt)]: install_cli
[4|install_activate(CONSOLE, )]: Activating PACKAGE
[4|install_activate(INFO, )]: Acquiring transaction lock...
[4|install_activate(INFO, )]: global_trans_lock:
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, )]: tmp_global_trans_lock: /tmp/tmp_install_global_trans_lock
[4|install_activate(INFO, )]: tmp lock does not exist: /tmp/tmp_install_global_trans_lock
[4|install_activate(INFO, )]: global_trans_lock:
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, )]: tmp_global_trans_lock: /tmp/tmp_install_global_trans_lock
[4|install_activate(INFO, )]: local_trans_lock: /bootflash/.installer/install_local_trans_lock
[4|install_activate(INFO, )]: global_trans_lock:
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, )]: validate_lock: lock_duration is 7200
[4|install_activate(INFO, )]: install type stored in lock PACKAGE, install type PACKAGE,
install operation install_activate
[4|install_activate(INFO, )]: lock duration: 7200
[4|install_activate(INFO, )]: extend trans lock done.
/bootflash/.installer/install_global_trans_lock
[4|install_activate(INFO, require user prompt)]: install_cli
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
121
Installing the Software
Configuration Examples for Installing the Software Using install Commands
This operation may require a reload of the system. Do you want to proceed? [y/n]y
--- Starting Activate ---
Performing Activate on Active/Standby
Modified
c8000be-firmware_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_dsp_tilegx.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_ngwic_t1e1.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_async.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_bri_st_fw.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_cwan.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
122
Installing the Software
Configuration Examples for Installing the Software Using install Commands
Modified
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_shdsl.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_ssd.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_nim_xdsl.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_prince.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_10g.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_1t3e3.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_async.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-firmware_sm_nim_adpt.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified
c8000be-mono-universalk9.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Modified c8000be-rpboot.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
New files list:
Added
c8000be-firmware_dreamliner.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_dsp_analogbri.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_dsp_tilegx.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_ngwic_t1e1.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_bri_st_fw.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_cwan.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_shdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_ssd.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_nim_xdsl.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_prince.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_10g.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_1t3e3.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_async.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_dsp_sp2700.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added
c8000be-firmware_sm_nim_adpt.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
123
Installing the Software
Configuration Examples for Installing the Software Using install Commands
Added
c8000be-mono-universalk9.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Added c8000be-rpboot.BLD_V177_THROTTLE_LATEST_20211027_030841_V17_7_0_120.SSA.pkg
Finished list of software package changes
[1] Finished Activate on R0
Checking status of Activate on [R0]
Activate: Passed on [R0]
Finished Activate
Router#
*Oct 29 00:05:09.504: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install activate PACKAGEOct 29 00:05:14.494: %PMAN-5-EXITACTION: R0/0: pvp: Process manager
is exiting: reload action requested
Router#
*Oct 29 00:14:03.712: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install commit PACKAGE
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
124
Installing the Software
Configuration Examples for Installing the Software Using install Commands
This operation may require a reload of the system. Do you want to proceed? [y/n]y
--- Starting Activate ---
Performing Activate on Active/Standby
[1] Activate package(s) on R0
[1] Finished Activate on R0
Checking status of Activate on [R0]
Activate: Passed on [R0]
Finished Activate
[OK]
*Dec 10 18:14:57.782 GMT: %SYS-6-PRIVCFG_ENCRYPT_SUCCESS: Successfully encrypted private
config fileSend model notification for install_add_activate_commit before reload
/usr/binos/conf/install_util.sh: line 164: /bootflash/.prst_sync/reload_info: No such file
or directory
/usr/binos/conf/install_util.sh: line 168: /bootflash/.prst_sync/reload_info: No such file
or directory
cat: /bootflash/.prst_sync/reload_info: No such file or directory
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
125
Installing the Software
Configuration Examples for Installing the Software Using install Commands
ROUTER#
*Dec 10 18:15:23.955 GMT: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install one-shot PACKAGE bootflash:c8000be-universalk9.17.06.01a.SPA.binDec 10 18:15:27.708:
%PMAN-5-EXITACTION: R0/0: pvp: Process manager is exiting: reload action requested
ROUTER#
ROUTER# show version
Cisco IOS XE Software, Version 17.06.01a
Cisco IOS Software [Bengaluru], c8000be Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version
17.6.1a, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2021 by Cisco Systems, Inc.
Compiled Sat 21-Aug-21 03:27 by mcpre
ROM: 17.3(5r)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
126
Installing the Software
Configuration Examples for Installing the Software Using install Commands
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
-----------------------------------------------------------------
Technology Type Technology-package Technology-package
Current Next Reboot
-----------------------------------------------------------------
Smart License Perpetual None None
Smart License Subscription None None
This install abort would require a reload. Do you want to proceed? [y/n]
*Oct 29 02:42:52.789:
%INSTALL-5-INSTALL_START_INFO: R0/0: install_engine: Started install aborty
--- Starting Abort ---
Performing Abort on Active/Standby
Router#
*Oct 29 02:44:47.866: %INSTALL-5-INSTALL_COMPLETED_INFO: R0/0: install_engine: Completed
install abort PACKAGEOct 29 02:44:51.577: %PMAN-5-EXITACTION: R0/0: pvp: Process manager
is exiting: reload action requested
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
127
Installing the Software
Configuration Examples for Installing the Software Using install Commands
--------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
128
Installing the Software
Configuration Examples for Installing the Software Using install Commands
Platform: C8000BE
User: mcpre
PackageName: universalk9
Build: BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117
CardTypes:
Package:
c8000be-firmware_nim_ge.BLD_V177_THROTTLE_LATEST_20211021_031123_V17_7_0_117.SSA.pkg
Size: 2966620
Timestamp: 2021-10-21 20:10:44 UTC
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
129
Installing the Software
Troubleshooting Software Installation Using install Commands
--------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------
--------------------------------------------------------------------
Auto abort timer: inactive
--------------------------------------------------------------------
Solution Use the following show commands to view installation summary, logs, and software versions.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
130
Installing the Software
Managing and Configuring a Device to Run Using Individual Packages
SUMMARY STEPS
1. show version
2. dir bootflash:
3. show platform
4. mkdir bootflash: URL-to-directory-name
5. request platform software package expand file URL-to-consolidated-package to
URL-to-directory-name
6. reload
7. boot URL-to-directory-name/packages.conf
8. show version installed
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
131
Installing the Software
Installing Subpackages from a Consolidated Package
DETAILED STEPS
Step 2 dir bootflash: Displays the previous version of software and that a package
is present.
Example:
Router# dir bootflash:
Step 4 mkdir bootflash: URL-to-directory-name Creates a directory to save the expanded software image.
Example: You can use the same name as the image to name the
Router# mkdir bootflash:mydir directory.
Step 5 request platform software package expand file Expands the software image from the TFTP server
URL-to-consolidated-package to URL-to-directory-name (URL-to-consolidated-package) into the directory used to
save the image (URL-to-directory-name), which was created
Example:
in Step 4.
Router# request platform software package expand
file
bootflash:c8000be-universalk9-NIM.bin to
bootflash:mydir
Step 7 boot URL-to-directory-name/packages.conf Boots the consolidated package, by specifying the path and
name of the provisioning file: packages.conf.
Example:
rommon 1 > boot bootflash:mydir/packages.conf
Step 8 show version installed Displays the version of the newly installed software.
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
132
Installing the Software
Installing Subpackages from a Consolidated Package
Examples
The initial part of the example shows the consolidated package,
c8000be-universalk9.17.03.01prd14.SPA.bin , being copied to the TFTP server. This is a prerequisite
step. The remaining part of the example shows the consolidated file, packages.conf, being booted.
Router# copy tftp:c8000be-universalk9.17.03.01prd14.SPA.bin bootflash:
ddress or name of remote host []? 203.0.113.6
Destination filename [c8000be-universalk9.17.03.01prd14.SPA.bin]
Accessing tftp://203.0.113.6/c8000be/ic8000be-universalk9.17.03.01prd8.SPA.bin...
Loading c8000be/c8000be-universalk9.17.03.01prd14.SPA.bin from 192.0.2.4 (via
GigabitEthernet0): !!!!!!!!
[OK - 410506248 bytes]
ROM: 17.3(1r)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
133
Installing the Software
Installing Subpackages from a Consolidated Package
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
-----------------------------------------------------------------
Technology Type Technology-package Technology-package
Current Next Reboot
-----------------------------------------------------------------
Smart License Perpetual None None
Smart License Subscription None None
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
134
Installing the Software
Installing Subpackages from a Consolidated Package
Router# reload
Proceed with reload? [confirm]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
135
Installing the Software
Installing Subpackages from a Consolidated Package
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
136
Installing the Software
Installing Subpackages from a Consolidated Package on a Flash Drive
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
137
Installing the Software
Upgrading the Firmware on NIMs
SUMMARY STEPS
1. copy Cisco IOS XE image into bootflash: mydir.
2. request platform software package expand file bootflash:/mydir /<IOS-XE image to expand
super package.
3. reload.
4. boot bootflash:mydir/ /packages.conf.
5. copy NIM firmware subpackage to the folder bootflash:mydir/.
6. request platform software package install rp 0 file bootflash:/mydir/<firmware subpackage>.
7. hw-module subslot x/y reload to boot the module with the new firmware.
8. show platform software subslot 0/2 module firmware to verify that the module is booted up with
the new firmware.
DETAILED STEPS
Step 2 request platform software package expand file Expands the platform software package to super package.
bootflash:/mydir /<IOS-XE image to expand super
package.
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
138
Installing the Software
Upgrading the Firmware on NIMs
Step 4 boot bootflash:mydir/ /packages.conf. Boots the super package by specifying the path and name
of the provisioning file: packages.conf.
Example:
rommon 1 > boot bootflash:mydir/packages.conf
Step 5 copy NIM firmware subpackage to the folder Copies the NIM firmware subpackage into bootflash:mydir.
bootflash:mydir/.
Example:
Router#copy
bootflash:c8000be-firmware_nim_xdsl.2020-07-01_11.05_39n.SSA.pkg
bootflash:mydir/
Step 6 request platform software package install rp 0 file Installs the software package.
bootflash:/mydir/<firmware subpackage>.
Example:
Router#equest platform software package install rp
0 file
bootflash:mydir/c8000be-firmware_nim_xdsl.2020-07-01_11.05_39n.SSA.pkg
Step 7 hw-module subslot x/y reload to boot the module with Reloads the hardware module subslot and boots the module
the new firmware. with the new firmware.
Example:
Router#hw-module subslot 0/2 reload
Step 8 show platform software subslot 0/2 module firmware Displays the version of the newly installed firmware.
to verify that the module is booted up with the new
firmware.
Example:
Router# show platform software subslot 0/2 module
firmware
Pe
Examples
The following example shows how to perform firmware upgrade in a device module:
Routermkdir bootflash:mydir
Create directory filename [mydir]?
Created dir bootflash:/mydir
Router#c
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
139
Installing the Software
Upgrading the Firmware on NIMs
Router#reload
Proceed with reload? [confirm]
*Jul 8 11:48:30.917 PDT: %SYS-5-RELOAD: Reload requested by console. Reload Reason: Reload
Command.
*Jul 8 11:48:32.768 PDT: %IOSXE_INFRA-3-RELOAD_INFO_SAVE_FAIL: Unable to save reload
information: 23: Invalid argument.
Jul 8 11:48:38.652: %PMAN-TACTION: R0/0: pvp: Process manager is exiting: process exit
with reload chassis code
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
140
Installing the Software
Upgrading the Firmware on NIMs
#
File size is 0x150ae3cc
Located mydir/c8000be-universalk9.17.03.01prd14.S-std.SPA.pkg
Image size 353035212 inode num 356929, bks cnt 86191 blk size 8*512
###################################################################
######################################################################
Boot image size = 353035212 (0x150ae3cc) bytes
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
141
Installing the Software
Upgrading the Firmware on NIMs
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
*Dec 12 09:28:58.922:
%IOS_LICENSE_IMAGE_APPLICATION-6-LICENSE_LEVEL:
Module name = esg Next reboot level = appxk9 and License = appxk9
*Dec 12 09:28:58.943:
%IOS_LICENSE_IMAGE_APPLICATION-6-LICENSE_LEVEL:
Module name = esg Next reboot level = ipbasek9 and License = ipbasek9
*Dec 12 09:28:58.981:
%Cat_THROUGHPUT-6-LEVEL: Throughput level has been set to 1000000 kbps
*Dec 12 09:29:13.302: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface EOBC0, changed state to up
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to down
*Dec 12 09:29:14.142: %LINK-3-UPDOWN: Interface LIIN0, changed state to up
*Dec 12 09:28:51.438: %CMRP-3-PFU_MISSING:cmand: The platform does not detect a power
supply in slot 1
*Dec 12 09:29:01.256: %CMLIB-6-THROUGHPUT_VALUE:cmand: Throughput license found, throughput
set to 1000000 kbps
*Dec 12 09:29:03.223: %CPPHA-7-START:cpp_ha: CPP 0 preparing ucode
*Dec 12 09:29:03.238: %CPPHA-7-START:cpp_ha: CPP 0 startup init
*Dec 12 09:29:11.335: %CPPHA-7-START:cpp_ha: CPP 0 running init
*Dec 12 09:29:11.645: %CPPHA-7-READY:cpp_ha: CPP 0 loading and initialization complete
*Dec 12 09:29:11.711: %IOSXE-6-PLATFORM:cpp_cp:
Process CPP_PFILTER_EA_EVENT__API_CALL__REGISTER
*Dec 12 09:29:16.280:
%IOSXE_MGMTVRF-6-CREATE_SUCCESS_INFO:
Management vrf Mgmt-intf created with ID 1, ipv4 table-id 0x1, ipv6 table-id 0x1E000001
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi0, changed state to up
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC0, changed state to up
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to down
*Dec 12 09:29:16.330:
%LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN0, changed state to up
*Dec 12 09:29:17.521: %SYS-5-LOG_CONFIG_CHANGE: Buffer logging disabled
*Dec 12 09:29:18.867: %SYS-5-CONFIG_I: Configured from memory by console
*Dec 12 09:29:18.870:
%IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled
*Dec 12 09:29:18.870:
%IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/1, interfaces disabled
*Dec 12 09:29:18.871:
%IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/2, interfaces disabled
*Dec 12 09:29:18.873:
%SPA_OIR-6-OFFLINECARD: SPA (c8000be-X-4x1GE) offline in subslot 0/0
*Dec 12 09:29:18.874: %SPA_OIR-6-OFFLINECARD: SPA (NIM-VA-B) offline in subslot 0/1
*Dec 12 09:29:18.874: %SPA_OIR-6-OFFLINECARD: SPA (NIM-VAB-A) offline in subslot 0/2
*Dec 12 09:29:18.876: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
142
Installing the Software
Upgrading the Firmware on NIMs
Daemon Status: UP
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
143
Installing the Software
Upgrading the Firmware on NIMs
TC Mode: PTM
Selftest Result: 0x00
DELT configuration: disabled
DELT state: not running
Line 1:
Router#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
144
Installing the Software
Upgrading the Firmware on NIMs
Router#
Router#copy bootflash:c8000be-firmware_nim_xdsl.2014-11-17_11.05_39n.SSA.pkg
bootflash:mydir/
Destination filename [mydir/c8000be-firmware_nim_xdsl.2014-11-17_11.05_39n.SSA.pkg]?
Copy in progress...CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC
6640604 bytes copied in 1.365 secs (4864911 bytes/sec)
Router#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
145
Installing the Software
Upgrading the Firmware on NIMs
Modem Up time
-------------------------------------------
0D 0H 25M 38S
Router#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
146
Installing the Software
Installing a Firmware Subpackage
Modem Up time
-------------------------------------------
0D 0H 0M 42S
Router#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
147
Installing the Software
Installing a Firmware Subpackage
Note Read the Release Notes document pertaining to the consolidated package to verify that the firmware within
the consolidated package is compatible with the version of Cisco IOS XE software that is currently installed
on a device.
SUMMARY STEPS
1. show version
2. dir bootflash:
3. show platform
4. mkdir bootflash: URL-to-directory-name
5. request platform software package expand file URL-to-consolidated-package to
URL-to-directory-name
6. reload
7. boot URL-to-directory-name /packages.conf
8. show version installed
DETAILED STEPS
Step 2 dir bootflash: Displays the previous version of software and that a package
is present.
Example:
Router# dir bootflash:
Step 4 mkdir bootflash: URL-to-directory-name Creates a directory to save the expanded software image.
Example: You can use the same name as the image to name the
Router# mkdir bootflash:mydir directory.
Step 5 request platform software package expand file Expands the software image from the TFTP server
URL-to-consolidated-package to URL-to-directory-name (URL-to-consolidated-package) into the directory used to
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
148
Installing the Software
Installing a Firmware Subpackage
Step 7 boot URL-to-directory-name /packages.conf Boots the consolidated package by specifying the path and
name of the provisioning file: packages.conf.
Example:
rommon 1 > boot bootflash:mydir/packages.conf
Step 8 show version installed Displays the version of the newly installed software.
Example:
Router# show version installed
Package: Provisioning File, version: n/a, status:
active
Examples
The initial part of the following example shows the consolidated package,
c8000be-universalk9.164422SSA.bin, being copied to the TFTP server. This is a prerequisite step.
The remaining part of the example shows the consolidated file, packages.conf, being booted.
Router# tftp:c8000be/c8000be-universalk9.164422SSA.bin bootflash:
Address or name of remote host []? 192.0.2.1
Destination filename [c8000be-universalk9.164422SSA.bin]?
Accessing tftp://192.0.2.1/c8000be/c8000be-universalk9.164422SSA.bin...
Loading c8000be/c8000be-universalk9.164422SSA.bin from 192.0.2.1 (via GigabitEthernet0):
!!!!!!!!
[OK - 410506248 bytes]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
149
Installing the Software
Installing a Firmware Subpackage
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
150
Installing the Software
Installing a Firmware Subpackage
Router# reload
Proceed with reload? [confirm]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
151
Installing the Software
Installing a Firmware Subpackage
RP0
Built: 2012-07-10_16.22, by: mcpre
File SHA1 checksum: 5e95c9cbc4eaf5a4a5a1ac846ee2d0f41d1a026b
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
152
Installing the Software
Configuring No Service Password-Recovery
Note By default, the no confirm prompt and messages are not displayed after reloads.
• Using the no service password-recovery strict command. This option does not allow for device recovery
once it is enabled.
Note As a precaution, a valid Cisco IOS image should reside in the bootflash: before this feature is enabled.
If you plan to enter the no service password-recovery command, Cisco recommends that you save a copy of
the system configuration file in a location away from the device.
Befor you beging, ensure that this feature is disabled before making any change to the device regardless of
the significance of the change—such as a configuration, module, software version, or ROMMON version
change.
The configuration register boot bit must be enabled to load the startup configuration by setting bit-8 to 0, to
ignore the break key in Cisco IOS XE by setting bit-6 to 0, and to auto boot a Cisco IOS XE image by setting
the lowest four bits 3-0, to any value from 0x2 to 0xF. Changes to the configuration register are not saved
after the No Service Password-Recovery feature is enabled.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
153
Installing the Software
How to Enable No Service Password-Recovery
Note If Bit-8 is set to 1, the startup configuration is ignored. If Bit-6 is set to 1, break key detection is enabled in
Cisco IOS XE. If both Bit-6 and Bit-8 are set to 0, the No Service Password-Recovery feature is enabled.
