Cisco IOS Configuration Fundamentals Configuration Guide
Cisco IOS Configuration Fundamentals Configuration Guide
Cisco IOS Configuration Fundamentals Configuration Guide
Configuration Fundamentals
Configuration Guide
Release 12.2
Corporate Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 526-4100
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION
PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO
LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of
UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED
“AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED,
INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL
DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR
INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
AccessPath, AtmDirector, Browse with Me, CCDA, CCDE, CCDP, CCIE, CCNA, CCNP, CCSI, CD-PAC, CiscoLink, the Cisco NetWorks logo, the Cisco
Powered Network logo, Cisco Systems Networking Academy, the Cisco Systems Networking Academy logo, Fast Step, Follow Me Browsing, FormShare,
FrameShare, GigaStack, IGX, Internet Quotient, IP/VC, iQ Breakthrough, iQ Expertise, iQ FastTrack, the iQ Logo, iQ Net Readiness Scorecard, MGX,
the Networkers logo, Packet, PIX, RateMUX, ScriptBuilder, ScriptShare, SlideCast, SMARTnet, TransPath, Unity, Voice LAN, Wavelength Router, and
WebViewer are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, Discover All That’s Possible, and Empowering
the Internet Generation, are service marks of Cisco Systems, Inc.; and Aironet, ASIST, BPX, Catalyst, Cisco, the Cisco Certified Internetwork Expert logo,
Cisco IOS, the Cisco IOS logo, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Enterprise/Solver, EtherChannel, EtherSwitch, FastHub,
FastSwitch, IOS, IP/TV, LightStream, MICA, Network Registrar, Post-Routing, Pre-Routing, Registrar, StrataView Plus, Stratm, SwitchProbe, TeleRouter,
and VCO are registered trademarks of Cisco Systems, Inc. or its affiliates in the U.S. and certain other countries.
All other brands, names, or trademarks mentioned in this document or Web site are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (0102R)
Audience xxi
FILE MANAGEMENT
Rebooting FC-221
SYSTEM MANAGEMENT
APPENDIXES
INDEX FC-449
This chapter discusses the objectives, audience, organization, and conventions of Cisco IOS software
documentation. It also provides sources for obtaining documentation from Cisco Systems.
Documentation Objectives
Cisco IOS software documentation describes the tasks and commands necessary to configure and
maintain Cisco networking devices.
Audience
The Cisco IOS software documentation set is intended primarily for users who configure and maintain
Cisco networking devices (such as routers and switches) but who may not be familiar with the tasks,
the relationship between tasks, or the Cisco IOS software commands necessary to perform particular
tasks. The Cisco IOS software documentation set is also intended for those users experienced with
Cisco IOS software who need to know about new features, new configuration options, and new software
characteristics in the current Cisco IOS software release.
Documentation Organization
The Cisco IOS software documentation set consists of documentation modules and master indexes. In
addition to the main documentation set, there are supporting documents and resources.
Documentation Modules
The Cisco IOS documentation modules consist of configuration guides and corresponding command
reference publications. Chapters in a configuration guide describe protocols, configuration tasks, and
Cisco IOS software functionality and contain comprehensive configuration examples. Chapters in a
command reference publication provide complete Cisco IOS command syntax information. Use each
configuration guide in conjunction with its corresponding command reference publication.
Note The abbreviations (for example, FC and FR) next to the book icons are page designators,
which are defined in a key in the index of each document to help you with navigation. The
bullets under each module list the major technology areas discussed in the corresponding
books.
IPC IP1R
Cisco IOS
IP
FC Cisco IOS Configuration Cisco IOS P2C Cisco IOS P3C Cisco IOS
Configuration Guide IP Command AppleTalk and Apollo Domain,
Fundamentals Reference, Novell IPX Banyan VINES,
Configuration Volume 1 of 3: Configuration DECnet, ISO
Guide Addressing Guide CLNS, and XNS
and Services Configuration
IP3R Guide
• IP Security Options
• Supported AV Pairs
B1R B2R
Cisco IOS
Cisco IOS Cisco IOS
Cisco IOS Bridging
DR Dial TR Terminal and IBM Bridging
Technologies and IBM
Services Networking
Command Networking
Command Command
Reference Command
Reference Reference,
Volume 1 of 2 Reference,
Volume 2 of 2
Master Indexes
Two master indexes provide indexing information for the Cisco IOS software documentation set:
an index for the configuration guides and an index for the command references. Individual books also
contain a book-specific index.
The master indexes provide a quick way for you to find a command when you know the command name
but not which module contains the command. When you use the online master indexes, you can click
the page number for an index entry and go to that page in the online document.
Release notes are intended to be release-specific for the most current release, and the information
provided in these documents may not be cumulative in providing information about features that first
appeared in previous releases.
Document Conventions
Within Cisco IOS software documentation, the term router is generally used to refer to a variety of Cisco
products (for example, routers, access servers, and switches). Routers, access servers, and other
networking devices that support Cisco IOS software are shown interchangeably within examples. These
products are used only for illustrative purposes; that is, an example that shows one product does not
necessarily indicate that other products are not supported.
The Cisco IOS documentation set uses the following conventions:
Convention Description
^ or Ctrl The ^ and Ctrl symbols represent the Control key. For example, the key combination ^D or Ctrl-D
means hold down the Control key while you press the D key. Keys are indicated in capital letters but
are not case sensitive.
string A string is a nonquoted set of characters shown in italics. For example, when setting an SNMP
community string to public, do not use quotation marks around the string or the string will include the
quotation marks.
Convention Description
boldface Boldface text indicates commands and keywords that you enter literally as shown.
italics Italic text indicates arguments for which you supply values.
[x] Square brackets enclose an optional element (keyword or argument).
| A vertical line indicates a choice within an optional or required set of keywords or arguments.
[x | y] Square brackets enclosing keywords or arguments separated by a vertical line indicate an optional
choice.
{x | y} Braces enclosing keywords or arguments separated by a vertical line indicate a required choice.
Nested sets of square brackets or braces indicate optional or required choices within optional or
required elements. For example:
Convention Description
[x {y | z}] Braces and a vertical line within square brackets indicate a required choice within an optional element.
Convention Description
screen Examples of information displayed on the screen are set in Courier font.
boldface screen Examples of text that you must enter are set in Courier bold font.