• If you do not confirm the Break key action, the device boots normally with the No Service
Password-Recovery feature enabled.
Note You cannot recover a device if the No Service Password-Recovery feature was enabled using the no service
password-recovery strict command.
This example shows a Break key action being entered during boot up, followed by confirmation of the break
key action. The startup configuration is erased and the device then boots with the factory default configuration
with the No Service Password-Recovery feature enabled.
Initializing Hardware ...
..
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
154
Installing the Software
How to Enable No Service Password-Recovery
..
Located c8000be-universalk9.BLD_V153_3_S_XE310_THROTTLE_LATEST_20130623_234109.SSA.bin
Image size 395545216 inode num 26, bks cnt 96569 blk size 8*512
This example shows a Break key action being entered during boot up, followed by the non-confirmation of
the break key action. The device then boots normally with the No Service Password-Recovery feature enabled.
..
...
Located c8000be-universalk9.BLD_V153_3_S_XE310_THROTTLE_LATEST_20130623_234109.SSA.bin
Image size 395545216 inode num 26, bks cnt 96569 blk size 8*512
######################################################################## …
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
155
Installing the Software
How to Enable No Service Password-Recovery
IOS (tm) 5300 Software (C7200-P-M), Version 12.3(8)YA, RELEASE SOFTWARE (fc1)
...
125440K bytes of ATA PCMCIA card at slot 0 (Sector size 512 bytes).
WARNING:
Do not execute this command without another plan for password recovery.
...
Router(config)# exit
Router#
Router# reload
...
The following example shows how to disable password recovery capability using the no service
password-recovery strict command:
Router# configure terminal
WARNING:
Do not execute this command without another plan for password recovery.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
156
Installing the Software
How to Enable No Service Password-Recovery
..
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
157
Installing the Software
How to Enable No Service Password-Recovery
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
158
CHAPTER 9
Slot and Subslot Configuration
This chapter contains information on slots and subslots. Slots specify the chassis slot number in your device
and subslots specify the slot where the service modules are installed.
For further information on the slots and subslots, see the “About Slots and Interfaces” sections:
• Hardware Installation Guide for Cisco Catalyst 8300 Series Edge Platforms
• Hardware Installation Guide for Cisco Catalyst 8200 Series Edge Platforms
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
159
Slot and Subslot Configuration
Configuring Gigabit Ethernet Interfaces
DETAILED STEPS
Router> enable
Step 4 ip address ip-address mask [secondary] dhcp pool Assigns an IP address to the GigabitEthernet
Example: • ip address ip-address—IP address for the interface.
Router(config-if)# end
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
160
Slot and Subslot Configuration
Configuring the Interfaces: Example
Interface IHQ IQD OHQ OQD RXBS RXPS TXBS TXPS TRTL
------------------------------------------------------------------------------------------
* GigabitEthernet0/0/0 0 0 0 0 0 0 0 0 0
* GigabitEthernet0/0/1 0 0 0 0 0 0 0 0 0
* GigabitEthernet0/0/2 0 0 0 0 0 0 0 0 0
* GigabitEthernet0/0/3 0 0 0 0 0 0 0 0 0
* Te0/0/4 0 0 0 0 0 0 0 0 0
* Te0/0/5 0 0 0 0 0 0 0 0 0
Router#show platform software status control-process brief
Load Average
Slot Status 1-Min 5-Min 15-Min
RP0 Healthy 0.83 0.91 0.91
Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 7768456 2654936 (34%) 5113520 (66%) 3115212 (40%)
CPU Utilization
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
161
Slot and Subslot Configuration
Viewing Information About an Interface: Example
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
162
CHAPTER 10
Cisco Thousand Eyes Enterprise Agent
Application Hosting
This chapter provides information on Cisco Thousand Eyes Enterprise Agent Application Hosting. The
following sections are included in this chapter:
• Cisco ThousandEyes Enterprise Agent Application Hosting, on page 163
• Supported Platforms and System Requirements, on page 164
• Workflow to Install and Run the Cisco ThousandEyes Application, on page 165
• Modifying the Agent Parameters, on page 169
• Uninstalling the Application, on page 169
• Troubleshooting the Cisco ThousandEyes Application, on page 170
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
163
Cisco Thousand Eyes Enterprise Agent Application Hosting
Feature Information for Cisco ThousandEyes Enterprise Agent Application Hosting
Table 14: Feature Information for ThousandEyes Enterprise Agent Application Hosting
Cisco ThousandEyes Cisco IOS XE The Cisco ThousandEyes Enterprise Agent Application
Enterprise Agent Application 17.7.1a introduces the functionality to inherit the Domain Name
Hosting Server (DNS) information from the device. With this
enhancement, the DNS field in the vManage ThousandEyes
feature template is an optional parameter.
Cisco ThousandEyes Cisco IOS XE With the integration of ThousandEyes Agent Application
Enterprise Agent Application 17.6.1 running on routing platforms using the app-hosting
Hosting capabilities as container, you can have visibility into
application experience with deep insights into the Internet,
cloud providers, and enterprise networks.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
164
Cisco Thousand Eyes Enterprise Agent Application Hosting
Workflow to Install and Run the Cisco ThousandEyes Application
Note The minimum DRAM and storage requirement for running Cisco ThousandEyes Enterprise Agent is 8 GB.
If the device does not have enough memory or storage, we recommend that you upgrade DRAM or add an
external storage such as M.2 USB. When the available resources are not sufficient to run other applications,
Cisco IOx generates an error message.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
165
Cisco Thousand Eyes Enterprise Agent Application Hosting
Workflow to Host the Cisco ThousandEyes Application
Note If you configure the correct token and Domain Name Server (DNS) information, the device is discovered
automatically.
config-transaction
iox
commit
Step 2 If the IOx command is accepted, wait for a few seconds and check whether the IOx process is up and running by using
the show iox command. The output must display that the show IOxman process is running.
Device #show iox
Step 3 Ensure that the ThousandEyes application LXC tarball is available in the device's bootflash:.
Step 4 Create a virtual port group interface to enable the traffic path to the Cisco ThousandEyes application:
interface VirtualPortGroup 0
ip address 192.0.2.22 255.255.255.0
exit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
166
Cisco Thousand Eyes Enterprise Agent Application Hosting
Downloading and Copying the Image to the Device
app-hosting appid te
app-resource docker
prepend-pkg-opts
run-opts 2 “--hostname
Note You can use the proxy configuration only if the Cisco ThousandEyes agent does not have an internet access
without a proxy. Also, the hostname is optional. If you do not provide the hostname during the installation, the
device hostname is used as the Cisco ThousandEyes agent hostname. The device hostname is displayed on the
Cisco ThousandEyes portal. The DNS name server information is optional. If the Cisco ThousandEyes agent
uses a private IP address, ensure that you establish a connection to the device through NAT.
Step 6 Configure the start command to run the application automatically when the application is installed on the device using
the install command:
app-hosting appid te
start
Note If any of these steps fail, use the show logging command and check the IOx error message. If the error message
is about insufficient disk space, clean the storage media (bootflash or hard disk) to free up the space. Use the
show app-hosting resource command to check the CPU and disk memory.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
167
Cisco Thousand Eyes Enterprise Agent Application Hosting
Downloading and Copying the Image to the Device
Installing package
'https://downloads.thousandeyes.com/enterprise-agent/thousandeyes-enterprise-agent-4.0.2.cisco.tar'
for 'te1000'.
b) If the device has a proxy server, copy the image manually to bootflash:/apps.
c) Download the Cisco ThousandEyes application package from the software downloads page and ensure that you use
the agent version 4.0.2.
d) Create an application directory in the bootflash: to copy the image:
Device# mkdir bootflash:apps
Create directory filename [apps]?
Created dir bootflash:/apps
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
168
Cisco Thousand Eyes Enterprise Agent Application Hosting
Connecting the Cisco ThousandEyes Agent with the Controller
After the Cisco ThousandEyes application is up and running, the agent (ThousandEyes-agent ) process connects to the
controller that is running on the cloud environment.
Note If you have issues related to connectivity, the application logs the relevant error messages in the
application-specific logs (/var/logs).
Step 1 Stop the application using the app-hosting stop appid appid command.
Step 2 Deactivate the application using the app-hosting deactivate appid appid command.
Step 3 Make the required changes to the app-hosting configuration.
Step 4 Activate the application using the app-hosting activate appid appid command.
Step 5 Start the application using the app-hosting start appid appid command.
Step 1 Stop the application using the app-hosting stop appid te command.
Step 2 Check if the application is in active state using the show app-hosting list command.
Step 3 Deactivate the application using the app-hosting deactivate appid te command.
Step 4 Ensure that the application is not in active state. Use the show app-hosting list command to check status of the application.
Step 5 Uninstall the application using the app-hosting uninstall appid te command.
Step 6 After the uninstallation process is complete, use the show app-hosting list command to check if the application is
uninstalled successfully.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
169
Cisco Thousand Eyes Enterprise Agent Application Hosting
Troubleshooting the Cisco ThousandEyes Application
Note Check the DNS server connection. If the Cisco ThousandEyes agent is assigned to a private IP address, check
the NAT configuration.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
170
CHAPTER 11
Process Health Monitoring
This chapter describes how to manage and monitor the health of various components of your device. It contains
the following sections:
• Monitoring Control Plane Resources, on page 171
• Monitoring Hardware Using Alarms, on page 175
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
171
Process Health Monitoring
Cisco IOS Process Resources
The show process cpu command displays Cisco IOS CPU utilization average:
Router# show process cpu
CPU utilization for five seconds: 1%/0%; one minute: 1%; five minutes: 1%
PID Runtime(ms) Invoked uSecs 5Sec 1Min 5Min TTY Process
1 1 14 71 0.00% 0.00% 0.00% 0 Chunk Manager
2 127 872 145 0.00% 0.00% 0.00% 0 Load Meter
3 0 1 0 0.00% 0.00% 0.00% 0 Policy bind Proc
4 0 1 0 0.00% 0.00% 0.00% 0 Retransmission o
5 0 1 0 0.00% 0.00% 0.00% 0 IPC ISSU Dispatc
6 11 13 846 0.00% 0.00% 0.00% 0 RF Slave Main Th
7 0 1 0 0.00% 0.00% 0.00% 0 EDDRI_MAIN
8 0 1 0 0.00% 0.00% 0.00% 0 RO Notify Timers
9 1092 597 1829 0.00% 0.01% 0.00% 0 Check heaps
10 8 73 109 0.00% 0.00% 0.00% 0 Pool Manager
11 0 1 0 0.00% 0.00% 0.00% 0 DiscardQ Backgro
12 0 2 0 0.00% 0.00% 0.00% 0 Timers
13 0 32 0 0.00% 0.00% 0.00% 0 WATCH_AFS
14 0 1 0 0.00% 0.00% 0.00% 0 MEMLEAK PROCESS
15 1227 40758 30 0.00% 0.02% 0.00% 0 ARP Input
16 41 4568 8 0.00% 0.00% 0.00% 0 ARP Background
17 0 2 0 0.00% 0.00% 0.00% 0 ATM Idle Timer
18 0 1 0 0.00% 0.00% 0.00% 0 ATM ASYNC PROC
19 0 1 0 0.00% 0.00% 0.00% 0 CEF MIB API
20 0 1 0 0.00% 0.00% 0.00% 0 AAA_SERVER_DEADT
21 0 1 0 0.00% 0.00% 0.00% 0 Policy Manager
22 0 2 0 0.00% 0.00% 0.00% 0 DDR Timers
23 60 23 2608 0.00% 0.00% 0.00% 0 Entity MIB API
24 43 45 955 0.00% 0.00% 0.00% 0 PrstVbl
25 0 2 0 0.00% 0.00% 0.00% 0 Serial Backgroun
26 0 1 0 0.00% 0.00% 0.00% 0 RMI RM Notify Wa
27 0 2 0 0.00% 0.00% 0.00% 0 ATM AutoVC Perio
28 0 2 0 0.00% 0.00% 0.00% 0 ATM VC Auto Crea
29 30 2181 13 0.00% 0.00% 0.00% 0 IOSXE heartbeat
30 1 9 111 0.00% 0.00% 0.00% 0 Btrace time base
31 5 182 27 0.00% 0.00% 0.00% 0 DB Lock Manager
32 16 4356 3 0.00% 0.00% 0.00% 0 GraphIt
33 0 1 0 0.00% 0.00% 0.00% 0 DB Notification
34 0 1 0 0.00% 0.00% 0.00% 0 IPC Apps Task
35 0 1 0 0.00% 0.00% 0.00% 0 ifIndex Receive
36 4 873 4 0.00% 0.00% 0.00% 0 IPC Event Notifi
37 49 4259 11 0.00% 0.00% 0.00% 0 IPC Mcast Pendin
38 0 1 0 0.00% 0.00% 0.00% 0 Platform appsess
39 2 73 27 0.00% 0.00% 0.00% 0 IPC Dynamic Cach
40 5 873 5 0.00% 0.00% 0.00% 0 IPC Service NonC
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
172
Process Health Monitoring
Overall Control Plane Resources
The following sections describe the fields in the show platform software status control-processor command
output.
Load Average
Load average represents the process queue or process contention for CPU resources. For example, on a
single-core processor, an instantaneous load of 7 would mean that seven processes are ready to run, one of
which is currently running. On a dual-core processor, a load of 7 would mean that seven processes are ready
to run, two of which are currently running.
Memory Utilization
Memory utilization is represented by the following fields:
• Total—Total line card memory
• Used—Consumed memory
• Free—Available memory
• Committed—Virtual memory committed to processes
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
173
Process Health Monitoring
Overall Control Plane Resources
CPU Utilization
CPU utilization is an indication of the percentage of time the CPU is busy, and is represented by the following
fields:
• CPU—Allocated processor
• User—Non-Linux kernel processes
• System—Linux kernel process
• Nice—Low-priority processes
• Idle—Percentage of time the CPU was inactive
• IRQ—Interrupts
• SIRQ—System Interrupts
• IOwait—Percentage of time CPU was waiting for I/O
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
174
Process Health Monitoring
Monitoring Hardware Using Alarms
Memory (kB)
Slot Status Total Used (Pct) Free (Pct) Committed (Pct)
RP0 Healthy 7768456 2573416 (33%) 5195040 (67%) 3115096 (40%)
CPU Utilization
Slot CPU User System Nice Idle IRQ SIRQ IOwait
RP0 0 2.80 1.80 0.00 95.39 0.00 0.00 0.00
1 0.00 0.00 0.00 100.00 0.00 0.00 0.00
2 0.00 0.00 0.00 100.00 0.00 0.00 0.00
3 0.00 0.00 0.00 100.00 0.00 0.00 0.00
4 6.80 1.80 0.00 91.39 0.00 0.00 0.00
5 3.20 1.60 0.00 95.19 0.00 0.00 0.00
6 16.30 12.60 0.00 71.10 0.00 0.00 0.00
7 12.40 13.70 0.00 73.90 0.00 0.00 0.00
8 2.40 2.40 0.00 95.19 0.00 0.00 0.00
9 0.00 0.00 0.00 100.00 0.00 0.00 0.00
10 0.00 0.00 0.00 100.00 0.00 0.00 0.00
11 0.00 0.00 0.00 100.00 0.00 0.00 0.00
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
175
Process Health Monitoring
BootFlash Disk Monitoring
The size of the bootflash disk must be at least of the same size as that of the physical memory installed on the
device. If this condition is not met, a syslog alarm is generated as shown in the following example:
%IOSXEBOOT-2-FLASH_SIZE_CHECK: (rp/0): Flash capacity (8 GB) is insufficient for fault
analysis based on
installed memory of RP (16 GB)
%IOSXEBOOT-2-FLASH_SIZE_CHECK: (rp/0): Please increase the size of installed flash to at
least 16 GB (same as
physical memory size)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
176
Process Health Monitoring
Clearing a Visual Alarm
If alarm severity is not specified, alarm messages for all severity levels are sent to logging devices.
Module Removed
*Aug 22 13:27:33.774: %C-SM-X-16G4M2X: Module removed from subslot 1/1, interfaces disabled
*Aug 22 13:27:33.775: %SPA_OIR-6-OFFLINECARD: Module (SPA-4XT-SERIAL) offline in subslot
1/1
Module Reinserted
*Aug 22 13:32:29.447: %CC-SM-X-16G4M2X: Module inserted in subslot 1/1
*Aug 22 13:32:34.916: %SPA_OIR-6-ONLINECARD: Module (SPA-4XT-SERIAL) online in subslot 1/1
*Aug 22 13:32:35.523: %LINK-3-UPDOWN: SIP1/1: Interface EOBC1/1, changed state to up
Alarms
To view alarms, use the show facility-alarm status command. The following example shows a critical alarm
for the power supply:
Router# show facility-alarm status
System Totals Critical: 1 Major: 0 Minor: 0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
177
Process Health Monitoring
Examples of Alarm Messages
Power Supply Bay 1 Jul 08 2020 11:51:34 CRITICAL Power Supply/FAN Module
Missing [0]
POE Bay 0 Jul 08 2020 11:51:34 INFO Power Over Ethernet Module
Missing [0]
POE Bay 1 Jul 08 2020 11:51:34 INFO Power Over Ethernet Module
Missing [0]
xcvr container 0/0/4 Jul 08 2020 11:51:47 INFO Transceiver Missing - Link
Down [1]
To view critical alarms, use the show facility-alarm status critical command, as shown in the following
example:
Router# show facility-alarm status critical
System Totals Critical: 1 Major: 0 Minor: 0
Power Supply Bay 1 Jul 08 2020 11:51:34 CRITICAL Power Supply/FAN Module
Missing [0]
To view the operational state of the major hardware components on the device, use the show platform diag
command.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
178
Process Health Monitoring
Reviewing and Analyzing Alarm Messages
Slot: 0, C8300-1N1S-4T2X
Running state : ok
Internal state : online
Internal operational state : ok
Physical insert detect time : 00:00:24 (01:29:20 ago)
Software declared up time : 00:01:01 (01:28:44 ago)
CPLD version : 20011540
Firmware version : 17.3(1r)
Slot: 1, C8300-1N1S-4T2X
Running state : ok
Internal state : online
Internal operational state : ok
Physical insert detect time : 00:00:24 (01:29:20 ago)
Software declared up time : 00:01:02 (01:28:43 ago)
CPLD version : 20011540
Firmware version : 17.3(1r)
Network Management System Alerts a Network Administrator when an Alarm is Reported Through
SNMP
The SNMP is an application-layer protocol that provides a standardized framework and a common language
used for monitoring and managing devices in a network. Of all the approaches to monitor alarms, SNMP is
the best approach to monitor more than one device in an enterprise and service provider setup.
SNMP provides notification of faults, alarms, and conditions that might affect services. It allows a network
administrator to access device information through a network management system (NMS) instead of reviewing
logs, polling devices, or reviewing log reports.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
179
Process Health Monitoring
Network Management System Alerts a Network Administrator when an Alarm is Reported Through SNMP
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
180
CHAPTER 12
System Messages
System messages are saved in a log file or directed to other devices from the software running on a router.
These messages are also known as syslog messages. System messages provide you with logging information
for monitoring and troubleshooting purposes.
The following sections are included in this chapter:
• Information About Process Management, on page 181
• How to Find Error Message Details, on page 181
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
181
System Messages
How to Find Error Message Details
The process lifecycle notification component failed, Note the time of the message and investigate the
preventing proper detection of a process start and stop. kernel error message logs to learn more about the
This problem is likely the result of a software defect problem and see if it is correctable. If the problem
in the software subpackage. cannot be corrected or the logs are not helpful, copy
the error message exactly as it appears on the console
along with the output of the show tech-support
command and provide the gathered information to a
Cisco technical support representative.
Error Message: %PMAN-0-PROCFAILCRIT A critical process [chars] has failed (rc [dec])
A process important to the functioning of the router Note the time of the message and investigate the error
has failed. message logs to learn more about the problem. If the
problem persists, copy the message exactly as it
appears on the console or in the system log. Research
and attempt to resolve the issue using the tools and
utilities provided at: http://www.cisco.com/tac. With
some messages, these tools and utilities will supply
clarifying information. Search for resolved software
issues using the Bug Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
Error Message: %PMAN-3-PROCFAILOPT An optional process [chars] has failed (rc [dec])
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
182
System Messages
How to Find Error Message Details
A process that does not affect the forwarding of traffic Note the time of the message and investigate the
has failed. kernel error message logs to learn more about the
problem. Although traffic will still be forwarded after
receiving this message, certain functions on the router
may be disabled because of this message and the error
should be investigated. If the logs are not helpful or
indicate a problem you cannot correct, copy the
message exactly as it appears on the console or in the
system log. Research and attempt to resolve the issue
using the tools and utilities provided at
http://www.cisco.com/tac. With some messages, these
tools and utilities will supply clarifying information.
Search for resolved software issues using the Bug
Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
Error Message: %PMAN-3-PROCFAIL The process [chars] has failed (rc [dec])
The process has failed as the result of an error. This message will appear with other messages related
to the process. Check the other messages to determine
the reason for the failures and see if corrective action
can be taken. If the problem persists, copy the message
exactly as it appears on the console or in the system
log. Research and attempt to resolve the issue using
the tools and utilities provided at:
http://www.cisco.com/tac. With some messages, these
tools and utilities will supply clarifying information.
Search for resolved software issues using the Bug
Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
183
System Messages
How to Find Error Message Details
Error Message: %PMAN-3-PROCFAIL_IGNORE [chars] process exits and failures are being ignored
due to debug settings. Normal router functionality will be affected. Critical router
functions like RP switchover, router reload, FRU resets, etc. may not function properly.
A process failure is being ignored due to the If this behavior is desired and the debug settings are
user-configured debug settings. set according to a user's preference, no action is
needed. If the appearance of this message is viewed
as a problem, change the debug settings. The router
is not expected to behave normally with this debug
setting. Functionalities such as SSO switchover, router
reloads, FRU resets, and so on will be affected. This
setting should only be used in a debug scenario. It is
not normal to run the router with this setting.
Error Message: %PMAN-3-PROCHOLDDOWN The process [chars] has been helddown (rc [dec])
The process was restarted too many times with This message will appear with other messages related
repeated failures and has been placed in the hold-down to the process. Check the other messages to determine
state. the reason for the failures and see if corrective action
can be taken. If the problem persists, copy the message
exactly as it appears on the console or in the system
log. Research and attempt to resolve the issue using
the tools and utilities provided at:
http://www.cisco.com/tac. With some messages, these
tools and utilities will supply clarifying information.
Search for resolved software issues using the Bug
Search Tool at:
http://www.cisco.com/cisco/psn/bssprt/bss. If you still
require assistance, open a case with the Technical
Assistance Center at:
http://tools.cisco.com/ServiceRequestTool/create/, or
contact your Cisco technical support representative
and provide the representative with the information
you have gathered. Attach the following information
to your case in nonzipped, plain-text (.txt) format: the
output of the show logging and show tech-support
commands and your pertinent troubleshooting logs.
The route processor is being reloaded because there Ensure that the reload is not due to an error condition.
is no ready standby instance.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
184
System Messages
How to Find Error Message Details
The RP is being reloaded. Ensure that the reload is not due to an error condition.
If it is due to an error condition, collect information
requested by the other log messages.
The system is being reloaded. Ensure that the reload is not due to an error condition.
If it is due to an error condition, collect information
requested by the other log messages.
The executable file used for the process is bad or has Ensure that the named executable is replaced with the
permission problem. correct executable.
The executable file used for the process is missing, Ensure that the named executable is present and the
or a dependent library is bad. dependent libraries are good.
The executable file used for the process is empty. Ensure that the named executable is non-zero in size.
The process manager is exiting. Ensure that the process manager is not exiting due to
an error condition. If it is due to an error condition,
collect information requested by the other log
messages.
The process has gracefully shut down. No user action is necessary. This message is provided
for informational purposes only.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
185
System Messages
How to Find Error Message Details
The process has launched and is operating properly. No user action is necessary. This message is provided
for informational purposes only.
The process has requested a stateless restart. No user action is necessary. This message is provided
for informational purposes only.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
186
CHAPTER 13
Trace Management
The following sections are included in this chapter:
• Tracing Overview, on page 187
• How Tracing Works, on page 187
• Tracing Levels, on page 188
• Viewing a Tracing Level, on page 189
• Setting a Tracing Level, on page 191
• Viewing the Content of the Trace Buffer, on page 191
Tracing Overview
Tracing is a function that logs internal events. Trace files containing trace messages are automatically created
and saved to the tracelogs directory on the hard disk: file system on the router, which stores tracing files in
bootflash.
The contents of trace files are useful for the following purposes:
• Troubleshooting—Helps to locate and solve an issue with a router. The trace files can be accessed in
diagnostic mode even if other system issues are occurring simultaneously.
• Debugging—Helps to obtain a detailed view of system actions and operations.
Use the following commands to view trace information and set tracing levels:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
187
Trace Management
Tracing Levels
• show logging process module—Shows the most recent trace information for a specific module. This
command can be used in privileged EXEC and diagnostic modes. When used in diagnostic mode, this
command can gather trace log information during a Cisco IOS XE failure.
• set platform software trace—Sets a tracing level that determines the types of messages that are stored
in the output. For more information on tracing levels, see Tracing Levels, on page 188.
Tracing Levels
Tracing levels determine how much information should be stored about a module in the trace buffer or file.
The following table shows all the tracing levels that are available and provides descriptions of what types of
messages are displayed with each tracing level.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
188
Trace Management
Viewing a Tracing Level
If a tracing level is set, messages are collected from both lower tracing levels and from its own level.
For example, setting the tracing level to 3 (error) means that the trace file will contain output messages for
levels: 0 (emergencies), 1 (alerts), 2 (critical), and 3 (error).
If you set the trace level to 4 (warning), it results in output messages for levels: 0 (emergencies), 1 (alerts), 2
(critical), 3 (error), and 4 (warning).
The default tracing level for every module on the router is 5 (notice).
A tracing level is not set in a configuration mode, which results in tracing-level settings being returned to
default values after the router reloads.
Caution Setting the tracing level of a module to debug level or higher can have a negative impact on the performance.
Caution Setting high tracing levels on a large number of modules can severely degrade performance. If a high tracing
level is required in a specific context, it is almost always preferable to set the tracing level of a single module
to a higher level rather than setting multiple modules to high levels.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
189
Trace Management
Viewing a Tracing Level
bsignal Notice
btrace Notice
cce Notice
cdllib Notice
cef Notice
chasfs Notice
chasutil Notice
erspan Notice
ess Notice
ether-channel Notice
evlib Notice
evutil Notice
file_alloc Notice
fman_rp Notice
fpm Notice
fw Notice
icmp Notice
interfaces Notice
iosd Notice
ipc Notice
ipclog Notice
iphc Notice
IPsec Notice
mgmte-acl Notice
mlp Notice
mqipc Notice
nat Notice
nbar Notice
netflow Notice
om Notice
peer Notice
qos Notice
route-map Notice
sbc Notice
services Notice
sw_wdog Notice
tdl_acl_config_type Notice
tdl_acl_db_type Notice
tdl_cdlcore_message Notice
tdl_cef_config_common_type Notice
tdl_cef_config_type Notice
tdl_dpidb_config_type Notice
tdl_fman_rp_comm_type Notice
tdl_fman_rp_message Notice
tdl_fw_config_type Notice
tdl_hapi_tdl_type Notice
tdl_icmp_type Notice
tdl_ip_options_type Notice
tdl_ipc_ack_type Notice
tdl_IPsec_db_type Notice
tdl_mcp_comm_type Notice
tdl_mlp_config_type Notice
tdl_mlp_db_type Notice
tdl_om_type Notice
tdl_ui_message Notice
tdl_ui_type Notice
tdl_urpf_config_type Notice
tdllib Notice
trans_avl Notice
uihandler Notice
uipeer Notice
uistatus Notice
urpf Notice
vista Notice
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
190
Trace Management
Setting a Tracing Level
wccp Notice
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
191
Trace Management
Viewing the Content of the Trace Buffer
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
192
CHAPTER 14
Environmental Monitoring and PoE Management
The Cisco Catalyst 8300 Series Edge Platform have hardware and software features that periodically monitor
the router's environment. This chapter provides information on the environmental monitoring features on your
router that allow you to monitor critical events and generate statistical reports on the status of various router
components. This chapter includes the following sections:
• Environmental Monitoring, on page 193
• Environmental Monitoring and Reporting Functions, on page 193
• Configuring Power Supply Mode, on page 207
Environmental Monitoring
The router provides a robust environment-monitoring system with several sensors that monitor the system
temperatures. Microprocessors generate interrupts to the HOST CPU for critical events and generate a periodic
status and statistics report. The following are some of the key functions of the environmental monitoring
system:
• Monitoring temperature of CPUs, motherboard, and midplane
• Monitoring fan speed
• Recording abnormal events and generating notifications
• Monitoring Simple Network Management Protocol (SNMP) traps
• Generating and collecting Onboard Failure Logging (OBFL) data
• Sending call home event notifications
• Logging system error messages
• Displaying present settings and status
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
193
Environmental Monitoring and PoE Management
Environmental Monitoring Functions
In addition, each power supply monitors its internal temperature and voltage. A power supply is either within
tolerance (normal) or out of tolerance (critical). If an internal power supply's temperature or voltage reaches
a critical level, the power supply shuts down without any interaction with the system processor.
The following table displays the levels of status conditions used by the environmental monitoring system.
Table 17: Levels of Status Conditions Used by the Environmental Monitoring System
Warning The system has exceeded a specified threshold. The system continues to
operate, but operator action is recommended to bring the system back to a
normal state.
The environmental monitoring system sends system messages to the console, for example, when the conditions
described here are met:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
194
Environmental Monitoring and PoE Management
Environmental Monitoring Functions
Fan Failure
When the system power is on, all the fans should be operational. Although the system continues to operate if
a fan fails, the system displays the following message:
%IOSXE_PEM-3-FANFAIL: The fan in slot 2/0 is encountering a failure condition
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
195
Environmental Monitoring and PoE Management
Environmental Reporting Functions
These commands show the current values of parameters such as temperature and voltage.
The environmental monitoring system updates the values of these parameters every 60 seconds. Brief examples
of these commands are shown below:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
196
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
197
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
198
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
199
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
200
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
201
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
202
Environmental Monitoring and PoE Management
Environmental Reporting Functions
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
INFO: Please use "show license UDI" to get serial number for licensing.
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
NAME: "NIM subslot 0/0", DESCR: "Front Panel 6 ports Gigabitethernet Module"
PID: 4x1G-2xSFP , VID: V01 , SN:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
203
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Slot: 0, C8300-1N1S-6T
Running state : ok
Internal state : online
Internal operational state : ok
Physical insert detect time : 00:00:29 (2d03h ago)
Software declared up time : 00:01:05 (2d03h ago)
CPLD version : 19121329
Firmware version : 1RU-20191104
Slot: 1, C8300-1N1S-6T
Running state : ok
Internal state : online
Internal operational state : ok
Physical insert detect time : 00:00:29 (2d03h ago)
Software declared up time : 00:01:06 (2d03h ago)
CPLD version : 19121329
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
204
Environmental Monitoring and PoE Management
Environmental Reporting Functions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
205
Environmental Monitoring and PoE Management
Environmental Reporting Functions
EEPROM version : 4
Compatible Type : 0xFF
PCB Serial Number : FDO23470DHV
Controller Type : 4268
Hardware Revision : 1.0
PCB Part Number : 73-19423-07
Board Revision : A0
Top Assy. Part Number : 800-105842-02
Deviation Number : 551831
Fab Version : 07
Product Identifier (PID) : C8300-1N1S-4T2X
Version Identifier (VID) : V01
CLEI Code : CMM6J00ARA
Processor type : D0
Chassis Serial Number : FDO2401A038
Chassis MAC Address : c4b2.399e.b6c0
MAC Address block size : 144
Manufacturing Test Data : 00 00 00 00 00 00 00 00
Asset ID :
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
206
Environmental Monitoring and PoE Management
Configuring Power Supply Mode
ROM: (c)
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
-----------------------------------------------------------------
Technology Type Technology-package Technology-package
Current Next Reboot
-----------------------------------------------------------------
Smart License Perpetual network-essentials network-essentials
Smart License Subscription None None
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
207
Environmental Monitoring and PoE Management
Configuring the Edge Platforms Power Supply Mode
For more information on the Power Supply Mode, See the Overview of the Power Options section.
• Hardware Installation Guide for Cisco Catalyst 8300 Series Edge Platform
• Hardware Installation Guide for Cisco Catalyst 8200 Series Edge Platforms
Note The default mode for the device power supply is redundant mode.
Note The default mode for the external PoE service module power supply is redundant mode.
The show power command shows whether boost or redundant mode is configured and whether this mode is
currently running on the system.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
208
Environmental Monitoring and PoE Management
Examples for Configuring Power Supply Mode
Router#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
209
Environmental Monitoring and PoE Management
Available PoE Power
Router(config)#
Router(config)# exit
Router#
*Jan 31 03:36:13.111: %SYS-5-CONFIG_I: Configured from console by console
Router# show power
Main PSU :
Configured Mode : Boost
Current runtime state same : Yes
Total power available : 1450 Watts
POE Module :
Configured Mode : Redundant
Current runtime state same : Yes
Total power available : 500 Watts
Router#
Note To ensure the PoE feature is functional on the external PoE module, verify the availability of PoE power on
your router using the show platform and show power commands.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
210
Environmental Monitoring and PoE Management
Available PoE Power
To determine there is enough PoE power for use by an external PoE service module, use the show platform
and show power commands to calculate the available PoE power based on the wattage values of the main
power supplies and PoE inverters.
Take the values of your main P0 and P1 power supplies to give the Total Power (for main power supplies.)
Then take the values of your PoE1 and PoE2 power inverters to calculate the Total PoE Power.
The following table shows example modes of operation, which may be similar to your configuration.
The Total PoE Power value, in the final column of the table needs to be 500 W or higher for the PoE feature
to be functional on a connected PoE service module.
Note Add power inverters to the router before inserting an external PoE module. Otherwise, even if the Total PoE
Power is sufficient, the PoE power will not be used by the external PoE module and the module will need to
be re-booted for the PoE feature to be functional.
Configuring a power mode of boost or redundant on the main power supplies, or PoE inverters, may affect
the value for Total PoE Power.
The following table shows all power values in Watts. The wattage ratings of the main power supplies are
shown in columns Main P0 and Main P1. The wattage ratings of the PoE inverters are shown in columns
PoE0 and PoE1.
Mode Main P0 Main P1 Config Total PoE0 PoE1 Config Total PoE
Example Mode Power Mode Power
(Main)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
211
Environmental Monitoring and PoE Management
Available PoE Power
Note In the table above, for 500 W or higher Total PoE Power to be available, the "Total Power" (of the main power
supplies) must be 1000 W or higher.
For 1000 W Total PoE Power (see Mode Example 8 above), there must be two 1000 W main power supplies
(in Boost mode) and two PoE inverters (also in Boost mode).
Caution Care should be taken while removing the power supplies and power inverters (especially in Boost mode of
operation). If the total power consumption is higher than can be supported by one power supply alone and in
this condition a power supply is removed, the hardware can be damaged. This may then result in the system
being unstable or unusable.
Similarly, in the case where there is only one PoE inverter providing PoE power to a service module, and in
this condition the PoE inverter is removed, the hardware may be damaged, and may result in the system being
unstable or unusable.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
212
CHAPTER 15
Configuring High Availability
The Cisco High Availability (HA) technology enable network-wide protection by providing quick recovery
from disruptions that may occur in any part of a network. A network's hardware and software work together
with Cisco High Availability technology, which besides enabling quick recovery from disruptions, ensures
fault transparency to users and network applications.
The following sections describe how to configure Cisco High Availability features on your device:
• About Cisco High Availability, on page 213
• Interchassis High Availability, on page 213
• Bidirectional Forwarding Detection, on page 214
• Configuring Cisco High Availability, on page 215
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
213
Configuring High Availability
IPsec Failover
The device are joined by a configurable control link and data synchronization link. The control link is used
to communicate the status of the devices. The data synchronization link is used to transfer stateful information
to synchronize the stateful database for the calls and media flows. Each pair of redundant interfaces are
configured with the same unique ID number, also known as the RII. For information on configuring Interchassis
HA on your device, see Configuring Interchassis High Availability, on page 215.
IPsec Failover
The IPsec Failover feature increases the total uptime (or availability) of your IPsec network. Traditionally,
the increased availability of your IPsec network is accomplished by employing a redundant (standby) device
in addition to the original (active) device. When the active device becomes unavailable for a reason, the
standby device takes over the processing of IKE and IPsec. IPsec failover falls into two categories: stateless
failover and stateful failover.
On the device, only the stateless form of IPsec failover is supported. This stateless failover uses protocols
such as the Hot Standby Router Protocol (HSRP) to provide primary to secondary cutover and also allows
the active and standby VPN gateways to share a common virtual IP address.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
214
Configuring High Availability
Bidirectional Forwarding Detection Offload
Restrictions
• The failover time for a box-to-box application is higher for a non-box-to-box application.
• LAN and MESH scenarios are not supported.
• VRFs are not supported and cannot be configured under ZBFW High Availability data and control
interfaces.
• The maximum number of virtual MACs supported by the Front Panel Gigabit Ethernet (FPGE) interfaces
depends on the platform. For information about the FPGE interfaces, see the Hardware Installation Guide
for Cisco Catalyst 8300 Edge Platform.
• When the configuration is replicated to the standby device, it is not committed to the startup configuration;
it is in the running configuration. A user must run the write memory command to commit the changes
that have been synchronized from the active device, on the standby device.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
215
Configuring High Availability
Configuring Bidirectional Forwarding
Restrictions
• Only BFD version 1 is supported.
• When configured, only offloaded BFD sessions are supported;, BFD session on RP are not supported.
• Only Asynchronous mode or no echo mode of BFD is supported.