< > Angle brackets enclose text that is not printed to the screen, such as passwords.
! An exclamation point at the beginning of a line indicates a comment line. (Exclamation points are also
displayed by the Cisco IOS software for certain processes.)
[ ] Square brackets enclose default responses to system prompts.
The following conventions are used to attract the attention of the reader:
Caution Means reader be careful. In this situation, you might do something that could result in
equipment damage or loss of data.
Note Means reader take note. Notes contain helpful suggestions or references to materials not
contained in this manual.
Timesaver Means the described action saves time. You can save time by performing the action
described in the paragraph.
Obtaining Documentation
The following sections provide sources for obtaining documentation from Cisco Systems.
Documentation CD-ROM
Cisco documentation and additional literature are available in a CD-ROM package, which ships
with your product. The Documentation CD-ROM is updated monthly and may be more current than
printed documentation. The CD-ROM package is available as a single unit or through an
annual subscription.
Ordering Documentation
Cisco documentation can be ordered in the following ways:
• Registered Cisco Direct Customers can order Cisco product documentation from the Networking
Products MarketPlace:
http://www.cisco.com/cgi-bin/order/order_root.pl
• Registered Cisco.com users can order the Documentation CD-ROM through the online
Subscription Store:
http://www.cisco.com/go/subscription
• Nonregistered Cisco.com users can order documentation through a local account representative by
calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, in North America, by
calling 800 553-NETS(6387).
Documentation Feedback
If you are reading Cisco product documentation on the World Wide Web, you can submit technical
comments electronically. Click Feedback in the toolbar and select Documentation. After you complete
the form, click Submit to send it to Cisco.
You can e-mail your comments to [email protected].
To submit your comments by mail, use the response card behind the front cover of your document, or
write to the following address:
Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Cisco.com
Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open
access to Cisco information and resources at anytime, from anywhere in the world. This highly
integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
Cisco.com provides a broad range of features and services to help customers and partners streamline
business processes and improve productivity. Through Cisco.com, you can find information about Cisco
and our networking solutions, services, and programs. In addition, you can resolve technical issues with
online technical support, download and test software packages, and order Cisco learning materials and
merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on Cisco.com to obtain additional personalized information
and services. Registered users can order products, check on the status of an order, access technical
support, and view benefits specific to their relationships with Cisco.
To access Cisco.com, go to the following website:
http://www.cisco.com
This chapter provides helpful tips for understanding and configuring Cisco IOS software using the
command-line interface (CLI). It contains the following sections:
• Understanding Command Modes
• Getting Help
• Using the no and default Forms of Commands
• Saving Configuration Changes
• Filtering Output from the show and more Commands
• Identifying Supported Platforms
For an overview of Cisco IOS software configuration, refer to the Cisco IOS Configuration
Fundamentals Configuration Guide.
For information on the conventions used in the Cisco IOS software documentation set, see the chapter
“About Cisco IOS Software Documentation” located at the beginning of this book.
Table 1 describes how to access and exit various common command modes of the Cisco IOS software.
It also shows examples of the prompts displayed for each mode.
Command
Mode Access Method Prompt Exit Method
User EXEC Log in. Router> Use the logout command.
Privileged From user EXEC mode, Router# To return to user EXEC mode, use the disable
EXEC use the enable EXEC command.
command.
Global From privileged EXEC Router(config)# To return to privileged EXEC mode from global
configuration mode, use the configure configuration mode, use the exit or end command,
terminal privileged or press Ctrl-Z.
EXEC command.
Interface From global Router(config-if)# To return to global configuration mode, use the exit
configuration configuration mode, command.
specify an interface using To return to privileged EXEC mode, use the end
an interface command. command, or press Ctrl-Z.
ROM monitor From privileged EXEC > To exit ROM monitor mode, use the continue
mode, use the reload command.
EXEC command. Press
the Break key during the
first 60 seconds while the
system is booting.
For more information on command modes, refer to the “Using the Command-Line Interface” chapter in
the Cisco IOS Configuration Fundamentals Configuration Guide.
Getting Help
Entering a question mark (?) at the CLI prompt displays a list of commands available for each command
mode. You can also get a list of keywords and arguments associated with any command by using the
context-sensitive help feature.
To get help specific to a command mode, a command, a keyword, or an argument, use one of the
following commands:
Command Purpose
help Provides a brief description of the help system in any command mode.
abbreviated-command-entry? Provides a list of commands that begin with a particular character string. (No space
between command and question mark.)
abbreviated-command-entry<Tab> Completes a partial command name.
? Lists all commands available for a particular command mode.
command ? Lists the keywords or arguments that you must enter next on the command line.
(Space between command and question mark.)
Command Comment
Router> enable Enter the enable command and
Password: <password> password to access privileged EXEC
Router#
commands. You are in privileged
EXEC mode when the prompt changes
to Router#.
Router# configure terminal Enter the configure terminal
Enter configuration commands, one per line. End with CNTL/Z. privileged EXEC command to enter
Router(config)#
global configuration mode. You are in
global configuration mode when the
prompt changes to Router(config)#.
Router(config)# interface serial ? Enter interface configuration mode by
<0-6> Serial interface number specifying the serial interface that you
Router(config)# interface serial 4 ?
/
want to configure using the interface
Router(config)# interface serial 4/ ? serial global configuration command.
<0-3> Serial interface number
Enter ? to display what you must enter
Router(config)# interface serial 4/0
Router(config-if)# next on the command line. In this
example, you must enter the serial
interface slot number and port number,
separated by a forward slash.
You are in interface configuration mode
when the prompt changes to
Router(config-if)#.
Command Comment
Router(config-if)# ? Enter ? to display a list of all the
Interface configuration commands: interface configuration commands
.
.
available for the serial interface. This
. example shows only some of the
ip Interface Internet Protocol config commands available interface configuration
keepalive Enable keepalive commands.
lan-name LAN Name command
llc2 LLC2 Interface Subcommands
load-interval Specify interval for load calculation for an
interface
locaddr-priority Assign a priority group
logging Configure logging for interface
loopback Configure internal loopback on an interface
mac-address Manually set interface MAC address
mls mls router sub/interface commands
mpoa MPOA interface configuration commands
mtu Set the interface Maximum Transmission Unit (MTU)
netbios Use a defined NETBIOS access list or enable
name-caching
no Negate a command or set its defaults
nrzi-encoding Enable use of NRZI encoding
ntp Configure NTP
.