• 511 asynchronous BFD sessions are supported.
• BFD hardware offload is supported for IPv4 sessions with non-echo mode only.
• BFD offload is supported only on port-channel interfaces.
• BFD offload is supported only for the Ethernet interface.
• BFD offload is not supported for IPv6 BFD sessions.
• BFD offload is not supported for BFD with TE/FRR.
Note Prerequisites and links to additional documentation configuring Interchassis High Availability are listed in
Configuring Interchassis High Availability, on page 215.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
216
Configuring High Availability
Verifying Interchassis High Availability
The following example shows the redundancy application groups configured on the device:
Router# show redundancy application group
Group ID Group Name State
-------- ---------- -----
1 Generic-Redundancy-1 STANDBY
2 Generic-Redundancy2 ACTIVE
RF Domain: btob-one
RF state: STANDBY HOT
Peer RF state: ACTIVE
RF Domain: btob-two
RF state: ACTIVE
Peer RF state: STANDBY HOT
The following example shows details of the redundancy application transport client:
Router# show redundancy application transport client
Client Conn# Priority Interface L3 L4
( 0)RF 0 1 CTRL IPV4 SCTP
The following example shows configuration details for the redundancy application transport group:
Router# show redundancy application transport group
Transport Information for RG (1)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
217
Configuring High Availability
Verifying Interchassis High Availability
Client = RF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
0 0 192.0.2.8 59000 192.0.2.4 59000 CTRL IPV4 SCTP
Client = MCP_HA
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
1 1 10.10.2.10 53000 10.10.6.9 53000 DATA IPV4 UDP_REL
Client = AR
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
2 0 192.0.2.3 0 192.0.2.3 0 NONE_IN NONE_L3 NONE_L4
Client = CF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
3 0 10.10.2.10 59001 10.10.6.9 59001 DATA IPV4 SCTP
Transport Information for RG (2)
Client = RF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
8 0 192.0.2.8 59004 192.0.2.2 59004 CTRL IPV4 SCTP
Client = MCP_HA
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
9 1 10.10.2.10 53002 10.10.6.9 53002 DATA IPV4 UDP_REL
Client = AR
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
10 0 192.0.2.3 0 192.0.2.3 0 NONE_IN NONE_L3 NONE_L4
Client = CF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
11 0 10.10.2.10 59005 10.10.6.9 59005 DATA IPV4 SCTP
The following example shows the configuration details of redundancy application transport group 1:
Router# show redundancy application transport group 1
Transport Information for RG (1)
Client = RF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
0 0 192.0.2.8 59000 192.0.2.4 59000 CTRL IPV4 SCTP
Client = MCP_HA
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
1 1 10.10.2.10 53000 10.10.2.10 53000 DATA IPV4 UDP_REL
Client = AR
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
2 0 192.0.2.3 0 192.0.2.3 0 NONE_IN NONE_L3 NONE_L4
Client = CF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
3 0 10.10.2.10 59001 10.10.2.10 59001 DATA IPV4 SCTP
The following example shows configuration details of redundancy application transport group 2:
Router# show redundancy application transport group 2
Transport Information for RG (2)
Client = RF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
8 0 192.0.2.8 59004 192.0.2.4 59004 CTRL IPV4 SCTP
Client = MCP_HA
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
9 1 10.10.2.10 53002 10.10.2.10 53002 DATA IPV4 UDP_REL
Client = AR
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
10 0 192.0.2.3 0 192.0.2.3 0 NONE_IN NONE_L3 NONE_L4
Client = CF
TI conn_id my_ip my_port peer_ip peer_por intf L3 L4
11 0 10.10.2.10 59005 10.10.2.10 59005 DATA IPV4 SCTP
The following example shows configuration details of the redundancy application control-interface group:
Router# show redundancy application control-interface group
The control interface for rg[1] is GigabitEthernet0/0/0
Interface is Control interface associated with the following protocols: 2 1
BFD Enabled
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
218
Configuring High Availability
Verifying Interchassis High Availability
Interface Neighbors:
Peer: 192.0.2.4 Active RGs: 1 Standby RGs: 2 BFD handle: 0
The following example shows configuration details of the redundancy application control-interface group 1:
Router# show redundancy application control-interface group 1
The control interface for rg[1] is GigabitEthernet0/0/0
Interface is Control interface associated with the following protocols: 2 1
BFD Enabled
Interface Neighbors:
Peer: 192.0.2.4 Active RGs: 1 Standby RGs: 2 BFD handle: 0
The following example shows configuration details of the redundancy application control-interface group 2:
Router# show redundancy application control-interface group 2
The control interface for rg[2] is GigabitEthernet0/0/0
Interface is Control interface associated with the following protocols: 2 1
BFD Enabled
Interface Neighbors:
Peer: 192.0.2.4 Active RGs: 1 Standby RGs: 2 BFD handle: 0
The following example shows configuration details of the redundancy application faults group:
Router# show redundancy application faults group
Faults states Group 1 info:
Runtime priority: [50]
RG Faults RG State: Up.
Total # of switchovers due to faults: 0
Total # of down/up state changes due to faults: 2
Faults states Group 2 info:
Runtime priority: [135]
RG Faults RG State: Up.
Total # of switchovers due to faults: 0
Total # of down/up state changes due to faults: 2
The following example shows configuration details specific to redundancy application faults group 1:
Router# show redundancy application faults group 1
Faults states Group 1 info:
Runtime priority: [50]
RG Faults RG State: Up.
Total # of switchovers due to faults: 0
Total # of down/up state changes due to faults: 2
The following example shows configuration details specific to redundancy application faults group 2:
Router# show redundancy application faults group 2
Faults states Group 2 info:
Runtime priority: [135]
RG Faults RG State: Up.
Total # of switchovers due to faults: 0
Total # of down/up state changes due to faults: 2
The following example shows configuration details for the redundancy application protocol group:
Router# show redundancy application protocol group
RG Protocol RG 1
------------------
Role: Standby
Negotiation: Enabled
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
219
Configuring High Availability
Verifying Interchassis High Availability
Priority: 50
Protocol state: Standby-hot
Ctrl Intf(s) state: Up
Active Peer: address 192.0.4.2, priority 150, intf Gi0/0/0
Standby Peer: Local
Log counters:
role change to active: 0
role change to standby: 1
disable events: rg down state 1, rg shut 0
ctrl intf events: up 2, down 1, admin_down 1
reload events: local request 0, peer request 0
RG Protocol RG 2
------------------
Role: Active
Negotiation: Enabled
Priority: 135
Protocol state: Active
Ctrl Intf(s) state: Up
Active Peer: Local
Standby Peer: address 192.0.4.2, priority 130, intf Gi0/0/0
Log counters:
role change to active: 1
role change to standby: 1
disable events: rg down state 1, rg shut 0
ctrl intf events: up 2, down 1, admin_down 1
reload events: local request 0, peer request 0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
220
Configuring High Availability
Verifying Interchassis High Availability
The following example shows configuration details for the redundancy application protocol group 1:
Router# show redundancy application protocol group 1
RG Protocol RG 1
------------------
Role: Standby
Negotiation: Enabled
Priority: 50
Protocol state: Standby-hot
Ctrl Intf(s) state: Up
Active Peer: address 192.0.4.2, priority 150, intf Gi0/0/0
Standby Peer: Local
Log counters:
role change to active: 0
role change to standby: 1
disable events: rg down state 1, rg shut 0
ctrl intf events: up 2, down 1, admin_down 1
reload events: local request 0, peer request 0
The following example shows configuration details for the redundancy application protocol group 2:
Router# show redundancy application protocol group 2
RG Protocol RG 2
------------------
Role: Active
Negotiation: Enabled
Priority: 135
Protocol state: Active
Ctrl Intf(s) state: Up
Active Peer: Local
Standby Peer: address 192.0.4.2, priority 130, intf Gi0/0/0
Log counters:
role change to active: 1
role change to standby: 1
disable events: rg down state 1, rg shut 0
ctrl intf events: up 2, down 1, admin_down 1
reload events: local request 0, peer request 0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
221
Configuring High Availability
Verifying Interchassis High Availability
The following example shows configuration details for the redundancy application protocol 1:
Router# show redundancy application protocol 1
Protocol id: 1, name: rg-protocol-1
BFD: ENABLE
Hello timer in msecs: 3000
Hold timer in msecs: 10000
OVLD-1#show redundancy application protocol 2
Protocol id: 2, name: rg-protocol-2
BFD: ENABLE
Hello timer in msecs: 3000
Hold timer in msecs: 10000
The following example shows configuration details for redundancy application interface manager group:
Router# show redundancy application if-mgr group
RG ID: 1
==========
interface GigabitEthernet0/0/3.152
---------------------------------------
VMAC 0007.b421.4e21
VIP 203.0.113.1
Shut shut
Decrement 10
interface GigabitEthernet0/0/2.152
---------------------------------------
VMAC 0007.b421.5209
VIP 203.0.113.4
Shut shut
Decrement 10
RG ID: 2
==========
interface GigabitEthernet0/0/3.166
---------------------------------------
VMAC 0007.b422.14d6
VIP 203.0.113.6
Shut no shut
Decrement 10
interface GigabitEthernet0/0/2.166
---------------------------------------
VMAC 0007.b422.0d06
VIP 203.0.113.9
Shut no shut
Decrement 10
The following examples shows configuration details for redundancy application interface manager group 1
and group 2:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
222
Configuring High Availability
Verifying BFD Offload
RG ID: 1
==========
interface GigabitEthernet0/0/3.152
---------------------------------------
VMAC 0007.b421.4e21
VIP 203.0.113.3
Shut shut
Decrement 10
interface GigabitEthernet0/0/2.152
---------------------------------------
VMAC 0007.b421.5209
VIP 203.0.113.2
Shut shut
Decrement 10
interface GigabitEthernet0/0/3.166
---------------------------------------
VMAC 0007.b422.14d6
VIP 203.0.113.5
Shut no shut
Decrement 10
interface GigabitEthernet0/0/2.166
---------------------------------------
VMAC 0007.b422.0d06
VIP 203.0.113.7
Shut no shut
Decrement 10
The following example shows configuration details for redundancy application data-interface group:
Router# show redundancy application data-interface group
The data interface for rg[1] is GigabitEthernet0/0/1
The data interface for rg[2] is GigabitEthernet0/0/1
The following examples show configuration details specific to redundancy application data-interface group
1 and group 2:
Router# show redundancy application data-interface group 1
The data interface for rg[1] is GigabitEthernet0/0/1
Note Configuration of BFD Offload is described in Configuring Bidirectional Forwarding, on page 216.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
223
Configuring High Availability
Verifying BFD Offload
The show bfd neighbors command displays the BFD adjacency database:
Router# show bfd neighbor
IPv4 Sessions
NeighAddr LD/RD RH/RS State Int
192.0.2.1 362/1277 Up Up Gi0/0/1.2
192.0.2.5 445/1278 Up Up Gi0/0/1.3
192.0.2.3 1093/961 Up Up Gi0/0/1.4
192.0.2.2 1244/946 Up Up Gi0/0/1.5
192.0.2.6 1094/937 Up Up Gi0/0/1.6
192.0.2.7 1097/1260 Up Up Gi0/0/1.7
192.0.2.4 1098/929 Up Up Gi0/0/1.8
192.0.2.9 1111/928 Up Up Gi0/0/1.9
192.0.2.8 1100/1254 Up Up Gi0/0/1.10
The debug bfd neighbor detail command displays the debugging information related to BFD packets:
Router# show bfd neighbor detail
IPv4 Sessions
NeighAddr LD/RD RH/RS State Int
192.0.2.1 362/1277 Up Up Gi0/0/1.2
Session state is UP and not using echo function.
Session Host: Hardware
OurAddr: 192.0.2.2
Handle: 33
Local Diag: 0, Demand mode: 0, Poll bit: 0
MinTxInt: 50000, MinRxInt: 50000, Multiplier: 3
Received MinRxInt: 50000, Received Multiplier: 3
Holddown (hits): 0(0), Hello (hits): 50(0)
Rx Count: 3465, Rx Interval (ms) min/max/avg: 42/51/46
Tx Count: 3466, Tx Interval (ms) min/max/avg: 39/52/46
Elapsed time watermarks: 0 0 (last: 0)
Registered protocols: CEF EIGRP
Uptime: 00:02:50
Last packet: Version: 1 - Diagnostic: 0
State bit: Up - Demand bit: 0
Poll bit: 0 - Final bit: 0
C bit: 1
Multiplier: 3 - Length: 24
My Discr.: 1277 - Your Discr.: 362
Min tx interval: 50000 - Min rx interval: 50000
Min Echo interval: 0
Session Up Down
The show bfd drops command displays the number of packets dropped in BFD:
Router# show bfd drops
BFD Drop Statistics
IPV4 IPV6 IPV4-M IPV6-M MPLS_PW MPLS_TP_LSP
Invalid TTL 0 0 0 0 0 0
BFD Not Configured 0 0 0 0 0 0
No BFD Adjacency 33 0 0 0 0 0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
224
Configuring High Availability
Verifying BFD Offload
The debug bfd packet command displays debugging information about BFD control packets.
Router# debug bfd packet
*Nov 12 23:08:27.982: BFD-DEBUG Packet: Rx IP:192.0.2.1 ld/rd:1941/0 diag:0(No Diagnostic)
Down C cnt:4 ttl:254 (0)
*Nov 12 23:08:27.982: BFD-DEBUG Packet: Tx IP:192.0.2.1 ld/rd:983/1941 diag:3(Neighbor
Signaled Session Down) Init C cnt:44 (0)
*Nov 12 23:08:28.007: BFD-DEBUG Packet: Rx IP:192.0.2.1 ld/rd:1941/983 diag:0(No Diagnostic)
Up PC cnt:4 ttl:254 (0)
*Nov 12 23:08:28.007: BFD-DEBUG Packet: Tx IP:192.0.2.1 ld/rd:983/1941 diag:0(No Diagnostic)
Up F C cnt:0 (0)
*Nov 12 23:08:28.311: BFD-DEBUG Packet: Rx IP:192.0.2.1 ld/rd:1941/983 diag:0(No Diagnostic)
Up FC cnt:0 ttl:254 (0)
*Nov 12 23:08:28.311: BFD-DEBUG Packet: Tx IP:192.0.2.1 ld/rd:983/1941 diag:0(No Diagnostic)
Up C cnt:0 (0)
*Nov 12 23:08:28.311: BFD-DEBUG Packet: Rx IP:192.0.2.3 ld/rd:1907/0 diag:0(No Diagnostic)
Down C cnt:3 ttl:254 (0)
*Nov 12 23:08:28.311: BFD-DEBUG Packet: Tx IP:192.0.2.3 ld/rd:993/1907 diag:3(Neighbor
Signaled Session Down) Init C cnt:43 (0)
*Nov 12 23:08:28.311: BFD-DEBUG Packet: Rx IP:192.0.2.1 ld/rd:1941/983 diag:0(No Diagnostic)
Up C cnt:0 ttl:254 (0)
*Nov 12 23:08:28.626: BFD-DEBUG Packet: Rx IP:192.0.2.3 ld/rd:1907/993 diag:0(No Diagnostic)
Up PC cnt:3 ttl:254 (0)
*Nov 12 23:08:28.626: BFD-DEBUG Packet: Tx IP:192.0.2.3 ld/rd:993/1907 diag:0(No Diagnostic)
Up F C cnt:0 (0)
*Nov 12 23:08:28.645: BFD-DEBUG Packet: Rx IP:192.0.2.3 ld/rd:1907/993 diag:0(No Diagnostic)
Up C cnt:0 ttl:254 (0)
*Nov 12 23:08:28.700: BFD-DEBUG Packet: Rx IP:192.0.2.3 ld/rd:1907/993 diag:0(No Diagnostic)
Up FC cnt:0 ttl:254 (0)
*Nov 12 23:08:28.700: BFD-DEBUG Packet: Tx IP:192.0.2.3 ld/rd:993/1907 diag:0(No Diagnostic)
Up C cnt:0 (0)
*Nov 12 23:08:28.993: BFD-DEBUG Packet: Rx IP:192.0.2.3 ld/rd:1907/993 diag:0(No Diagnostic)
Up C cnt:0 ttl:254 (0)
The debug bfd event displays debugging information about BFD state transitions:
Router# deb bfd event
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
225
Configuring High Availability
Verifying BFD Offload
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
226
CHAPTER 16
Configuring Secure Storage
Secure Storage feature allows you to secure critical configuration information by encrypting it. It encrypts
VPN, IPSec, and other asymmetric key-pairs, pre-shared secrets, the type 6 password encryption key and
certain credentials. An instance-unique encryption key is stored in the hardware trust anchor to prevent it from
being compromised.
By default, this feature is enabled on platforms that come with a hardware trust anchor. This feature is not
supported on platforms that do not have hardware trust anchor.
• Enabling Secure Storage , on page 227
• Disabling Secure Storage , on page 228
• Verifying the Status of Encryption, on page 229
• Verifying the Platform Identity, on page 229
SUMMARY STEPS
1. Config terminal
2. service private-config-encryption
3. do write memory
DETAILED STEPS
Step 2 service private-config-encryption Enables the Secure Storage feature on your platform.
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
227
Configuring Secure Storage
Disabling Secure Storage
Step 3 do write memory Encrypts the private-config file and saves the file in an
encrypted format.
Example:
router(config)# do write memory
Example
The following example shows how to enable Secure Storage:
router#config terminal
router(config)# service private-config-encryption
router(config)# do write memory
SUMMARY STEPS
1. Config terminal
2. no service private-config-encryption
3. do write memory
DETAILED STEPS
Step 2 no service private-config-encryption Disables the Secure Storage feature on your platform.
Example:
router(config)# no service
private-config-encryption
Step 3 do write memory Decrypts the private-config file and saves the file in plane
format.
Example:
router(config)# do write memory
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
228
Configuring Secure Storage
Verifying the Status of Encryption
Example
The following example shows how to disable Secure Storage:
router#config terminal
router(config)# no service private-config-encryption
router(config)# do write memory
The following command output indicates that the feature is enabled and the file is encrypted. The file is in
‘cipher text’ format.
router#show parser encrypt file status
Feature: Enabled
File Format: Cipher Text
Encryption Version: Ver1
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
229
Configuring Secure Storage
Verifying the Platform Identity
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICTAE
Signature version: 1
Signature:
405C70D802B73947EDBF8D0D2C8180F10D4B3EF9694514219C579D2ED52F7D583E0F40813FC4E9F549B2EB1C21725F7C
B1C79F98271E47E780E703E67472380FB52D4963E1D1FB9787B38E28B8E696570A180B7A2F131B1F174EA79F5DB4765DF67386126D8
9E07EDF6C26E0A81272EA1437D03F2692937082756AE1F1BFAFBFACD6BE9CF9C84C961FACE9FA0FE64D85AE4FA086969D0702C536ABD
B8FBFDC47C14C17D02FEBF4F7F5B24D2932FA876F56B4C07816270A0B4195C53D975C85AEAE3A74F2DBF293F52423ECB7B853967080A
9C57DA3E4B08B2B2CA623B2CBAF7080A0AEB09B2E5B756970A3A27E0F1D17C8A243
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
230
CHAPTER 17
Configuring Call Home
The Call Home feature provides e-mail-based and web-based notification of critical system events. A versatile
range of message formats are available for optimal compatibility with pager services, standard e-mail, or
XML-based automated parsing applications. Common uses of this feature may include direct paging of a
network support engineer, e-mail notification to a Network Operations Center, XML delivery to a support
website, and use of Cisco Smart Call Home services for direct case generation with the Cisco Systems Technical
Assistance Center (TAC).
This chapter includes the following sections:
• Finding Feature Information, on page 231
• Prerequisites for Call Home, on page 231
• Information About Call Home, on page 232
• How to Configure Call Home, on page 234
• Configuring Diagnostic Signatures, on page 256
• Displaying Call Home Configuration Information, on page 264
• Default Call Home Settings, on page 270
• Alert Group Trigger Events and Commands, on page 270
• Message Contents, on page 277
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
231
Configuring Call Home
Information About Call Home
• At least one destination profile (predefined or user-defined) must be configured. The destination profile
you use depends on whether the receiving entity is a pager, an e-mail address, or an automated service
such as Cisco Smart Call Home.
If the destination profile uses e-mail message delivery, you must specify a Simple Mail Transfer Protocol
(SMTP) server.
• The router must have IP connectivity to an e-mail server or the destination HTTP server.
• If Cisco Smart Call Home is used, an active service contract covering the device is required to provide
full Cisco Smart Call Home service.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
232
Configuring Call Home
Obtaining Smart Call Home Services
You need the following items to register for Smart Call Home:
• SMARTnet contract number for your router
• Your e-mail address
• Your Cisco.com username
Anonymous Reporting
Smart Call Home is a service capability included with many Cisco service contracts and is designed to assist
customers resolve problems more quickly. In addition, the information gained from crash messages helps
Cisco understand equipment and issues occurring in the field. If you decide not to use Smart Call Home, you
can still enable Anonymous Reporting to allow Cisco to securely receive minimal error and health information
from the device. If you enable Anonymous Reporting, your customer identity will remain anonymous, and
no identifying information will be sent.
Note When you enable Anonymous Reporting, you acknowledge your consent to transfer the specified data to
Cisco or to vendors operating on behalf of Cisco (including countries outside the United States). Cisco
maintains the privacy of all customers. For information about how Cisco treats personal information, see the
Cisco Privacy Statement at http://www.cisco.com/web/siteassets/legal/privacy.html.
When Call Home is configured in an anonymous way, only crash, inventory, and test messages are sent to
Cisco. No customer identifying information is sent.
For more information about what is sent in these messages, see Alert Group Trigger Events and Commands,
on page 270.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
233
Configuring Call Home
How to Configure Call Home
SUMMARY STEPS
1. configure terminal
2. call-home reporting {anonymous | contact-email-addr email-address} [http-proxy {ipv4-address
| ipv6-address | name} port port-number]
DETAILED STEPS
Step 2 call-home reporting {anonymous | contact-email-addr Enables the basic configurations for Call Home using a
email-address} [http-proxy {ipv4-address | single command.
ipv6-address | name} port port-number]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
234
Configuring Call Home
Configuring and Enabling Smart Call Home
Note For security reasons, we recommend that you use the HTTPS transport options, due to the additional payload
encryption that HTTPS offers. The Transport Gateway software is downloadable from Cisco.com and is
available if you require an aggregation point or a proxy for connection to the Internet.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
235
Configuring Call Home
Enabling and Disabling Call Home
SUMMARY STEPS
1. configure terminal
2. service call-home
3. no service call-home
DETAILED STEPS
SUMMARY STEPS
1. configure terminal
2. call-home
3. contact-email-addr email-address
4. phone-number +phone-number
5. street-address street-address
6. customer-id text
7. site-id text
8. contract-id text
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
236
Configuring Call Home
Configuring Contact Information
DETAILED STEPS
Step 3 contact-email-addr email-address Designates your e-mail address. Enter up to 200 characters
in e-mail address format with no spaces.
Example:
Router(cfg-call-home)# contact-email-addr
[email protected]
Step 5 street-address street-address (Optional) Assigns your street address where RMA
equipment can be shipped. Enter up to 200 characters. If
Example:
you include spaces, you must enclose your entry in quotes
Router(cfg-call-home)# street-address “1234 Picaboo (“”).
Street, Any city, Any state, 12345“
Step 7 site-id text (Optional) Identifies customer site ID. Enter up to 200
characters. If you include spaces, you must enclose your
Example:
entry in quotes (“”).
Router(cfg-call-home)# site-id Site1ManhattanNY
Step 8 contract-id text (Optional) Identifies your contract ID for the router. Enter
up to 64 characters. If you include spaces, you must enclose
Example:
your entry in quotes (“”).
Router(cfg-call-home)# contract-id Company1234
Example
The following example shows how to configure contact information:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# call-home
Router(cfg-call-home)# contact-email-addr [email protected]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
237
Configuring Call Home
Configuring Destination Profiles
Note If you use the Cisco Smart Call Home service, the destination profile must use the XML message format.
• Transport method—Transport mechanism, either e-mail or HTTP (including HTTPS), for delivery of
alerts.
• For user-defined destination profiles, e-mail is the default, and you can enable either or both transport
mechanisms. If you disable both methods, e-mail is enabled.
• For the predefined Cisco TAC profile, you can enable either transport mechanism, but not both.
• Destination address—The actual address related to the transport method to which the alert should be
sent.
• Message formatting—The message format used for sending the alert. The format options for a user-defined
destination profile are long-text, short-text, or XML. The default is XML. For the predefined Cisco TAC
profile, only XML is allowed.
• Message size—The maximum destination message size. The valid range is 50 to 3,145,728 Bytes. The
default is 3,145,728 Bytes.
Anonymous reporting—You can choose for your customer identity to remain anonymous, and no
identifying information is sent.
• Subscribing to interesting alert-groups—You can choose to subscribe to alert-groups highlighting your
interests.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
238
Configuring Call Home
Creating a New Destination Profile
SUMMARY STEPS
1. configure terminal
2. call-home
3. profile name
4. [no] destination transport-method {email | http}
5. destination address {email email-address | http url}
6. destination preferred-msg-format {long-text | short-text | xml}
7. destination message-size-limit bytes
8. active
9. end
10. show call-home profile {name | all}
DETAILED STEPS
Step 3 profile name Enters the Call Home destination profile configuration
submode for the specified destination profile. If the
Example:
specified destination profile does not exist, it is created.
Router(config-call-home)# profile profile1
Step 4 [no] destination transport-method {email | http} (Optional) Enables the message transport method. The no
option disables the method.
Example:
Router(cfg-call-home-profile)# destination
transport-method email
Step 5 destination address {email email-address | http Configures the destination e-mail address or URL to which
url} Call Home messages are sent.
Example: Note When entering a destination URL, include either
Router(cfg-call-home-profile)# destination address http:// or https://, depending on whether the
email [email protected] server is a secure server.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
239
Configuring Call Home
Copying a Destination Profile
Step 10 show call-home profile {name | all} Displays the destination profile configuration for the
specified profile or all configured profiles.
Example:
Router# show call-home profile profile1
SUMMARY STEPS
1. configure terminal
2. call-home
3. copy profile source-profile target-profile
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
240
Configuring Call Home
Setting Profiles to Anonymous Mode
SUMMARY STEPS
1. configure terminal
2. call-home
3. profile name
4. anonymous-reporting-only
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
241
Configuring Call Home
Subscribing to Alert Groups
• Configuration
• Environment
• Inventory
• Snapshot
• Syslog
The triggering events for each alert group are listed in Alert Group Trigger Events and Commands, on page
270, and the contents of the alert group messages are listed in Message Contents, on page 277.
You can select one or more alert groups to be received by a destination profile.
Note A Call Home alert is only sent to destination profiles that have subscribed to the alert group containing that
Call Home alert. In addition, the alert group must be enabled.
To subscribe a destination profile to one or more alert groups, perform the following steps:
SUMMARY STEPS
1. configure terminal
2. call-home
3. alert-group {all | configuration | environment | inventory | syslog | crash | snapshot}
4. profile name
5. subscribe-to-alert-group all
6. subscribe-to-alert-group configuration [periodic {daily hh:mm | monthly date hh:mm |
weekly day hh:mm}]
7. subscribe-to-alert-group environment [severity {catastrophic | disaster | fatal | critical |
major | minor | warning | notification | normal | debugging}]
8. subscribe-to-alert-group inventory [periodic {daily hh:mm | monthly date hh:mm | weekly
day hh:mm}]
9. subscribe-to-alert-group syslog [severity {catastrophic | disaster | fatal | critical | major
| minor | warning | notification | normal | debugging}]
10. subscribe-to-alert-group crash
11. subscribe-to-alert-group snapshot periodic {daily hh:mm | hourly mm | interval mm |
monthly date hh:mm | weekly day hh:mm}
12. exit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
242
Configuring Call Home
Subscribing to Alert Groups
DETAILED STEPS
Step 3 alert-group {all | configuration | environment | Enables the specified alert group. Use the keyword all to
inventory | syslog | crash | snapshot} enable all alert groups. By default, all alert groups are
enabled.
Example:
Router(cfg-call-home)# alert-group all
Step 4 profile name Enters the Call Home destination profile configuration
submode for the specified destination profile.
Example:
Router(cfg-call-home)# profile profile1
Step 5 subscribe-to-alert-group all Subscribes to all available alert groups using the lowest
severity.
Example:
Router(cfg-call-home-profile)# You can subscribe to alert groups individually by specific
subscribe-to-alert-group all type, as described in Step 6 through Step 11.
Note This command subscribes to the syslog debug
default severity. This causes a large number of
syslog messages to generate. You should
subscribe to alert groups individually, using
appropriate severity levels and patterns when
possible.
Step 6 subscribe-to-alert-group configuration [periodic Subscribes this destination profile to the Configuration
{daily hh:mm | monthly date hh:mm | weekly day alert group. The Configuration alert group can be
hh:mm}] configured for periodic notification, as described in
Periodic Notification, on page 244.
Example:
Router(cfg-call-home-profile)#
subscribe-to-alert-group configuration
periodic daily 12:00
Step 7 subscribe-to-alert-group environment [severity Subscribes this destination profile to the Environment alert
{catastrophic | disaster | fatal | critical | major group. The Environment alert group can be configured to
| minor | warning | notification | normal | filter messages based on severity, as described in Message
debugging}] Severity Threshold, on page 245.
Example:
Router(cfg-call-home-profile)#
subscribe-to-alert-group environment severity
major
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
243
Configuring Call Home
Periodic Notification
Step 9 subscribe-to-alert-group syslog [severity Subscribes this destination profile to the Syslog alert group.
{catastrophic | disaster | fatal | critical | major The Syslog alert group can be configured to filter messages
| minor | warning | notification | normal | based on severity, as described in Message Severity
debugging}] Threshold, on page 245.
Example: You can specify a text pattern to be matched within each
Router(cfg-call-home-profile)# syslog message. If you configure a pattern, a Syslog alert
subscribe-to-alert-group environment severity group message is sent only if it contains the specified
major pattern and meets the severity threshold. If the pattern
contains spaces, you must enclose it in quotes (“”). You
can specify up to five patterns for each destination profile.
Step 10 subscribe-to-alert-group crash Subscribes to the Crash alert group in user profile. By
default, TAC profile subscribes to the Crash alert group
Example:
and cannot be unsubscribed.
Router(cfg-call-home-profile)# [no | default]
subscribe-to-alert-group crash
Step 11 subscribe-to-alert-group snapshot periodic {daily Subscribes this destination profile to the Snapshot alert
hh:mm | hourly mm | interval mm | monthly date group. The Snapshot alert group can be configured for
hh:mm | weekly day hh:mm} periodic notification, as described in Periodic Notification,
on page 244.
Example:
Router(cfg-call-home-profile)# By default, the Snapshot alert group has no command to
subscribe-to-alert-group snapshot periodic daily run. You can add commands into the alert group, as
12:00 described in Configuring a Snapshot Command List, on
page 245. In doing so, the output of the commands added
in the Snapshot alert group will be included in the snapshot
message.
Periodic Notification
When you subscribe a destination profile to the Configuration, Inventory, or Snapshot alert group, you can
choose to receive the alert group messages asynchronously or periodically at a specified time. The sending
period can be one of the following:
• Daily—Specifies the time of day to send, using an hour:minute format hh:mm, with a 24-hour clock (for
example, 14:30).
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
244
Configuring Call Home
Message Severity Threshold
• Weekly—Specifies the day of the week and time of day in the format day hh:mm, where the day of the
week is spelled out (for example, Monday).
• Monthly—Specifies the numeric date, from 1 to 31, and the time of day, in the format date hh:mm.
• Interval—Specifies the interval at which the periodic message is sent, from 1 to 60 minutes.
• Hourly—Specifies the minute of the hour at which the periodic message is sent, from 0 to 59 minutes.
Note Hourly and by interval periodic notifications are available for the Snapshot alert group only.
Note Call Home severity levels are not the same as system message logging severity levels.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
245
Configuring Call Home
Configuring General E-Mail Options
SUMMARY STEPS
1. configure terminal
2. call-home
3. [no | default] alert-group-config snapshot
4. [no | default] add-command command string
5. exit
DETAILED STEPS
Step 4 [no | default] add-command command string Adds the command to the Snapshot alert group. The no or
default command removes the corresponding command.
Example:
Router(cfg-call-home-snapshot)# add-command “show • command string—IOS command. Maximum length is
version” 128.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
246
Configuring Call Home
Configuring General E-Mail Options
SUMMARY STEPS
1. configure terminal
2. call-home
3. mail-server [{ipv4-address | ipv6-address} | name] priority number
4. sender from email-address
5. sender reply-to email-address
6. source-interface interface-name
7. vrf vrf-name
DETAILED STEPS
Step 3 mail-server [{ipv4-address | ipv6-address} | name] Assigns an e-mail server address and its relative priority
priority number among configured e-mail servers.
Example: Provide either of these:
Router(cfg-call-home)# mail-server stmp.example.com • The e-mail server’s IP address.
priority 1
• The e-mail server’s fully qualified domain name
(FQDN) of 64 characters or less.
Step 4 sender from email-address (Optional) Assigns the e-mail address that appears in the
from field in Call Home e-mail messages. If no address is
Example:
specified, the contact e-mail address is used.
Router(cfg-call-home)# sender from
[email protected]
Step 5 sender reply-to email-address (Optional) Assigns the e-mail address that appears in the
reply-to field in Call Home e-mail messages.
Example:
Router(cfg-call-home)# sender reply-to
[email protected]
Step 6 source-interface interface-name Assigns the source interface name to send call-home
messages.
Example:
Router(cfg-call-home)# source-interface loopback1 • interface-name—Source interface name. Maximum
length is 64.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
247
Configuring Call Home
Specifying Rate Limit for Sending Call Home Messages
Step 7 vrf vrf-name (Optional) Specifies the VRF instance to send call-home
e-mail messages. If no vrf is specified, the global routing
Example:
table is used.
Router(cfg-call-home)# vrf vpn1
Note For HTTP messages, if the source interface is
associated with a VRF, use the ip http client
source-interface interface-name command in
global configuration mode to specify the VRF
instance that will be used for all HTTP clients
on the device.
Example
The following example shows the configuration of general e-mail parameters, including a primary
and secondary e-mail server:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# call-home
Router(cfg-call-home)# mail-server smtp.example.com priority 1
Router(cfg-call-home)# mail-server 192.0.2.1 priority 2
Router(cfg-call-home)# sender from [email protected]
Router(cfg-call-home)# sender reply-to [email protected]
Router(cfg-call-home)# source-interface loopback1
Router(cfg-call-home)# vrf vpn1
Router(cfg-call-home)# exit
Router(config)#
SUMMARY STEPS
1. configure terminal
2. call-home
3. rate-limit number
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
248
Configuring Call Home
Specifying HTTP Proxy Server
DETAILED STEPS
Step 3 rate-limit number Specifies a limit on the number of messages sent per minute.
Example: • number—Range is 1 to 60. The default is 20.
Router(cfg-call-home)# rate-limit 40
SUMMARY STEPS
1. configure terminal
2. call-home
3. http-proxy {ipv4-address | ipv6-address | name} port port-number
DETAILED STEPS
Step 3 http-proxy {ipv4-address | ipv6-address | name} port Specifies the proxy server for the HTTP request.
port-number
Example:
Router(cfg-call-home)# http-proxy 192.0.2.1 port
1
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
249
Configuring Call Home
Enabling AAA Authorization to Run IOS Commands for Call Home Messages
Enabling AAA Authorization to Run IOS Commands for Call Home Messages
To specify an HTTP proxy server for sending Call Home HTTP(S) messages to a destination, perform the
following steps:
SUMMARY STEPS
1. configure terminal
2. call-home
3. aaa-authorization
4. aaa-authorization [username username]
DETAILED STEPS
SUMMARY STEPS
1. configure terminal
2. call-home
3. [no] syslog-throttling
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
250
Configuring Call Home
Configuring Call Home Data Privacy
DETAILED STEPS
SUMMARY STEPS
1. configure terminal
2. call-home
3. data-privacy {level {normal | high} | hostname}
DETAILED STEPS
Step 3 data-privacy {level {normal | high} | hostname} Scrubs data from running configuration file to protect the
privacy of the user. The default data-privacy level is normal.
Example:
Router(cfg-call-home)# data-privacy level high Note Enabling the data-privacy command can affect
CPU utilization when scrubbing a large amount
of data.
• normal—Scrubs all normal-level commands.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
251
Configuring Call Home
Sending Call Home Communications Manually
SUMMARY STEPS
1. call-home test [“test-message”] profile name
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
252
Configuring Call Home
Submitting Call Home Analysis and Report Requests
• When you manually trigger a crash, snapshot, configuration, or inventory alert group message and you
specify a destination profile name, a message is sent to the destination profile regardless of the profile’s
active status, subscription status, or severity setting.
• When you manually trigger a crash, snapshot, configuration, or inventory alert group message and do
not specify a destination profile name, a message is sent to all active profiles that have either a normal
or periodic subscription to the specified alert group.
To manually trigger Call Home alert group messages, perform the following steps:
SUMMARY STEPS
1. call-home send alert-group snapshot [profile name]
2. call-home send alert-group crash [profile name]
3. call-home send alert-group configuration [profile name]
4. call-home send alert-group inventory [profile name]
DETAILED STEPS
Step 2 call-home send alert-group crash [profile name] Sends a crash alert group message to one destination profile
if specified, or to all subscribed destination profiles.
Example:
Router# call-home send alert-group crash profile
profile1
Step 3 call-home send alert-group configuration [profile Sends a configuration alert group message to one destination
name] profile if specified, or to all subscribed destination profiles.
Example:
Router# call-home send alert-group configuration
profile profile1
Step 4 call-home send alert-group inventory [profile name] Sends an inventory alert group message to one destination
profile if specified, or to all subscribed destination profiles.
Example:
Router# call-home send alert-group inventory
profile profile1
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
253
Configuring Call Home
Submitting Call Home Analysis and Report Requests
• If a profile name is specified, the request is sent to the profile. If no profile is specified, the request is
sent to the Cisco TAC profile. The recipient profile does not need to be enabled for the call-home request.