.
.
Router(config-if)#
Router(config-if)# ip ? Enter the command that you want to
Interface IP configuration subcommands: configure for the interface. This
access-group Specify access control for packets
accounting Enable IP accounting on this interface
example uses the ip command.
address Set the IP address of an interface Enter ? to display what you must enter
authentication authentication subcommands
next on the command line. This
bandwidth-percent Set EIGRP bandwidth limit
broadcast-address Set the broadcast address of an interface example shows only some of the
cgmp Enable/disable CGMP available interface IP configuration
directed-broadcast Enable forwarding of directed broadcasts commands.
dvmrp DVMRP interface commands
hello-interval Configures IP-EIGRP hello interval
helper-address Specify a destination address for UDP broadcasts
hold-time Configures IP-EIGRP hold time
.
.
.
Router(config-if)# ip
Command Comment
Router(config-if)# ip address ? Enter the command that you want to
A.B.C.D IP address configure for the interface. This
negotiated IP Address negotiated over PPP
Router(config-if)# ip address
example uses the ip address command.
Enter ? to display what you must enter
next on the command line. In this
example, you must enter an IP address
or the negotiated keyword.
A carriage return (<cr>) is not
displayed; therefore, you must enter
additional keywords or arguments to
complete the command.
Router(config-if)# ip address 172.16.0.1 ? Enter the keyword or argument you
A.B.C.D IP subnet mask want to use. This example uses the
Router(config-if)# ip address 172.16.0.1
172.16.0.1 IP address.
Enter ? to display what you must enter
next on the command line. In this
example, you must enter an IP subnet
mask.
A <cr> is not displayed; therefore, you
must enter additional keywords or
arguments to complete the command.
Router(config-if)# ip address 172.16.0.1 255.255.255.0 ? Enter the IP subnet mask. This example
secondary Make this IP address a secondary address uses the 255.255.255.0 IP subnet mask.
<cr>
Router(config-if)# ip address 172.16.0.1 255.255.255.0 Enter ? to display what you must enter
next on the command line. In this
example, you can enter the secondary
keyword, or you can press Enter.
A <cr> is displayed; you can press
Enter to complete the command, or
you can enter another keyword.
Router(config-if)# ip address 172.16.0.1 255.255.255.0 In this example, Enter is pressed to
Router(config-if)# complete the command.
have variables set to certain default values. In these cases, the default form of the command enables the
command and sets the variables to their default values. The Cisco IOS software command reference
publications describe the effect of the default form of a command if the command functions differently
than the no form.
It might take a minute or two to save the configuration. After the configuration has been saved, the
following output appears:
[OK]
Router#
On most platforms, this task saves the configuration to NVRAM. On the Class A Flash file system
platforms, this task saves the configuration to the location specified by the CONFIG_FILE environment
variable. The CONFIG_FILE variable defaults to NVRAM.
For more information on the search and filter functionality, refer to the “Using the Command-Line
Interface” chapter in the Cisco IOS Configuration Fundamentals Configuration Guide, Release 12.2.
This chapter provides an overview of the Cisco IOS Configuration Fundamentals Configuration Guide
for Cisco IOS Release 12.2. It includes descriptions of the parts and chapters of this document, and
suggestions on which parts of the documentation to read to perform common tasks.
File Management
The file management chapters describe the tasks associated with copying, saving, moving, and loading
different types of files, such as configuration files, images, and microcode:
• “Using the Cisco IOS File System”
This chapter descibes how to manage files using the Cisco IOS File System (IFS), which provides
a common syntax for managing all file systems on Cisco devices, including Flash memory file
systems and network file systems, as well as for any other endpoints used for reading or writing data.
• “Managing Configuration Files”
This chapter describes how to modify configuration files, as well as how to upload, store, and
download configuration files. This chapter also explains how to specify which configuration file the
system should use at startup.
• “Loading and Maintaining System Images”
This chapter describes how to download images from servers, store images on servers, and specify
which image is loaded at system startup. If you are not upgrading your system image and you do not
want to change image booting procedures, you do not need to read this chapter.
• “Maintaining System Memory”
This chapter describes the different types of memory your router may have and how to use this
memory to manage files.
• “Rebooting”
This chapter focuses on tasks related to the rebooting procedure. Read this chapter if you want to
change which image or configuration file is loaded at system startup. This chapter also discusses
ROM Monitor mode, which allows you to boot the router manually.
• “Configuring Basic File Transfer Services”
This chapter describes how to configure your router to function as a server, or use the remote shell
(rsh) and remote copy (rcp) functions. As a TFTP server, your router can provide other routers with
images and configuration files over the network. The rsh and rcp functions allow users to remotely
execute commands or copy files to or from another host. This chapter also addresses optional
configuration of Maintenance Operation Protocol (MOP) and Boot Operation Protocol (BOOTP)
services.
System Management
The system management chapters discuss tasks that allow you to maintain your router after it is
configured with the network, routing, and WAN protocols. These chapters discuss ways you can
fine-tune the router and maintain it over time. These chapters also discuss router and network monitoring
tools used for gathering information about connected devices and network performance.
Then, refer to the Cisco Product Catalog and the platform-specific release notes for a list of
Cisco-supported protocols, interfaces, and platforms. Set up the hardware as described in the
documentation shipped with your product. Configure any user interface, file management, or interface
management tasks as described in this book. Configure protocol-specific features on your router or
access server as described in the appropriate chapters of the other Cisco IOS software configuration
guides.
The Cisco IOS command-line interface (CLI) is the primary user interface used for configuring,
monitoring, and maintaining Cisco devices. This user interface allows you to directly and simply execute
Cisco IOS commands, whether using a router console or terminal, or using remote access methods.
This chapter describes the basic features of the Cisco IOS CLI and how to use them. Topics covered
include an introduction to Cisco IOS command modes, navigation and editing features, help features,
and command history features.
Additional user interfaces include Setup mode (used for first-time startup), the Cisco Web Browser, and
user menus configured by a system administrator. For information about Setup mode, see the “Using
AutoInstall and Setup” chapter of this book. For information on issuing commands using the Cisco Web
Browser, see the “Using the Cisco Web Browser User Interface” chapter of this book. For information
on user menus, see the “Managing Connections, Menus, and System Banners” chapter of this book.
For a complete description of the user interface commands in this chapter, refer to the “Basic
Command-Line Interface Commands” chapter of the Release 12.2 Cisco IOS Configuration
Fundamentals Command Reference. To locate documentation of other commands that appear in this
chapter, use the Cisco IOS Command Reference Master Index or search online.
This chapter contains the following sections:
• Cisco IOS CLI Command Modes Overview
• Cisco IOS CLI Task List
• Using the Cisco IOS CLI Examples
When you start a session on a router, you generally begin in user EXEC mode, which is one of two access
levels of the EXEC mode. For security purposes, only a limited subset of EXEC commands are available
in user EXEC mode. This level of access is reserved for tasks that do not change the configuration of the
router, such as determining the router status.
In order to have access to all commands, you must enter privileged EXEC mode, which is the second
level of access for the EXEC mode. Normally, you must enter a password to enter privileged EXEC
mode. In privileged EXEC mode, you can enter any EXEC command, as the privileged EXEC mode is
a superset of the user EXEC mode commands.
Most EXEC mode commands are one-time commands, such as show or more commands, which show
the current configuration status, and clear commands, which clear counters or interfaces. EXEC mode
commands are not saved across reboots of the router.
From privileged EXEC mode, you can enter global configuration mode. In this mode, you can enter
commands that configure general system characteristics. You also can use global configuration mode to
enter specific configuration modes. Configuration modes, including global configuration mode, allow
you to make changes to the running configuration. If you later save the configuration, these commands
are stored across router reboots.
From global configuration mode you can enter a variety of protocol-specific or feature-specific
configuration modes. The CLI hierarchy requires that you enter these specific configuration modes only
through global configuration mode. As an example, this chapter describes interface configuration mode,
a commonly used configuration mode.
From configuration modes, you can enter configuration submodes. Configuration submodes are used for
the configuration of specific features within the scope of a given configuration mode. As an example,
this chapter describes the subinterface configuration mode, a submode of the interface configuration
mode.
ROM monitor mode is a separate mode used when the router cannot boot properly. If your system (router,
switch, or access server) does not find a valid system image to load when it is booting, the system will
enter ROM monitor mode. ROM monitor (ROMMON) mode can also be accessed by interrupting the
boot sequence during startup.
The following sections contain detailed information on these command modes:
• User EXEC Mode
• Privileged EXEC Mode
• Global Configuration Mode
• Interface Configuration Mode
• Subinterface Configuration Mode
• ROM Monitor Mode
Table 3 follows these sections and summarizes the main Cisco IOS command modes.
Note For information on setting the password, see the “Configuring Passwords and Privileges” chapter in
the Release 12.2 Cisco IOS Security Configuration Guide and the “Using AutoInstall and Setup”
chapter in this document.
The EXEC commands available at the user level are a subset of those available at the privileged level.
In general, the user EXEC commands allow you to connect to remote devices, change terminal line
settings on a temporary basis, perform basic tests, and list system information.
To list the available user EXEC commands, use the following command:
Command Purpose
Router> ? Lists the user EXEC commands.
The user EXEC mode prompt consists of the host name of the device followed by an angle bracket (>),
as shown in the following example:
Router>
The default host name is generally Router, unless it has been changed during initial configuration using
the setup EXEC command. You also change the host name using the hostname global configuration
command.
Note Examples in Cisco IOS documentation assume the use of the default name of “Router.” Different
devices (for example, access servers) may use a different default name. If the routing device (router,
access server, or switch) has been named with the hostname command, that name will appear as the
prompt instead of the default name.
To list the commands available in user EXEC mode, enter a question mark (?) as shown in the following
example:
Router> ?
Exec commands:
<1-99> Session number to resume
connect Open a terminal connection
disconnect Disconnect an existing telnet session
enable Turn on privileged commands
exit Exit from Exec mode
help Description of the interactive help system
lat Open a lat connection
lock Lock the terminal
login Log in as a particular user
logout Exit from Exec mode and log out
menu Start a menu-based user interface
mbranch Trace multicast route for branch of tree
mrbranch Trace reverse multicast route to branch of tree
mtrace Trace multicast route to group
name-connection Name an existing telnet connection
pad Open a X.29 PAD connection
ping Send echo messages
resume Resume an active telnet connection
show Show running system information
systat Display information about terminal lines
telnet Open a telnet connection
terminal Set terminal line parameters
tn3270 Open a tn3270 connection
The list of commands will vary depending on the software feature set and router platform you are using.
Note You can enter commands in uppercase, lowercase, or mixed case. Only passwords are case sensitive.
However, Cisco IOS documentation convention is to always present commands in lowercase.
Command Purpose
Router> enable Enables privileged EXEC mode. After issuing the enable
command, the system will prompt you for a password.
Note that privileged EXEC mode is sometimes referred to as “enable mode,” because the enable
command is used to enter the mode.
If a password has been configured on the system, you will be prompted to enter it before being allowed
access to privileged EXEC mode. The password is not displayed on the screen and is case sensitive. If
an enable password has not been set, privileged EXEC mode can be accessed only from the router
console (terminal connected to the console port). The system administrator uses the enable secret or
enable password global configuration commands to set the password that restricts access to privileged
mode. For information on setting the passwords, see the “Configuring Passwords and Privileges” chapter
in the Release 12.2 Cisco IOS Security Configuration Guide.
To return to user EXEC mode, use the following command:
Command Purpose
Router# disable Exits from privileged EXEC mode to user EXEC mode.
The following example shows the process of accessing privileged EXEC mode:
Router> enable
Password:<letmein>
Router#
Note that the password will not be displayed as you type, but is shown here for illustrational purposes.To
list the commands available in privileged EXEC mode, issue the ? command at the prompt. From
privileged EXEC mode you can access global configuration mode, which is described in the following
section.
Note Because the privileged EXEC command set contains all of the commands available in user EXEC
mode, some commands can be entered in either mode. In Cisco IOS documentation, commands that
can be entered in either user EXEC mode or privileged EXEC mode are referred to as EXEC mode
commands. If user or privileged is not specified in the documentation, assume that you can enter the
referenced commands in either mode.
Command Purpose
Router# configure terminal From privileged EXEC mode, enters global configuration
mode.