The profile should specify the e-mail address where the transport gateway is configured so that the request
message can be forwarded to the Cisco TAC and the user can receive the reply from the Smart Call Home
service.
• The ccoid user-id is the registered identifier of the Smart Call Home user. If the user-id is specified, the
response is sent to the e-mail address of the registered user. If no user-id is specified, the response is sent
to the contact e-mail address of the device.
• Based on the keyword specifying the type of report requested, the following information is returned:
• config-sanity—Information on best practices as related to the current running configuration.
• bugs-list—Known bugs in the running version and in the currently applied features.
• command-reference—Reference links to all commands in the running configuration.
• product-advisory—Product Security Incident Response Team (PSIRT) notices, End of Life (EOL)
or End of Sales (EOS) notices, or field notices (FN) that may affect the devices in your network.
To submit a request for analysis and report information from the Cisco Output Interpreter tool, perform the
following steps:
SUMMARY STEPS
1. call-home request output-analysis “show-command” [profile name] [ccoid user-id]
2. call-home request {config-sanity | bugs-list | command-reference | product-advisory} [profile
name] [ccoid user-id]
DETAILED STEPS
Step 2 call-home request {config-sanity | bugs-list | Sends the output of a predetermined set of commands such
command-reference | product-advisory} [profile as the show running-config all, show version or show
name] [ccoid user-id] module commands, for analysis. In addition, the call home
request product-advisory sub-command includes all
Example:
inventory alert group commands. The keyword specified
Router# call-home request config-sanity profile TG after request specifies the type of report requested.
Example
The following example shows a request for analysis of a user-specified show command:
Router# call-home request output-analysis "show diag" profile TG
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
254
Configuring Call Home
Manually Sending Command Output Message for One Command or a Command List
Manually Sending Command Output Message for One Command or a Command List
You can use the call-home send command to execute an IOS command or a list of IOS commands and send
the command output through HTTP or e-mail protocol.
Note the following guidelines when sending the output of a command:
• The specified IOS command or list of IOS commands can be any run command, including commands
for all modules. The command must be contained in quotes (“”).
• If the e-mail option is selected using the “email” keyword and an e-mail address is specified, the command
output is sent to that address. If neither the e-mail nor the HTTP option is specified, the output is sent in
long-text format with the specified service request number to the Cisco TAC ([email protected]).
• If neither the “email” nor the “http” keyword is specified, the service request number is required for both
long-text and XML message formats and is provided in the subject line of the e-mail.
• If the HTTP option is specified, the CiscoTac-1 profile destination HTTP or HTTPS URL is used as the
destination. The destination e-mail address can be specified so that Smart Call Home can forward the
message to the e-mail address. The user must specify either the destination e-mail address or an SR
number but they can also specify both.
To execute a command and send the command output, perform the following step:
SUMMARY STEPS
1. call-home send {cli command | cli list} [email email msg-format {long-text | xml} | http
{destination-email-address email}] [tac-service-request SR#]
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
255
Configuring Call Home
Configuring Diagnostic Signatures
Example
The following example shows how to send the output of a command to a user-specified e-mail
address:
Router# call-home send “show diag” email [email protected]
The following example shows the command output sent in long-text format to [email protected],
with the SR number specified:
Router# call-home send “show version; show run” tac-service-request 123456
The following example shows the command output sent in XML message format to
[email protected]:
Router# call-home send “show version; show run” email [email protected] msg-format xml
The following example shows the command output sent in XML message format to the Cisco TAC
backend server, with the SR number specified:
Router# call-home send “show version; show run” http tac-service-request 123456
The following example shows the command output sent to the Cisco TAC backend server through
the HTTP protocol and forwarded to a user-specified email address:
Router# call-home send “show version; show run” http destination-email-address
[email protected]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
256
Configuring Call Home
Information About Diagnostic Signatures
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
257
Configuring Call Home
Prerequisites for Diagnostic Signatures
Note If you configure the trustpool feature, the CA certificate is not required.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
258
Configuring Call Home
Diagnostic Signature Events and Actions
• The device verifies the digital signature of every single DS. If verification passes, the device stores the
DS file into a non-removable disk, such as bootflash or hard disk, so that DS files can be read after the
device is reloaded. On the router, the DS file is stored in the bootflash:/call home directory.
• The device continues sending periodic regular DS download requests to get the latest revision of DS and
replace the older one in device.
• The device monitors the event and executes the actions defined in the DS when the event happens.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
259
Configuring Call Home
Diagnostic Signature Variables
• command
• emailto
• script
DS action types call-home and emailto collect event data and send a message to call-home servers or to the
defined email addresses. The message uses “diagnostic-signature” as its message type and DS ID as the
message sub-type.
The commands defined for the DS action type initiate CLI commands that can change configuration of the
device, collect show command outputs, or run any EXEC command on the device. The DS action type script
executes Tcl scripts.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
260
Configuring Call Home
Configuring the Call Home Service for Diagnostic Signatures
Note The predefined CiscoTAC-1 profile is enabled as a DS profile by default and we recommend that you use it.
If used, you only need to change the destination transport-method to the http setting.
SUMMARY STEPS
1. configure terminal
2. service call-home
3. call-home
4. contact-email-addr email-address
5. mail-server {ipv4-addr | name} priority number
6. profile profile-name
7. destination transport-method {email | http}
8. destination address {email address | http url}
9. subscribe-to-alert-group inventory [periodic {daily hh:mm | monthly day hh:mm | weekly
day hh:mm}]
10. exit
DETAILED STEPS
Step 4 contact-email-addr email-address (Optional) Assigns an email address to be used for Call
Home customer contact.
Example:
Router(cfg-call-home)# contact-email-addr
[email protected]
Step 5 mail-server {ipv4-addr | name} priority number (Optional) Configures a Simple Mail Transfer Protocol
(SMTP) email server address for Call Home. This
Example:
command is only used when sending email is part of the
Router(cfg-call-home)# mail-server 10.1.1.1 actions defined in any DS.
priority 4
Step 6 profile profile-name Configures a destination profile for Call Home and enters
call-home profile configuration mode.
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
261
Configuring Call Home
Configuring Diagnostic Signatures
Step 7 destination transport-method {email | http} Specifies a transport method for a destination profile in
the Call Home.
Example:
Router(cfg-call-home-profile)# destination Note To configure diagnostic signatures, you must
transport-method http use the http option.
Step 8 destination address {email address | http url} Configures the address type and location to which
call-home messages are sent.
Example:
Router(cfg-call-home-profile)# destination address Note To configure diagnostic signatures, you must
http use the http option.
https://tools.cisco.com/its/service/oddce/services/DDCEService
Step 9 subscribe-to-alert-group inventory [periodic {daily Configures a destination profile to send messages for the
hh:mm | monthly day hh:mm | weekly day hh:mm}] Inventory alert group for Call Home.
Example: • This command is used only for the periodic
Router(cfg-call-home-profile)# downloading of DS files.
subscribe-to-alert-group inventory periodic daily
14:30
What to do next
Set the profile configured in the previous procedure as the DS profile and configure other DS parameters.
SUMMARY STEPS
1. call-home
2. diagnostic-signature
3. profile ds-profile-name
4. environment ds_env-var-name ds-env-var-value
5. end
6. call-home diagnostic-signature [{deinstall | download} {ds-id | all} | install ds-id]
7. show call-home diagnostic-signature [ds-id {actions | events | prerequisite | prompt |
variables | failure | statistics | download}]
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
262
Configuring Call Home
Configuring Diagnostic Signatures
DETAILED STEPS
Step 3 profile ds-profile-name Specifies the destination profile on a device that DS uses.
Example:
Router(cfg-call-home-diag-sign)# profile user1
Step 4 environment ds_env-var-name ds-env-var-value Sets the environment variable value for DS on a device.
Example:
Router(cfg-call-home-diag-sign)# environment
ds_env1 envarval
Step 6 call-home diagnostic-signature [{deinstall | Downloads, installs, and uninstalls diagnostic signature
download} {ds-id | all} | install ds-id] files on a device.
Example:
Router# call-home diagnostic-signature download
6030
Step 7 show call-home diagnostic-signature [ds-id {actions Displays the call-home diagnostic signature information.
| events | prerequisite | prompt | variables | failure
| statistics | download}]
Example:
Router# show call-home diagnostic-signature actions
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
263
Configuring Call Home
Displaying Call Home Configuration Information
The following is sample output from the show call-home diagnostic-signature command for the
configuration displayed above:
outer# show call-home diagnostic-signature
SUMMARY STEPS
1. show call-home
2. show call-home detail
3. show call-home alert-group
4. show call-home mail-server status
5. show call-home profile {all | name}
6. show call-home statistics [detail | profile profile_name]
DETAILED STEPS
Step 2 show call-home detail Displays the Call Home configuration in detail.
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
264
Configuring Call Home
Displaying Call Home Configuration Information
Step 3 show call-home alert-group Displays the available alert groups and their status.
Example:
Router# show call-home alert-group
Step 4 show call-home mail-server status Checks and displays the availability of the configured e-mail
server(s).
Example:
Router# show call-home mail-server status
Step 5 show call-home profile {all | name} Displays the configuration of the specified destination
profile. Use the all keyword to display the configuration of
Example:
all destination profiles.
Router# show call-home profile all
Step 6 show call-home statistics [detail | profile Displays the statistics of Call Home events.
profile_name]
Example:
Router# show call-home statistics
Examples
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
265
Configuring Call Home
Displaying Call Home Configuration Information
aaa-authorization: disable
aaa-authorization username: callhome (default)
data-privacy: normal
syslog throttling: enable
Profiles:
Profile Name: campus-noc
Profile Name: CiscoTAC-1
Router#
Router# show call-home detail
Current call home settings:
call home feature : enable
call home message's from address: [email protected]
call home message's reply-to address: [email protected]
aaa-authorization: disable
aaa-authorization username: callhome (default)
data-privacy: normal
syslog throttling: enable
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
266
Configuring Call Home
Displaying Call Home Configuration Information
Profiles:
Alert-group Severity
------------------------ ------------
configuration normal
crash normal
environment debug
inventory normal
Syslog-Pattern Severity
------------------------ ------------
.*CALL_LOOP.* debug
Periodic configuration info message is scheduled every 14 day of the month at 11:12
Periodic inventory info message is scheduled every 14 day of the month at 10:57
Alert-group Severity
------------------------ ------------
crash normal
environment minor
Syslog-Pattern Severity
------------------------ ------------
.*CALL_LOOP.* debug
Router#
Router# show call-home alert-group
Available alert groups:
Keyword State Description
------------------------ ------- -------------------------------
configuration Enable configuration info
crash Enable crash and traceback info
environment Enable environmental info
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
267
Configuring Call Home
Displaying Call Home Configuration Information
Alert-group Severity
------------------------ ------------
configuration normal
crash normal
environment debug
inventory normal
Syslog-Pattern Severity
------------------------ ------------
.*CALL_LOOP.* debug
Periodic configuration info message is scheduled every 14 day of the month at 11:12
Periodic inventory info message is scheduled every 14 day of the month at 10:57
Alert-group Severity
------------------------ ------------
crash normal
environment minor
Syslog-Pattern Severity
------------------------ ------------
.*CALL_LOOP.* debug
Router#
Router# show call-home profile campus-noc
Profile Name: campus-noc
Profile status: ACTIVE
Preferred Message Format: xml
Message Size Limit: 3145728 Bytes
Transport Method: email
Email address(es): [email protected]
HTTP address(es): Not yet set up
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
268
Configuring Call Home
Displaying Call Home Configuration Information
Alert-group Severity
------------------------ ------------
configuration normal
crash normal
environment debug
inventory normal
Syslog-Pattern Severity
------------------------ ------------
.*CALL_LOOP.* debug
Router#
Router# show call-home statistics
Message Types Total Email HTTP
------------- -------------------- -------------------- ------------------
Total Success 3 3 0
Config 3 3 0
Crash 0 0 0
Environment 0 0 0
Inventory 0 0 0
Snapshot 0 0 0
SysLog 0 0 0
Test 0 0 0
Request 0 0 0
Send-CLI 0 0 0
Total In-Queue 0 0 0
Config 0 0 0
Crash 0 0 0
Environment 0 0 0
Inventory 0 0 0
Snapshot 0 0 0
SysLog 0 0 0
Test 0 0 0
Request 0 0 0
Send-CLI 0 0 0
Total Failed 0 0 0
Config 0 0 0
Crash 0 0 0
Environment 0 0 0
Inventory 0 0 0
Snapshot 0 0 0
SysLog 0 0 0
Test 0 0 0
Request 0 0 0
Send-CLI 0 0 0
Total Ratelimit
-dropped 0 0 0
Config 0 0 0
Crash 0 0 0
Environment 0 0 0
Inventory 0 0 0
Snapshot 0 0 0
SysLog 0 0 0
Test 0 0 0
Request 0 0 0
Send-CLI 0 0 0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
269
Configuring Call Home
Default Call Home Settings
Parameters Default
Call Home feature status Disabled
User-defined profile status Active
Predefined Cisco TAC profile status Inactive
Transport method E-mail
Message format type XML
Destination message size for a message sent in long 3,145,728
text, short text, or XML format
Alert group status Enabled
Call Home message severity threshold Debug
Message rate limit for messages per minute 20
AAA Authorization Disabled
Call Home syslog message throttling Enabled
Data privacy level Normal
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
270
Configuring Call Home
Alert Group Trigger Events and Commands
Alert Group Call Home Trigger Syslog Event Severity Description and
Event Commands
Executed
Crash SYSTEM_ CRASH – – Events related to
software crash.
The following
commands are
executed:
show version
show logging
show region
show inventory
show stack
crashinfo file (this
command shows the
contents of the
crashinfo file)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
271
Configuring Call Home
Alert Group Trigger Events and Commands
Alert Group Call Home Trigger Syslog Event Severity Description and
Event Commands
Executed
Configuration – – – User-generated
request for
configuration or
configuration
change event.
The following
commands are
executed:
show platform
show inventory
show
running-config all
show
startup-config
show version
– – SHUT 0 Environmental
Monitor initiated
shutdown.
– – ENVCRIT 2 Temperature or
voltage
measurement
exceeded critical
threshold.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
272
Configuring Call Home
Alert Group Trigger Events and Commands
Alert Group Call Home Trigger Syslog Event Severity Description and
Event Commands
Executed
– – ENVWARN 4 Temperature or
voltage
measurement
exceeded warning
threshold.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
273
Configuring Call Home
Alert Group Trigger Events and Commands
Alert Group Call Home Trigger Syslog Event Severity Description and
Event Commands
Executed
Inventory – – –
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
274
Configuring Call Home
Alert Group Trigger Events and Commands
Alert Group Call Home Trigger Syslog Event Severity Description and
Event Commands
Executed
Inventory status
should be provided
whenever a unit is
cold-booted or when
FRUs are inserted or
removed. This is
considered a
noncritical event,
and the information
is used for status and
entitlement.
Commands executed
for all Inventory
messages sent in
anonymous mode
and for Delta
Inventory message
sent in full
registration mode:
show diag all
eeprom detail
show version
show inventory oid
show platform
Commands executed
for Full Inventory
message sent in full
registration mode:
show platform
show diag all
eeprom detail
show version
show inventory oid
show bootflash: all
show
data-corruption
show interfaces
show file systems
show memory
statistics
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
275
Configuring Call Home
Alert Group Trigger Events and Commands
Alert Group Call Home Trigger Syslog Event Severity Description and
Event Commands
Executed
show process
memory
show process cpu
show process cpu
history
show license udi
show license detail
show buffers
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
276
Configuring Call Home
Message Contents
Alert Group Call Home Trigger Syslog Event Severity Description and
Event Commands
Executed
Test – TEST – User-generated test
message.
The following
commands are
executed:
show platform
show inventory
show version
Message Contents
This section consists of tables which list the content formats of alert group messages.
The following table lists the content fields of a short text message.
The following table shows the content fields that are common to all long text and XML messages. The fields
specific to a particular alert group message are inserted at a point between the common fields. The insertion
point is identified in the table.
Table 23: Common Fields for All Long Text and XML Messages
Data Item (Plain Text and XML) Description (Plain Text and XML) Call-Home Message Tag (XML
Only)
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
277
Configuring Call Home
Message Contents
Data Item (Plain Text and XML) Description (Plain Text and XML) Call-Home Message Tag (XML
Only)
Example:
CISCO3845@C@12345678
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
278
Configuring Call Home
Message Contents
Data Item (Plain Text and XML) Description (Plain Text and XML) Call-Home Message Tag (XML
Only)
Server ID If the message is generated from For long text message only.
the fabric switch, this is the unique
device identifier (UDI) of the
switch.
• type is the product model
number from backplane
IDPROM.
• @ is a separator character.
• Sid is C, identifying the serial
ID as a chassis serial number.
• serial is the number identified
by the Sid field.
Example:
CISCO3845@C@12345678
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
279
Configuring Call Home
Message Contents
Data Item (Plain Text and XML) Description (Plain Text and XML) Call-Home Message Tag (XML
Only)
The following table shows the inserted fields specific to a particular alert group message.
Note The following fields may be repeated if multiple commands are executed for this alert group.
The following table shows the inserted content fields for reactive messages (system failures that require a
TAC case) and proactive messages (issues that might result in degraded system performance).
Data Item (Plain Text and XML) Description (Plain Text and XML) Call-Home Message Tag (XML
Only)
Chassis hardware version Hardware version of chassis CallHome/Device/Cisco_Chassis/
HardwareVersion
Supervisor module software version Top-level software version CallHome/Device/Cisco_Chassis/
AdditionalInformation/AD@name=
“SoftwareVersion”
Affected FRU name Name of the affected FRU CallHome/Device/Cisco_Chassis/
generating the event message Cisco_Card/Model
Affected FRU serial number Serial number of affected FRU CallHome/Device/Cisco_Chassis/
Cisco_Card/SerialNumber
Affected FRU part number Part number of affected FRU CallHome/Device/Cisco_Chassis/
Cisco_Card/PartNumber
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
280
Configuring Call Home
Message Contents
Data Item (Plain Text and XML) Description (Plain Text and XML) Call-Home Message Tag (XML
Only)
FRU slot Slot number of FRU generating the CallHome/Device/Cisco_Chassis/
event message Cisco_Card/LocationWithinContainer
FRU hardware version Hardware version of affected FRU CallHome/Device/Cisco_Chassis/
Cisco_Card/HardwareVersion
FRU software version Software version(s) running on CallHome/Device/Cisco_Chassis/
affected FRU Cisco_Card/SoftwareIdentity/
VersionString
The following table shows the inserted content fields for an inventory message.