The following example shows the process of entering global configuration mode from privileged EXEC
mode:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
Note that the system prompt changes to indicate that you are now in global configuration mode. The
prompt for global configuration mode consists of the host-name of the device followed by (config) and
the pound sign ( #). To list the commands available in privileged EXEC mode, issue the ? command at
the prompt.
Commands entered in global configuration mode update the running configuration file as soon as they
are entered. In other words, changes to the configuration take effect each time you press the Enter or
Return key at the end of a valid command. However, these changes are not saved into the startup
configuration file until you issue the copy running-config startup-config EXEC mode command. This
behavior is explained in more detail later in this document.
As shown in the example above, the system dialogue prompts you to end your configuration session (exit
configuration mode) by pressing the Control (Ctrl) and “z” keys simultaneously; when you press these
keys, ^Z is printed to the screen. You can actually end your configuration session by entering the Ctrl-Z
key combination, using the end command, using the Ctrl-C key combination. The end command is the
recommended way to indicate to the system that you are done with the current configuration session.
Warning If you use Ctrl-Z at the end of a command line in which a valid command has been typed, that
command will be added to the running configuration file. In other words, using Ctrl-Z is equivalent
to hitting the Enter (Carriage Return) key before exiting. For this reason, it is safer to end your
configuration session using the end command. Alternatively, you can use the Ctrl-C key
combination to end your configuration session without sending a Carriage Return signal.
You can also use the exit command to return from global configuration mode to EXEC mode, but this
only works in global configuration mode. Pressing Ctrl-Z or entering the end command will always take
you back to EXEC mode regardless of which configuration mode or configuration submode you are in.
To exit global configuration command mode and return to privileged EXEC mode, use one of the
following commands:
Command Purpose
Router(config)# end Ends the current configuration session and returns to privileged
or EXEC mode.
Router(config)# ^Z
Router(config)# exit Exits the current command mode and returns to the preceding
mode. For example, exits from global configuration mode to
privileged EXEC mode.
From global configuration mode, you can enter a number of protocol-specific, platform-specific, and
feature-specific configuration modes. For a complete list of configuration modes, see the “Cisco IOS
Command Modes” appendix in this book. This appendix provides references to the appropriate
documentation module for information about specific configuration modes.
Interface configuration mode, described in the following section, is an example of a configuration mode
you can enter from global configuration mode.
Command Purpose
Router(config)# interface type number Specifies the interface to be configured, and enters interface
configuration mode.
In the following example, the user enter interface configuration mode for serial interface 0. The new
prompt, hostname(config-if)#, indicates interface configuration mode.
To exit interface configuration mode and return to global configuration mode, enter the exit command.
Configuration submodes are configuration modes entered from other configuration modes (besides
global configuration mode). Configuration submodes are for the configuration of specific elements
within the configuration mode. For a complete list of configuration submodes, see the “Cisco IOS
Command Modes” appendix in this book. One example of a configuration submode is subinterface
configuration mode, described in the following section.
Command Purpose
Router(config-if)# interface type number Specifies the virtual interface to be configured and enters
subinterface configuration mode.
In the following example, a subinterface is configured for serial line 2, which is configured for
Frame Relay encapsulation. The subinterface is identified as “2.1” to indicate that it is subinterface 1 of
serial interface 2. The new prompt hostname(config-subif)# indicates subinterface configuration
mode. The subinterface can be configured to support one or more Frame Relay PVCs.
Router(config)# interface serial 2
Router(config-if)# encapsulation frame-relay
Router(config-if)# interface serial 2.1
Router(config-subif)#
To exit subinterface configuration mode and return to interface configuration mode, use the exit
command. To end your configuration session and return to privileged EXEC mode, press Ctrl-Z or enter
the end command.
Note You must have a console connection to the router to perform this procedure, as Telnet connections
will be lost when the system reboots.
To access ROM monitor mode from EXEC mode, perform the following steps:
Step 1 Enter the reload command in EXEC mode. After issuing this command and responding to the system
prompts as necessary, the system will begin reloading the system software image.
Step 2 Issue the Break command during the first 60 seconds of system startup. The break command is issued
using the Break key or Break key-combination. (The default Break key combination is Ctrl-C, but this
may be configured differently on your system.) Issuing the break command interrups the boot sequence
and brings you into ROM monitor mode.
Another method for entering ROM monitor mode is to set the configuration register so that the router
automatically enters ROM monitor mode when it boots. For information about setting the configuration
register value, see the “Rebooting” chapter in this book.
ROM monitor mode uses an angle bracket (>) as the command line prompt. On some Cisco devices the
default ROM monitor prompt is rommon >. A list of ROM monitor commands is displayed when you enter
the ? command or help command. The following example shows how this list of commands may appear:
User break detected at location 0x8162ac6\Œ
rommon 1 > ?
alias set and display aliases command
boot boot up an external process
break set/show/clear the breakpoint
confreg configuration register utility
cont continue executing a downloaded image
context display the context of a loaded image
cpu_card_type display CPU card type
dev list the device table
dir list files in file system
dis disassemble instruction stream
frame print out a selected stack frame
help monitor builtin command help
history monitor command history
meminfo main memory information
repeat repeat a monitor command
reset system reset
set show all monitor variables
stack produce a stack trace
The list of available commands will vary depending on the software image and platform you are using.
Some versions of ROMMON will display a list of commands in a pre-aliased format such as the
following:
> ?
$ state Toggle cache state (? for help)
B [filename] [TFTP Server IP address | TFTP Server Name]
Load and execute system image from ROM or from TFTP server
C [address] Continue execution [optional address]
D /S M L V Deposit value V of size S into location L with modifier M
E /S M L Examine location L with size S with modifier M
G [address] Begin execution
H Help for commands
I Initialize
K Stack trace
L [filename] [TFTP Server IP address | TFTP Server Name]
Load system image from ROM or from TFTP server, but do not
begin execution
O Show configuration register option settings
P Set the break point
S Single step next instruction
T function Test device (? for help)
Deposit and Examine sizes may be B (byte), L (long) or S (short).
Modifiers may be R (register) or S (byte swap).
Register names are: D0-D7, A0-A6, SS, US, SR, and PC
To exit ROM monitor mode, use the continue command or C command alias; this will restart the booting
process.
For more information on ROM monitor mode characteristics (including using aliases for commands) and
using ROM monitor mode, see the “Rebooting” chapter in this document.
Command
Mode Access Method Prompt Exit Method
User EXEC Log in. Router> Use the logout command.