Data Item (Plain Text and XML) Description (Plain Text and XML) Call-Home Message Tag (XML Only)
Chassis hardware version Hardware version of chassis CallHome/Device/Cisco_Chassis/
HardwareVersion
Supervisor module software Top-level software version CallHome/Device/Cisco_Chassis/
version AdditionalInformation/AD@name=
“SoftwareVersion”
FRU name Name of the affected FRU CallHome/Device/Cisco_Chassis/
generating the event message Cisco_Card/Model
FRU s/n Serial number of FRU CallHome/Device/Cisco_Chassis/
Cisco_Card/SerialNumber
FRU part number Part number of FRU CallHome/Device/Cisco_Chassis/
Cisco_Card/PartNumber
FRU slot Slot number of FRU CallHome/Device/Cisco_Chassis/
Cisco_Card/LocationWithinContainer
FRU hardware version Hardware version of FRU CallHome/Device/Cisco_Chassis/
CiscoCard/HardwareVersion
FRU software version Software version(s) running on CallHome/Device/Cisco_Chassis
FRU /Cisco_Card/SoftwareIdentity/
VersionString
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
281
Configuring Call Home
Message Contents
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
282
CHAPTER 18
Managing Cisco Enhanced Services and Network
Interface Modules
The router supports Cisco Enhanced Services Modules (SMs) and Cisco Network Interface Modules (NIMs).
The modules are inserted into the router using an adapter, or carrier card, into various slots. For more
information, see the following documents:
• Hardware Installation Guide for the Cisco Catalyst 8300 Series Edge Platform.
• Hardware Installation Guide for Cisco Catalyst 8200 Series Edge Platforms
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
283
Managing Cisco Enhanced Services and Network Interface Modules
Modules Supported
Modules Supported
For information about the interfaces and modules supported by the Cisco Catalyst 8000 Edge Platform, see
Hardware Installation Guide for Cisco Catalyst 8000 Series Edge Platform.
Note Service modules are not supported on Cisco Catalyst 8200 Series Edge Platforms.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
284
Managing Cisco Enhanced Services and Network Interface Modules
Online Insertion and Removal
To establish a connection to the module, connect to the router console using Telnet or Secure Shell (SSH)
and open a session to the switch using the hw-module session slot/subslot command in privileged EXEC
mode on the router.
Use the following configuration examples to establish a connection:
• The following example shows how to open a session from the router using the hw-module session
command:
Router# hw-module session slot/card
Router# hw-module session 0/1 endpoint 0
• The following example shows how to exit a session from the router, by pressing Ctrl-A followed by
Ctrl-Q on your keyboard:
type ^a^q
picocom v1.4
port is : /dev/ttyDASH2
flowcontrol : none
baudrate is : 9600
parity is : none
databits are : 8
escape is : C-a
noinit is : no
noreset is : no
nolock is : yes
send_cmd is : ascii_xfr -s -v -l10
receive_cmd is : rz -vv
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
285
Managing Cisco Enhanced Services and Network Interface Modules
Deactivating a Module
Deactivating a Module
A module can be removed from the router without first being deactivated. However, we recommend that you
perform a graceful deactivation (or graceful power down) of the module before removing it. To perform a
graceful deactivation, use the hw-module subslot slot/subslot stop command in EXEC mode.
Note When you are preparing for an OIR of a module, it is not necessary to independently shut down each of the
interfaces before deactivating the module. The hw-module subslot slot/subslot stop command in EXEC mode
automatically stops traffic on the interfaces and deactivates them along with the module in preparation for
OIR. Similarly, you do not have to independently restart any of the interfaces on a module after OIR.
The following example shows how to use the show facility-alarm status command to verify if any critical
alarm is generated when a module is removed from the system:
Router# show facility-alarm status
System Totals Critical: 18 Major: 0 Minor: 0
Power Supply Bay 1 Sep 28 2020 10:02:34 CRITICAL Power Supply/FAN Module
Missing [0]
POE Bay 0 Sep 28 2020 10:02:34 INFO Power Over Ethernet Module
Missing [0]
POE Bay 1 Sep 28 2020 10:02:34 INFO Power Over Ethernet Module
Missing [0]
GigabitEthernet0/0/2 Sep 28 2020 10:02:46 INFO Physical Port Administrative
State Down [2]
GigabitEthernet0/0/3 Sep 28 2020 10:02:46 INFO Physical Port Administrative
State Down [2
xcvr container 0/0/4 Sep 28 2020 10:02:46 INFO Transceiver Missing - Link
Down [1]
TenGigabitEthernet0/0/5 Sep 28 2020 10:02:54 CRITICAL Physical Port Link Down [1]
TenGigabitEthernet0/1/0 Sep 28 2020 10:03:26 INFO Physical Port Administrative
State Down [2]
GigabitEthernet1/0/0 Sep 28 2020 10:07:35 CRITICAL Physical Port Link Down [1]
GigabitEthernet1/0/1 Sep 28 2020 10:07:35 CRITICAL Physical Port Link Down [1]
GigabitEthernet1/0/2 Sep 28 2020 10:07:35 CRITICAL Physical Port Link Down [1]
GigabitEthernet1/0/3 Sep 28 2020 10:07:35 CRITICAL Physical Port Link Down [1]
GigabitEthernet1/0/4 Sep 28 2020 10:07:35 CRITICAL Physical Port Link Down [1]
GigabitEthernet1/0/5 Sep 28 2020 10:07:35 CRITICAL Physical Port Link Down [1]
TwoGigabitEthernet1/0/16 Sep 28 2020 10:07:35 INFO Physical Port Administrative
State Down [2]
TwoGigabitEthernet1/0/17 Sep 28 2020 10:07:35 INFO Physical Port Administrative
State Down [2]
TwoGigabitEthernet1/0/18 Sep 28 2020 10:07:35 INFO Physical Port Administrative
State Down [2]
TwoGigabitEthernet1/0/19 Sep 28 2020 10:07:35 INFO Physical Port Administrative
State Down [2]
xcvr container 1/0/20 Sep 28 2020 10:04:00 INFO Transceiver Missing - Link
Down [1]
xcvr container 1/0/21 Sep 28 2020 10:04:00 INFO Transceiver Missing - Link
Down [1]1]
Note A critical alarm (Active Card Removed OIR Alarm) is generated even if a module is removed after performing
graceful deactivation.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
286
Managing Cisco Enhanced Services and Network Interface Modules
Deactivating Modules and Interfaces in Different Command Modes
To deactivate a module and all of its interfaces before removing the module, use one of the following commands
in global configuration mode.
Procedure
Step 2 hw-module subslot slot/subslot [reload | stop | start] Deactivates the module in the specified slot and subslot,
where:
Example:
Router# hw-module subslot 0/2 stop • slot—Specifies the chassis slot number where the
module is installed.
• subslot—Specifies the subslot number of the chassis
where the module is installed.
• reload—Stops and restarts the specified module.
• stop—Removes all interfaces from the module and
the module is powered off.
• start—Powers on the module similar to a physically
inserted module in the specified slot. The module
firmware reboots and the entire module initialization
sequence is executed in the IOSd and Input/Output
Module daemon (IOMd) processes.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
287
Managing Cisco Enhanced Services and Network Interface Modules
Deactivating and Reactivating an SSD/HDD Carrier Card NIM
Caution Deactivation of an SSD/HDD Carrier Card NIM may cause loss of data.
Procedure
Step 2 no activate Shuts down the kWAAS instance on your router. kWAAS
services remain installed. The service will have to be
Example:
reactivated after the HDD/SSD NIM (module) is restarted.
Router(config-virt-serv)# no activate
Step 3 hw-module subslot slot/subslot [reload | stop | start] Deactivates or reactivates the module in the specified slot
and subslot.
Example:
Router# hw-module subslot 0/2 stop • slot—The chassis slot number where the module is
Proceed with stop of module? [confirm] installed.
Router#
*Mar 6 15:13:23.997: %SPA_OIR-6-OFFLINECARD: SPA • subslot—The subslot number of the chassis where the
(NIM-SSD) offline in subslot 0/2 module is installed.
...
• reload—Deactivates and reactivates (stops and
restarts) the specified module.
• stop—Removes all interfaces from the module and
the module is powered off.
• start—Powers on the module similar to a physically
inserted module in the specified slot. The module
firmware reboots and the entire module initialization
sequence is executed in the IOSd and IOMd processes.
Step 4 Wait for the EN (Enable) LED to turn off, and then remove
the SSD/HDD Carrier Card NIM.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
288
Managing Cisco Enhanced Services and Network Interface Modules
Reactivating a Module
Reactivating a Module
If, after deactivating a module using the hw-module subslot slot/subslot stop command, you want to reactivate
it without performing an OIR, use one of the following commands (in privileged EXEC mode):
• hw-module subslot slot/subslot start
• hw-module subslot slot/subslot reload
RadiumPP#
2. To verify activation and proper operation of a module, enter the show hw-module subslot all oir command
and observe "ok" in the Operational Status field as shown in the following example:
Router# show hw-module subslot all oir
RadiumPP#
Router# show platform hardware backplaneswitch-manager R0 status
slot bay port enable link status speed(Mbps) duplex autoneg pause_tx
pause_rx mtu
------------------------------------------------------------------------------------------------------------
0 0 CP True Up 1000 Full ENABLED ENABLED
ENABLED 10240
1 0 GE1 True Up 1000 Full DISABLED ENABLED
ENABLED 10240
1 0 GE0 True Up 1000 Full DISABLED ENABLED
ENABLED 10240
2 0 GE1 True Up 1000 Full DISABLED ENABLED
ENABLED 10240
2 0 GE0 True Up 1000 Full DISABLED ENABLED
ENABLED 10240
0 1 GE1 True Down 1000 Full DISABLED ENABLED
ENABLED 10240
0 1 GE0 True Down 1000 Full DISABLED ENABLED
ENABLED 10240
0 2 GE1 True Down 1000 Full DISABLED ENABLED
ENABLED 10240
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
289
Managing Cisco Enhanced Services and Network Interface Modules
Verifying the Deactivation and Activation of a Module
CP FFP 1/0/1 1/0/0 2/0/1 2/0/0 0/1/1 0/1/0 0/2/1 0/2/0 0/3/1
0/3/0 0/4/1 0/4/0 drops
-------------------------------------------------------------------------------------------------------------
CP - A um um um um um um um um um
um um um 1
FFP A - - - - - - - - - -
- - - 0
1/0/1 um umb - umb umb umb umb umb umb umb umb
umb umb umb 0
1/0/0 um umb umb - umb umb umb umb umb umb umb
umb umb umb 6
2/0/1 um umb umb umb - umb umb umb umb umb umb
umb umb umb 0
2/0/0 um umb umb umb umb - umb umb umb umb umb
umb umb umb 6
0/1/1 um umb umb umb umb umb - umb umb umb umb
umb umb umb 0
0/1/0 um umb umb umb umb umb umb - umb umb umb
umb umb umb 0
0/2/1 um umb umb umb umb umb umb umb - umb umb
umb umb umb 0
0/2/0 um umb umb umb umb umb umb umb umb - umb
umb umb umb 0
0/3/1 um umb umb umb umb umb umb umb umb umb -
umb umb umb 0
0/3/0 um umb umb umb umb umb umb umb umb umb umb
- umb umb 0
0/4/1 um umb umb umb umb umb umb umb umb umb umb
umb - umb 0
0/4/0 um umb umb umb umb umb umb umb umb umb umb
umb umb - 0
Port VLAN membership: [untagged vlan] U=untagged T=tagged <VLAN range begin>-<VLAN range
end>
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
290
Managing Cisco Enhanced Services and Network Interface Modules
Verifying the Deactivation and Activation of a Module
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
291
Managing Cisco Enhanced Services and Network Interface Modules
Managing Modules and Interfaces
CoS 6 0 0
CoS 7 0 0
STP 0
backpress 0
congest 0 0
purge/cell 0
no destination 0
Pause PFC 0 0
CoS 0 0
CoS 1 0
CoS 2 0
CoS 3 0
CoS 4 0
CoS 5 0
CoS 6 0
CoS 7 0
Configuration Examples
This section provides examples of deactivating and activating modules.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
292
Managing Cisco Enhanced Services and Network Interface Modules
Configuration Examples
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
293
Managing Cisco Enhanced Services and Network Interface Modules
Configuration Examples
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
294
CHAPTER 19
Cellular IPv6 Address
This chapter provides an overview of the IPv6 addresses and describes how to configure Cellular IPv6 address
on Cisco Catalyst 8000 Series Edge Platform.
This chapter includes this section:
• Cellular IPv6 Address, on page 295
IPv6 addresses commonly contain successive hexadecimal fields of zeros. Two colons (::) may be used to
compress successive hexadecimal fields of zeros at the beginning, middle, or end of an IPv6 address (the
colons represent successive hexadecimal fields of zeros). The table below lists compressed IPv6 address
formats.
An IPv6 address prefix, in the format ipv6-prefix/prefix-length, can be used to represent bit-wise contiguous
blocks of the entire address space. The ipv6-prefix must be in the form documented in RFC 2373 where the
address is specified in hexadecimal using 16-bit values between colons. The prefix length is a decimal value
that indicates how many of the high-order contiguous bits of the address comprise the prefix (the network
portion of the address). For example, 2001:cdba::3257:9652 /64 is a valid IPv6 prefix.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
295
Cellular IPv6 Address
Link-Lock Address
Link-Lock Address
A link-local address is an IPv6 unicast address that can be automatically configured on any interface using
the link-local prefix FE80::/10 (1111 1110 10) and the interface identifier in the modified EUI-64 format. An
link-local address is automatically configured on the cellular interface when an IPv6 address is enabled.
After the data call is established, the link-local address on the celluar interface is updated with the host generated
link-local address that consists of the link-local prefix FF80::/10 (1111 1110 10) and the auto-generated
interface identifier from the USB hardware address.
Global Address
A global IPv6 unicast address is defined by a global routing prefix, a subnet ID, and an interface ID. The
routing prefix is obtained from the PGW. The Interface Identifier is automatically generated from the USB
hardware address using the interface identifier in the modified EUI-64 format. The USB hardware address
changes after the router reloads.
SUMMARY STEPS
1. configure terminal
2. ipv6 unicast-routing
3. interface Cellular {type|number}
4. ip address negotiated
5. load-intervalseonds
6. dialer in-band
7. dialer idle-timeout seonds
8. dialer-groupgroup-number
9. no peer default ip address
10. ipv6 address autoconfig or ipv6 enable
11. dialer-listdialer-groupprotocolprotocol-name {permit |deny|list |access-list-number
| access-group }
12. ipv6 route ipv6-prefix/prefix-length 128
13. End
DETAILED STEPS
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
296
Cellular IPv6 Address
Configuring Cellular IPv6 Address
Step 4 ip address negotiated Specifies that the IP address for a particular interface is
dynamically obtained.
Example:
Router(config-if)# ip address negotiated
Step 5 load-intervalseonds Specifies the length of time for which data is used to
compute load statistics.
Example:
Router(config-if)# load-interval 30
Step 6 dialer in-band Enables DDR and configures the specified serial interface
to use in-band dialing.
Example:
Router(config-if)# dialer in-band
Step 7 dialer idle-timeout seonds Specifies the dialer idle timeout period.
Example:
Router(config-if)# dialer idle-timeout 0
Step 8 dialer-groupgroup-number Specifies the number of the dialer access group to which
the specific interface belongs.
Example:
Router(config-if)# dialer-group 1
Step 9 no peer default ip address Removes the default address from your configuration.
Example:
Router(config-if)# no peer default ip address
Step 10 ipv6 address autoconfig or ipv6 enable Enables automatic configuration of IPv6 addresses using
stateless autoconfiguration on an interface and enables
Example:
IPv6 processing on the interface.
Router(config-if)# ipv6 address autoconfig
or
Router(config-if)# ipv6 enable
Step 11 dialer-listdialer-groupprotocolprotocol-name {permit Defines a dial-on-demand routing (DDR) dialer list for
|deny|list |access-list-number | dialing by protocol or by a combination of a protocol and
access-group } a previously defined access list.
Example:
Router(config)# dialer-list 1 protocol ipv6 permit
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
297
Cellular IPv6 Address
Configuring Cellular IPv6 Address
Examples
The following example shows the Cellular IPv6 configuration for NIM-LTEA-EA and NIM-LTEA-LA
modules.
The following example shows the Cellular IPv6 configuration for P-LTEAP18-GL, P-LTEA-XX,
and P-LTE-XX modules.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
298
CHAPTER 20
Radio Aware Routing
Radio-Aware Routing (RAR) is a mechanism that uses radios to interact with the routing protocol OSPFv3
to signal the appearance, disappearance, and link conditions of one-hop routing neighbors.
In a large mobile networks, connections to the routing neighbors are often interrupted due to distance and
radio obstructions. When these signals do not reach the routing protocols, protocol timers are used to update
the status of a neighbor. Routing protocols have lengthy timer, which is not recommended in mobile networks.
• Benefits of Radio Aware Routing, on page 299
• Restrictions and Limitations, on page 300
• License Requirements, on page 300
• System Components, on page 300
• QoS Provisioning on PPPoE Extension Session, on page 301
• Example: Configuring the RAR Feature in Bypass Mode, on page 301
• Example: Configuring the RAR Feature in Aggregate Mode, on page 303
• Verifying RAR Session Details, on page 304
• Troubleshooting Radio Aware Routing, on page 310
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
299
Radio Aware Routing
Restrictions and Limitations
License Requirements
This feature is made available with the AppX license.
System Components
The Radio Aware Routing (RAR) feature is implemented using the MANET (Mobile adhoc network)
infrastructure comprising of different components such as PPPoE, Virtual multipoint interface (VMI), QoS,
routing protocol interface and RAR protocols.
PPPoE Extensions
PPPoE extensions are used when the router communicates with the radio. In the Cisco IOS implementation
of PPPoE, each individual session is represented by virtual access interface (connectivity to a radio neighbor)
on which, QoS can be applied with these PPPoE extensions.
RFC5578 provides extensions to PPPoE to support credit-based flow control and session-based real time link
metrics, which are very useful for connections with variable bandwidth and limited buffering capabilities
(such as radio links).
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
300
Radio Aware Routing
QoS Provisioning on PPPoE Extension Session
In Aggregae mode, VMI is exposed to the routing protocols (OSPF) so that the routing protocols can leverage
VMI for their optimum efficiency. When the network neighbors are viewed as a collection of networks on a
point-to-multipoint link with broadcast and multicast capability at VMI, VMI helps in aggregating the multiple
virtual access interfaces created from PPPoE. VMI presents a single multi access layer 2 broadcast capable
interface. The VMI layer handles re-directs unicast routing protocol traffic to the appropriate P2P link
(Virtual-Access interface), and replicats any Multicast/Broadcast traffic that needs to flow. Since the routing
protocol communicates to a single interface, the size of the topology database is reduced, without impacting
the integrity of the network.
interface Virtual-Template2
ip address 192.0.2.7 255.255.255.0
no peer default ip address
no keepalive
service-policy input rar_policer
end
Note Before you being the RAR configuration, you must first configure the subscriber authorization
enable command to bring up the RAR session. Without enbaling authorization, the Point-to-Point
protocol does not recognize this as a RAR session and may not tag manet_radio in presentation of
a PPPoE Active Discovery Initiate (PADI). By default, bypass mode does not appears in the
configuration. It appears only if the mode is configured as bypass.