Privileged From user EXEC mode, Router# To exit to user EXEC mode, use the disable
EXEC use the enable EXEC command.
command.
To enter global configuration mode, use the
configure terminal privileged EXEC command.
Command
Mode Access Method Prompt Exit Method
Global From privileged EXEC Router(config)# To exit to privileged EXEC mode, use the end
configuration mode, use the configure command or press Ctrl-Z.
terminal privileged
To enter interface configuration mode, use the
EXEC command.
interface configuration command.
Interface From global configuration Router(config-if)# To exit to global configuration mode, use the exit
configuration mode, enter by specifying command.
an interface with an
To exit to privileged EXEC mode, use the end
interface command.
command or press Ctrl-Z.
To enter subinterface configuration mode, specify a
subinterface with the interface command.
Subinterface From interface Router(config-subif)# To exit to global configuration mode, use the exit
configuration configuration mode, command.
specify a subinterface
To exit to privileged EXEC mode, use the end
with an interface
command or press Ctrl-Z.
command. (The
availability of this mode is
dependent on your
platform.)
ROM monitor From privileged EXEC > If you entered ROM monitor mode by interrupting
mode, use the reload the loading process, you can exit ROM monitor and
EXEC command. Press or resume loading by using the continue command or
the Break key during the boot> the C command alias.
first 60 seconds while the
system is booting. or
rommon >
To get help specific to a command mode, a command name, a keyword, or an argument, use any of the
following commands:
Command Purpose
(prompt)# help Displays a brief description of the help system.
(prompt)# abbreviated-command-entry? Lists commands in the current mode that begin with a particular
character string.
(prompt)# abbreviated-command-entry<Tab> Completes a partial command name.
(prompt)# ? Lists all commands available in the command mode.
(prompt)# command ? Lists the available syntax options (arguments and keywords) for
the command.
(prompt)# command keyword ? Lists the next available syntax option for the command.
Note that the system prompt will vary depending on which configuration mode you are in.
When using context-sensitive help, the space (or lack of a space) before the question mark (?) is
significant. To obtain a list of commands that begin with a particular character sequence, type in those
characters followed immediately by the question mark (?). Do not include a space. This form of help is
called word help, because it completes a word for you. For more information, see the “Completing a
Partial Command Name” section later in this chapter.
To list keywords or arguments, enter a question mark (?) in place of a keyword or argument. Include a
space before the ?. This form of help is called command syntax help, because it shows you which
keywords or arguments are available based on the command, keywords, and arguments you already have
entered.
You can abbreviate commands and keywords to the number of characters that allow a unique
abbreviation. For example, you can abbreviate the configure terminal command to config t. Because
the abbreviated form of the command is unique, the router will accept the abbreviated form and execute
the command.
Entering the help command (available in any command mode) will provide the following description of
the help system:
Router# help
Help may be requested at any point in a command by entering
a question mark '?'. If nothing matches, the help list will
be empty and you must back up until entering a '?' shows the
available options.
Two styles of help are provided:
1. Full help is available when you are ready to enter a
command argument (e.g. 'show ?') and describes each possible
argument.
2. Partial help is provided when an abbreviated argument is entered
and you want to know what arguments match the input
(e.g. 'show pr?'.)
As described in the help command output, you can use the question mark (?) to complete a partial
command name (partial help), or to obtain a list of arguments or keywords that will complete the current
command.
The following example illustrates how the context-sensitive help feature enables you to create an access
list from configuration mode.
Enter the letters co at the system prompt followed by a question mark (?). Do not leave a space between
the last letter and the question mark. The system provides the commands that begin with co.
Router# co?
configure connect copy
Enter the configure command followed by a space and a question mark to list the keywords for the
command and a brief explanation:
Router# configure ?
memory Configure from NV memory
network Configure from a TFTP network host
overwrite-network Overwrite NV memory from TFTP network host
terminal Configure from the terminal
<cr>
The <cr> symbol (“cr” stands for carriage return) appears in the list to indicate that one of your options
is to press the Return or Enter key to execute the command, without adding any additional keywords. In
this example, the output indicates that your options for the configure command are configure memory
(configure from NVRAM), configure network (configure from a file on the network), configure
overwrite-network (configure from a file on the network and replace the file in NVRAM), or configure
terminal (configure manually from the terminal connection). For most commands, the <cr> symbol is
used to indicate that you can execute the command with the syntax you have already entered. However,
the configure command is a special case, as the CLI will prompt you for the missing syntax:
Router# configure
Configuring from terminal, memory, or network [terminal]? terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
The default response for the ? prompt is indicated in the CLI output by a bracketed option at the end of
the line. In the preceding example, pressing the Enter (or Return) key is equivalent to typing in the word
“terminal.”
To skip the prompting, enter the configure terminal command to enter global configuration mode:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
The CLI provides error isolation in the form of an error indicator, a caret symbol (^). The ^ symbol
appears at the point in the command string where the user has entered incorrect or unrecognized
command syntax. For example, the caret symbol in the following output shows the letter that was
mistyped in the command:
Router# configure termiMal
^
% Invalid input detected at '^' marker.
Router#
Note that an error message (indicated by the % symbol) is printed to the screen to alert you to the error
marker.
Enter the access-list command followed by a space and a question mark to list the available options for
the command:
c3660-2(config)#access-list ?
<1-99> IP standard access list
<100-199> IP extended access list
<1100-1199> Extended 48-bit MAC address access list
<1300-1999> IP standard access list (expanded range)
<200-299> Protocol type-code access list
The two numbers within the angle brackets represent an inclusive range. Enter the access list number 99
and then enter another question mark to see the arguments that apply to the keyword and brief
explanations:
Router(config)# access-list 99 ?
deny Specify packets to reject
permit Specify packets to forward
Enter the deny argument followed by a question mark (?) to list additional options:
Router(config)# access-list 99 deny ?
A.B.C.D Address to match
Generally, uppercase letters represent variables (arguments). Enter the IP address followed by a question
mark (?) to list additional options:
Router(config)# access-list 99 deny 172.31.134.0 ?
A.B.C.D Mask of bits to ignore
<cr>
In this output, A.B.C.D indicates that use of a wildcard mask is allowed. The wildcard mask is a method
for matching IP addresses or ranges of IP addresses. For example, a wildcard mask of 0.0.0.255 matches
any number in the range from 0 to 255 that appears in the fourth octet of an IP address.
Enter the wildcard mask followed by a question mark (?) to list further options.
Router(config)# access-list 99 deny 172.31.134.0 0.0.0.255 ?
<cr>
The <cr> symbol by itself indicates there are no more keywords or arguments. Press Enter (or Return)
to execute the command.
Router(config)# access-list 99 deny 172.31.134.0 0.0.0.255
The system adds an entry to access list 99 that denies access to all hosts on subnet 172.31.134.0, while
ignoring bits for IP addresses that end in 0 to 255.
Command Purpose
Router# terminal full-help Configures this session to provide help for the full set of
user-level commands.
The system administrator can also configure the system to always display full help for connections made
to a particular line using the full-help line configuration command.
The full-help and terminal full-help commands enable the displaying of all help messages available in
user EXEC mode when the show ? command is executed.
The following example is output for the show ? command with terminal full-help disabled and then
enabled:
Router> terminal no full-help
Router> show ?
Many CLI commands also have a default form. By issuing the command default command-name, you
can configure the command to its default setting. The Cisco IOS software command reference
publications describe the function of the default form of the command when the default form performs
a different function than the plain and no forms of the command. To see what default commands are
available on your system, enter default ? in the appropriate command mode.
Command Purpose
Router# terminal history [size number-of-lines] Enables the command history feature for the current terminal
session.
The terminal no history size command resets the number of lines saved in the history buffer to the
default of ten lines.
To configure the number of command lines the system will record for all sessions on a particular line,
use the following command in line configuration mode:
Command Purpose
Router(config-line)# history [size number-of-lines] Enables the command history feature.
Recalling Commands
To recall commands from the history buffer, use one of the following commands or key combinations:
Command Purpose
Router> terminal no history Disables command history for the current session.
To configure a specific line so that the command history feature is disabled, use the following command
in line configuration mode:
Command Purpose
Router(config-line)# no history Disables command history for the line.
When you use the command completion feature the CLI displays the full command name. The command
is not executed until you use the Return or Enter key. This way you can modify the command if the full
command was not what you intended by the abbreviation. If you enter a set of characters that could
indicate more than one command, the system beeps to indicate that the text string is not unique.
If the CLI can not complete the command, enter a question mark (?) to obtain a list of commands that
begin with that set of characters. Do not leave a space between the last letter you enter and the question
mark (?).
For example, entering co? will list all commands available in the current command mode:
Router# co?
configure connect copy
Router# co
Note that the characters you enter before the question mark are reprinted to the screen to allow you to
complete the command entry.
Deleting Entries
Use any of the following keys or key combinations to delete command entries if you make a mistake or
change your mind:
Keystrokes Purpose
Delete or Backspace Deletes the character to the left of the cursor.
Ctrl-D Deletes the character at the cursor.
Ctrl-K Deletes all characters from the cursor to the end of the command
line.
Ctrl-U or Ctrl-X Deletes all characters from the cursor to the beginning of the
command line.
Ctrl-W Deletes the word to the left of the cursor.
Esc, D Deletes from the cursor to the end of the word.
Keystrokes Purpose
Ctrl-Y Recalls the most recent entry in the buffer
(press keys simultaneously).
Esc, Y Recalls the previous entry in the history buffer
(press keys sequentially).
Note that the Esc, Y key sequence will not function unless you press the Ctrl-Y key combination first.
If you press Esc, Y more than ten times, you will cycle back to the most recent entry in the buffer.
When you have completed the entry, press Ctrl-A to check the complete syntax before pressing the
Return key to execute the command. The dollar sign ($) appears at the end of the line to indicate that the
line has been scrolled to the right:
Router(config)# access-list 101 permit tcp 172.31.134.5 255.255.255.0 172.31.1$
The Cisco IOS software assumes you have a terminal screen that is 80 columns wide. If you have a
different screen-width, use the terminal width EXEC command to set the width of your terminal.
Use line wrapping in conjunction with the command history feature to recall and modify previous
complex command entries. See the “Recalling Commands” section in this chapter for information about
recalling previous command entries.
Tips If output is pausing on your screen, but you do not see the --More-- prompt, try entering a smaller
value for the screen length using the length line configuration command or the terminal length
EXEC command. Command output will not be paused if the length value is set to zero.
For information about filtering output from the --More-- prompt, see the “Searching and Filtering CLI
Output” section in this chapter.
Keystrokes Purpose
Ctrl-L or Ctrl-R Redisplays the current command line.
Keystrokes Purpose
Ctrl-T Transposes the character to the left of the cursor with the
character located at the cursor.
Controlling Capitalization
You can capitalize or lowercase words or capitalize a set of letters with simple key sequences. Note,
however, that Cisco IOS commands are generally case-insensitive, and are typically all in lowercase. To
change the capitalization of commands, use any of the following key sequences:
Keystrokes Purpose
Esc, C Capitalizes the letter at the cursor.
Esc, L Changes the word at the cursor to lowercase.
Esc, U Capitalizes letters from the cursor to the end of the word.
Keystrokes Purpose
Ctrl-V or Esc, Q Configures the system to accept the following keystroke as a
user-configured command entry (rather than as an editing
command).
Command Purpose
Router(config-line)# no editing Disables CLI editing features for a particular line.
To disable the editing features for the current terminal session, use the following command in EXEC
mode:
Command Purpose
Router# terminal no editing Disables CLI editing features for the local line.
To reenable the editing features for the current terminal session, use the following command in EXEC
mode:
Command Purpose
Router# terminal editing Enables the CLI editing features for the current terminal session.
To reenable the editing features for a specific line, use the following command in line configuration
mode:
Command Purpose
Router(config-line)# editing Enables the CLI editing features.
Note Show and more commands are always entered in EXEC mode.
When output continues beyond what is displayed on your screen, the Cisco IOS CLI displays a --More--
prompt. Pressing Return displays the next line; pressing the Spacebar displays the next screen of output.
The CLI String Search feature allows you to search or filter output from --More-- prompts.
A regular expression can be a single-character pattern or a multiple-character pattern. That is, a regular
expression can be a single character that matches the same single character in the command output or
multiple characters that match the same multiple characters in the command output. The pattern in the
command output is referred to as a string. This section describes creating both single-character patterns
and multiple-character patterns. It also discusses creating more complex regular expressions using
multipliers, alternation, anchoring, and parentheses.