Configure Broadband
bba-group pppoe VMI2
virtual-template 2
service profile rar-lab
!
interface GigabitEthernet0/0/0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
301
Radio Aware Routing
Example: Configuring the RAR Feature in Bypass Mode
interface Virtual-Template2
ip address 192.0.2.7 255.255.255.0
no ip redirects
peer default ip address pool PPPoEpool2
ipv6 enable
ospfv3 1 network manet
ospfv3 1 ipv4 area 0
ospfv3 1 ipv6 area 0
no keepalive
service-policy input rar_policer Or/And
service-policy output rar_shaper
interface Virtual-Template2
ip unnumbered vmi2
no ip redirects
peer default ip address pool PPPoEpool2
ipv6 enable
ospfv3 1 network manet
ospfv3 1 ipv4 area 0
ospfv3 1 ipv6 area 0
no keepalive
service-policy input rar_policer Or/And
service-policy output rar_shaper
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
302
Radio Aware Routing
Example: Configuring the RAR Feature in Aggregate Mode
!
address-family ipv4 unicast
redistribute connected metric 1 metric-type 1
log-adjacency-changes
exit-address-family
!
address-family ipv6 unicast
redistribute connected metric-type 1
log-adjacency-changes
exit-address-family
!
ip local pool PPPoEpool2 192.0.2.8 192.0.2.4
Note Before you being the RAR configuration, you must first configure the subscriber authorization
enable command to bring up the RAR session. Without enabling authorization, the Point-to-Point
protocol does not recognize this as a RAR session and may not tag manet_radio in PADI.
Configure Broadband
bba-group pppoe VMI2
virtual-template 2
service profile rar-lab
!
interface GigabitEthernet0/0/0
description Connected to Client1
negotiation auto
pppoe enable group VMI2
interface Virtual-Template2
ip unnumbered vmi2
no ip redirects
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
303
Radio Aware Routing
Verifying RAR Session Details
session id: 9
local MAC address: 006b.f10e.a5e0, remote MAC address: 0050.56bc.424a
virtual access interface: Vi2.1, outgoing interface: Gi0/0/0
1646 packets sent, 2439363 received
176216 bytes sent, 117250290 received
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
304
Radio Aware Routing
Verifying RAR Session Details
session id: 10
local MAC address: 006b.f10e.a5e1, remote MAC address: 0050.56bc.7dcb
virtual access interface: Vi2.2, outgoing interface: Gi0/0/1
1389302 packets sent, 1852 received
77869522 bytes sent, 142156 received
Input Counts:
Process Enqueue = 0 (VMI)
Fastswitch = 0
VMI Punt Drop:
Queue Full = 0
Output Counts:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
305
Radio Aware Routing
Verifying RAR Session Details
Transmit:
VMI Process DQ = 4280
Fastswitch VA = 0
Fastswitch VMI = 0
Drops:
Total = 0
QOS Error = 0
VMI State Error = 0
Mcast NBR Error = 0
Ucast NBR Error = 0
Interface vmi3: - Last Clear Time =
Input Counts:
Process Enqueue = 0 (VMI)
Fastswitch = 0
VMI Punt Drop:
Queue Full = 0
Output Counts:
Transmit:
VMI Process DQ = 2956
Fastswitch VA = 0
Fastswitch VMI = 0
Drops:
Total = 0
QOS Error = 0
VMI State Error = 0
Mcast NBR Error = 0
Ucast NBR Error = 0
Interface vmi4: - Last Clear Time =
Input Counts:
Process Enqueue = 0 (VMI)
Fastswitch = 0
VMI Punt Drop:
Queue Full = 0
Output Counts:
Transmit:
VMI Process DQ = 0
Fastswitch VA = 0
Fastswitch VMI = 0
Drops:
Total = 0
QOS Error = 0
VMI State Error = 0
Mcast NBR Error = 0
Ucast NBR Error = 0
Router#
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
306
Radio Aware Routing
Verifying RAR Session Details
VMI Interface=vmi2,
Input qcount=0, drops=0, Output qcount=0, drops=0
V-Access intf=Virtual-Access2.1,
Input qcount=0, drops=0, Output qcount=0, drops=0
Physical intf=GigabitEthernet0/0/0,
Input qcount=0, drops=0, Output qcount=0, drops=0
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
307
Radio Aware Routing
Verifying RAR Session Details
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
308
Radio Aware Routing
Verifying RAR Session Details
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
309
Radio Aware Routing
Troubleshooting Radio Aware Routing
Router#sh ip route
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
310
CHAPTER 21
Configuring Voice Functionality
This chapter provides information about configuring the voice functionality in the Cisco Catalyst 8000 Edge
Platforms.
This chapter includes these sections:
• Call Waiting, on page 311
• Feature Group D Configuration, on page 311
• Media and Signaling Authentication and Encryption, on page 313
• Multicast Music-on-Hold, on page 313
• TLS 1.2 support on SCCP Gateways, on page 314
Call Waiting
With the Call Waiting feature, you can receive a second call while you are on the phone attending to another
call. When you receive a second call, you hear a call-waiting tone (a tone with a 300 ms duration). Caller ID
appears on phones that support caller ID. You can use hookflash to answer a waiting call and place the
previously active call on hold. By using hookflash, you can toggle between the active and a call that is on
hold. If the Call Waiting feature is disabled, and you hang up the current call, the second call will hear a busy
tone. For more information on Call Waiting, see the https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/voice/
sip/configuration/15-mt/sip-config-15-mt-book/voi-sip-hookflash.html
Call Transfers
Call transfers are when active calls are put on hold while a second call is established between two users. After
you establish the second call and terminate the active call, the call on hold will hear a ringback. The Call
Transfer feature supports all three types of call transfers—blind, semi-attended, and attended.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
311
Configuring Voice Functionality
Feature Group D Configuration
SUMMARY STEPS
1. configure terminal {ip-address | interface-type interface-number [ip-address]}
2. voice-card slot/subslot
3. controller T1/E1 slot/subslot/port
4. framing {sf | esf }
5. linecode {b8zs | ami}
6. ds0-group ds0-group-notimeslots timeslot-list type{e&m-fgd | fgd-eana}
7. no shutdown
8. exit
DETAILED STEPS
Step 2 voice-card slot/subslot Enters voice card interface configuration mode and specify
the slot location by using a value from 0 to 5, depending
Example:
upon your router.
Router(config)# voice-card slot/subslot
Step 3 controller T1/E1 slot/subslot/port Enters controller configuration mode for the T1 controller
at the specified slot/port location. Valid values for slot and
Example:
port are 0 and 1.
Router(config)# controller T1 slot/subslot/port
Step 4 framing {sf | esf } Sets the framing according to your service provider's
instructions. Choose Extended Superframe (ESF) format
Example:
or Superframe (SF) format.
Router(config)# framing {sf | esf}
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
312
Configuring Voice Functionality
Media and Signaling Authentication and Encryption
Step 6 ds0-group ds0-group-notimeslots timeslot-list Defines the T1 channels for use by compressed voice calls
type{e&m-fgd | fgd-eana} as well as the signaling method the router uses to connect
to the PBX or CO. ds0-group-no is a value from 0 to 23
that identifies the DS0 group. Note The ds0-group command
automatically creates a logical voice port that is numbered
as follows: slot/port:ds0-group-no. Although only one voice
port is created, applicable calls are routed to any channel
in the group. timeslot-list is a single number, numbers
separated by commas, or a pair of numbers separated by a
hyphen to indicate a range of timeslots. For T1, allowable
values are from 1 to 24. To map individual DS0 timeslots,
define additional groups. The system maps additional voice
ports for each defined group. The signaling method selection
for type depends on the connection that you are making.
The e&m-fgd setting allows E&M interface connections
for PBX trunk lines (tie lines) and telephone equipment to
use feature group D switched-access service. The fgd-eana
setting supports the exchange access North American
(EANA) signaling.
Step 8 exit Exits controller configuration mode. Skip the next step if
you are not setting up Drop and Insert .
Multicast Music-on-Hold
The Music-on-Hold (MOH) feature enables you to subscribe to a music streaming service when you are using
a Cisco IOS MGCP voice gateway. Music streams from an MOH server to the voice interfaces of on-net and
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
313
Configuring Voice Functionality
TLS 1.2 support on SCCP Gateways
off-net callers that have been placed on hold. Cisco Communications Manager supports the capability to place
callers on hold with music supplied from a streaming multicast MOH server.
By means of a preconfigured multicast address on the Cisco Unified Communications Manager or gateway,
the gateway can "listen" for Real-Time Transport Protocol (RTP) packets that are broadcast from a default
router in the network and can relay the packets to designated voice interfaces in the network. You can initiate
the call on hold. However, you cannot initiate music on hold on a MGCP controlled analog phone. Whenever
a called party places a calling party on hold, Cisco Communications Manager requests the MOH server to
stream RTP packets to the "on-hold" interface through the preconfigured multicast address. In this way, RTP
packets are relayed to appropriately configured voice interfaces that have been placed on hold. When you
configure a multicast address on a gateway, the gateway sends an Internet Gateway Management Protocol
(IGMP) "join" message to the default router, indicating to the default router that the gateway is ready to receive
RTP multicast packets.
Multiple MOH servers can be present in the same network, but each server must have a different Class D IP
address, and the address must be configured in Cisco Communications Manager and the MGCP voice gateways.
For more information on configuring MOH, see the http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/voice/
cminterop/configuration/15-0m/vc-15-0m-book/
vc-ucm-mgcp-gw.html#GUID-A3461142-2F05-4420-AEE6-032FCA3B7952
Note Cisco Unified Communications Manager (CUCM) Version 14SU2 has been enhanced to support Secured
SCCP gateways with the Subject Name field (CN Name) with or without colons, for example, AA:22:BB:44:55
or AA22BB4455.
CUCM checks the CN field of the incoming certificate from the SCCP Gateway and verifies it against the
DeviceName configured in CUCM for this gateway. DeviceName contains MAC address of the gateway.
CUCM converts the MAC address in the DeviceName to MAC address with colons (for example:
AA:22:BB:44:55) and validates with the CN name in the Gateway's certificate. Therefore, CUCM mandates
Gateway to use MAC address with colons for the CN field in the certificate, that is, subject name.
Due to new guidelines from Defense Information Systems Agency (DISA), it is a requirement not to use
colons for the subject name field CN. For example, AA22BB4455.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
314
Configuring Voice Functionality
TLS 1.2 support on SCCP Gateways
If a resource is configured in the secure mode, the SCCP application initiates a process to complete Transport
Layer Security (TLS) handshaking. During the handshake, the server sends information to CiscoSSL about
the TLS version and cipher suites supported. Previously, only SSL3.1 was supported for SCCP secure signalling.
SSL3.1 is equivalent to TLS 1.0. The TLS 1.2 Support feature introduces TLS1.2 support to SCCP secure
signalling.
After TLS handshaking is complete, SCCP is notified and SCCP kills the process.
If the handshaking is completed successfully, a REGISTER message is sent to Cisco Unified Communications
Manager through the secure tunnel. If handshaking fails and a retry is needed, a new process is initiated.
Cipher Suites
For SCCP-based signaling, TLS_RSA_WITH_AES_128_CBC_SHA cipher suite is supported.
From Cisco IOS XE Cupertino 17.7.1a, the following NGE cipher suites are also supported:
• ECDHE-RSA-AES128-GCM-SHA256
• ECDHE-RSA-AES256-GCM-SHA384
These cipher suites enable secure voice signaling for both the STCAPP analog phone and the SCCP DSPFarm
conferencing service. The cipher suite selection is negotiated between gateway and CUCM.
The following prerequisites are applicable for using NGE cipher suites:
• Configure TLS 1.2. For more information, see Configuring TLS Version for STC application, on page
315.
• Use CUCM Release 14.1 SU1 or later, and Voice Gateways or platforms that support TLS 1.2.
• From the CUCM Web UI, navigate to Cipher Management and set the CIPHER switch as NGE. For
more information, see Cipher Management.
For more information about verifying cipher suites, see Verifying TLS Version and Cipher Suites, on page
316.
For the SRTP-encrypted media, you can use higher-grade cipher suites - AEAD-AES-128-GCM or
AEAD-AES-256-GCM. The selection of these cipher suites is automatically negotiated between GW and
CUCM for both secure analog voice and hardware conference bridge voice media. Authenticated Encryption
with Associated Data (AEAD) ciphers simultaneously provide confidentiality, integrity, and authenticity,
without built-in SHA algorithms to validate message integrity.
Supported Platforms
The TLS 1.2 support on the SCCP Gateways feature is supported on the following platforms:
• Cisco Catalyst 8200 and 8300 Series Edge Platforms
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
315
Configuring Voice Functionality
TLS 1.2 support on SCCP Gateways
enable
configure terminal
stcapp security tls-version v1.2
exit
Note The stcapp security tls command sets the TLS version to v.1.0, v1.1, or v1.2 only. If not configured explicitly,
TLS v1.0 is selected by default.
Note Note: The tls command can be configured only in security mode.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
316
Configuring Voice Functionality
TLS 1.2 support on SCCP Gateways
Perform the following task to verify the sRTP cipher suite for the DSPfarm connection.
# show sccp connection detail
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
317
Configuring Voice Functionality
TLS 1.2 support on SCCP Gateways
Table 27: Feature Information for TLS 1.2 support on SCCP Gateways
Support for NGE Cipher Suites Cisco IOS XE Cupertino 17.7.1a This feature supports NGE cipher
suites for secure voice signaling
and secure media. These cipher
suites are applicable for both the
STCAPP analog phone and the
SCCP DSPFarm conferencing
service.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
318
CHAPTER 22
Dying Gasp Through SNMP, Syslog and Ethernet
OAM
A dying gasp is a message (or signal) sent by a Customer Premises Equipment (CPE) to equipment managed
by an Internet Service Provider to indicate that the CPE has lost power. The message is sent when one of the
following occurs:
• System reload
• Interface shutdown
• Power failure—supported on specific platforms
This type of condition is vendor specific. An Ethernet Operations, Administration, and Maintenance (OAM)
notification about the condition may be sent immediately.
• Prerequisites for Dying Gasp Support, on page 319
• Restrictions for Dying Gasp Support, on page 319
• Information About Dying Gasp Through SNMP, Syslog and Ethernet OAM, on page 320
• How to Configure Dying Gasp Through SNMP, Syslog and Ethernet OAM, on page 320
• Configuration Examples for Dying Gasp Through SNMP, Syslog and Ethernet OAM, on page 321
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
319
Dying Gasp Through SNMP, Syslog and Ethernet OAM
Information About Dying Gasp Through SNMP, Syslog and Ethernet OAM
Note You can configure up to five different SNMP server host/port configurations.
After performing a power cycle, the following output is displayed on the router console:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
320
Dying Gasp Through SNMP, Syslog and Ethernet OAM
Message Displayed on the Peer Router on Receiving Dying Gasp Notification
Router#
ystem Bootstrap, Version 17.3(1.2r), RELEASE SOFTWARE
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1994-2020 by cisco Systems, Inc.
Current image running: Boot ROM0
Last reset cause: LocalSoft
C8300-2N2S-4T2X platform with 8388608 Kbytes of main memory
rommon 1 >
=======================================
Dying Gasp Trap Received for the Power failure event:
-----------------------------------------------------
Trap on the Host
++++++++++++++
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
321
Dying Gasp Through SNMP, Syslog and Ethernet OAM
Example: Configuring SNMP-Server Host Details on the Router Console
Router> enable
Router# configure terminal
Router(config)# snmp-server community public RW
Router(config)# exit
For more information on command syntax and examples, refer to the Cisco IOS Network Management
Command Reference.
Router> enable
Router# configure terminal
Router(config)# snmp-server host X.X.X.XXX vrf mgmt-intf version 2c public udp-port 9800
Router(config)# exit
For more information on command syntax and examples, refer to the Cisco IOS Network Management
Command Reference.
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
322
CHAPTER 23
Troubleshooting
• Troubleshooting, on page 323
Troubleshooting
System Report
System reports or crashinfo files save information that helps Cisco technical support representatives to debug
problems that caused the Cisco IOS image to crash. It is necessary to collect critical crash information quickly
and reliably and bundle it in a way that it can be identified with a specific crash occurrence. System reports
are generated and saved into the ‘/core’ directory, either on harddisk: or flash: filesystem. The system does
not generate reports in case of a reload.
In case of a system crash, the following details are collected:
• IOSd core file and IOS crashinfo file if there was an IOSd process crash
2. Tracelogs
4. Bootup logs
This report is generated before the router goes down to rommon/bootloader. The information is stored in
separate files which are then archived and compressed into the tar.gz bundle. This makes it convenient to get
a crash snapshot in one place, and can be then moved off the box for analysis.
Device hostname, the ID of the module that generated the system report and its creation timestamp are
embedded in the file name:
<hostname>_<moduleID>-system-report_<timestamp>.tar.gz
Example:
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
323
Troubleshooting
System Report
Router1_RP_0-system-report_20210204-163559-UTC
A device with hostname Router1 experienced an unexpected reload of RP0 module and the system-report
was generated on 4th February 2021 at 4:39:59 PM UTC.
├── bootflash/
│ └── pd_info/
│ ├── dmesg_output-20210204-163538-UTC.log
│ ├── filesystems-20210204-163538-UTC.log
│ ├── memaudit-20210204-163538-UTC.log
│ ├── proc_cpuinfo-20210204-163538-UTC.log
│ ├── proc_diskstats-20210204-163538-UTC.log
│ ├── proc_interrupts-20210204-163538-UTC.log
│ ├── proc_oom_stats-20210204-163538-UTC.log
│ ├── proc_softirqs-20210204-163538-UTC.log
│ ├── system_report_trigger.log
│ └── top_output-20210204-163538-UTC.log
├── harddisk/
│ ├── core/
│ │ └── Router1_RP_0_hman_17716_20210212-123836-UTC.core.gz
│ └── tracelogs/
├── tmp/
│ ├── fp/
│ │ └── trace/
│ ├── maroon_stats/
│ ├── rp/
│ │ └── trace/
│ └── Router1_RP_0-bootuplog-20210204-163559-UTC.log
└── var/
└── log/
└── audit/
└── audit.log
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
324
APPENDIX A
Unsupported Commands
The C8000 Series routers contain a series of commands with the logging or platform keywords that either
produce no output or produce output that is not useful for customer purposes. Such commands that are not
useful for customer purposes are considered as unsupported commands. You will not find any further Cisco
documentation for the unsupported commands.
The following is a list of unsupported commands for the C8000 Series routers:
• backplaneswitchport
• clear logging onboard slot f0 dram
• clear logging onboard slot f0 voltage
• clear logging onboard slot f0 temperature
• show logging onboard slot f0 dram
• show logging onboard slot f0 serdes
• show logging onboard slot f0 status
• show logging onboard slot f0 temperature
• show logging onboard slot f0 uptime
• show logging onboard slot f0 uptime latest
• show logging onboard slot f0 voltage
• show logging onboard slot 0 dram
• show logging onboard slot 0 serdes
• show logging onboard slot 0 status
• show logging onboard slot 0 temperature
• show logging onboard slot 0 uptime
• show logging onboard slot 0 uptime latest
• show logging onboard slot 0 voltage
• show platform software adjacency r0 special
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
325
Unsupported Commands
Unsupported Commands
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
326
Unsupported Commands
Unsupported Commands
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
327
Unsupported Commands
Unsupported Commands
Cisco Catalyst 8300 and Catalyst 8200 Series Edge Platforms Software Configuration Guide
328