Single-Character Patterns
The simplest regular expression is a single character that matches the same single character in the
command output. You can use any letter (A–Z, a–z) or digit (0–9) as a single-character pattern. You can
also use other keyboard characters (such as ! or ~) as single-character patterns, but certain keyboard
characters have special meaning when used in regular expressions. Table 5 lists the keyboard characters
that have special meaning.
To use these special characters as single-character patterns, remove the special meaning by preceding
each character with a backslash (\). The following examples are single-character patterns matching a
dollar sign, an underscore, and a plus sign, respectively.
\$ \_ \+
You can specify a range of single-character patterns to match against command output. For example, you
can create a regular expression that matches a string containing one of the following letters: a, e, i, o, or
u. Only one of these characters must exist in the string for pattern matching to succeed. To specify a
range of single-character patterns, enclose the single-character patterns in square brackets ([ ]). For
example, [aeiou] matches any one of the five vowels of the lowercase alphabet, while [abcdABCD]
matches any one of the first four letters of the lower- or uppercase alphabet.
You can simplify ranges by entering only the endpoints of the range separated by a dash (-). Simplify the
previous range as follows:
[a-dA-D]
To add a dash as a single-character pattern in your range, include another dash and precede it with a
backslash:
[a-dA-D\-]
You can also include a right square bracket (]) as a single-character pattern in your range, as shown here:
[a-dA-D\-\]]
The previous example matches any one of the first four letters of the lower- or uppercase alphabet, a
dash, or a right square bracket.
You can reverse the matching of the range by including a caret (^) at the start of the range. The following
example matches any letter except the ones listed.
[^a-dqsv]
The following example matches anything except a right square bracket (]) or the letter d:
[^\]d]
Multiple-Character Patterns
When creating regular expressions, you can also specify a pattern containing multiple characters. You
create multiple-character regular expressions by joining letters, digits, or keyboard characters that do not
have special meaning. For example, a4% is a multiple-character regular expression. Put a backslash
before the keyboard characters that have special meaning when you want to indicate that the character
should be interpreted literally.
With multiple-character patterns, order is important. The regular expression a4% matches the character
a followed by a 4 followed by a % sign. If the string does not have a4%, in that order, pattern matching
fails. The multiple-character regular expression a. uses the special meaning of the period character to
match the letter a followed by any single character. With this example, the strings ab, a!, or a2 are all
valid matches for the regular expression.
You can remove the special meaning of the period character by putting a backslash in front of it. For
example, when the expression a\. is used in the command syntax, only the string a. will be matched.
You can create a multiple-character regular expression containing all letters, all digits, all keyboard
characters, or a combination of letters, digits, and other keyboard characters. For example,
telebit 3107 v32bis is a valid regular expression.
Multipliers
You can create more complex regular expressions that instruct Cisco IOS software to match multiple
occurrences of a specified regular expression. To do so, you use some special characters with your
single-character and multiple-character patterns. Table 6 lists the special characters that specify
“multiples” of a regular expression.
Character Description
* Matches 0 or more single-character or multiple-character patterns.
+ Matches 1 or more single-character or multiple-character patterns.
? Matches 0 or 1 occurrences of a single-character or multiple-character pattern.
The following example matches any number of occurrences of the letter a, including none:
a*
The following pattern requires that at least one letter a be in the string to be matched:
a+
The following pattern matches the string bb or bab:
ba?b
Alternation
Alternation allows you to specify alternative patterns to match against a string. You separate the
alternative patterns with a vertical bar (|). Exactly one of the alternatives can match the string. For
example, the regular expression codex |telebit matches the string codex or the string telebit, but not both
codex and telebit.
Anchoring
You can instruct Cisco IOS software to match a regular expression pattern against the beginning or the
end of the string. That is, you can specify that the beginning or end of a string contain a specific pattern.
You “anchor” these regular expressions to a portion of the string using the special characters shown in
Table 7.
Character Description
^ Matches the beginning of the string.
$ Matches the end of the string.
For example, the regular expression ^con matches any string that starts with con, and $sole matches any
string that ends with sole.
In addition to indicating the beginning of a string, the ^ symbol can be used to indicate the logical
function “not” when used in a bracketed range. For example, the expression [^abcd] indicates a range
that matches any single letter, as long as it is not the letters a, b, c, or d.
Contrast these anchoring characters with the special character underscore (_). Underscore matches the
beginning of a string (^), the end of a string ($), parentheses (( )) , space ( ), braces ({}), comma (,), or
underscore (_). With the underscore character, you can specify that a pattern exist anywhere in the string.
For example, _1300_ matches any string that has 1300 somewhere in the string. The string 1300 can be
preceded by or end with a space, brace, comma, or underscore. So, while {1300_ matches the regular
expression _1300_, 21300 and 13000 do not.
Using the underscore character, you can replace long regular expression lists. For example, instead of
specifying ^1300( ) ( )1300$ {1300, ,1300, {1300} ,1300, (1300 you can specify simply _1300_.
As shown in the “Multipliers” section, you use parentheses with multiple-character regular expressions
to multiply the occurrence of a pattern. You can also use parentheses around a single- or
multiple-character pattern to instruct the Cisco IOS software to remember a pattern for use elsewhere in
the regular expression.
To create a regular expression that recalls a previous pattern, you use parentheses to indicate memory of
a specific pattern and a backslash (\) followed by a digit to reuse the remembered pattern. The digit
specifies the occurrence of a parentheses in the regular expression pattern. If you have more than one
remembered pattern in your regular expression, then \1 indicates the first remembered pattern, and \2
indicates the second remembered pattern, and so on.
The following regular expression uses parentheses for recall:
a(.)bc(.)\1\2
This regular expression matches an a followed by any character (call it character no. 1), followed by bc
followed by any character (character no. 2), followed by character no. 1 again, followed by character
no. 2 again. So, the regular expression can match aZbcTZT. The software remembers that character no. 1
is Z and character no. 2 is T and then uses Z and T again later in the regular expression.
Command Purpose
Router# show any-command | begin regular-expression Begins unfiltered output of the show command with
the first line that contains the regular expression.
Note Cisco IOS documentation generally uses the vertical bar to indicate a choice of syntax. However, to
search the output of show and more commands, you will need to enter the pipe character (the vertical
bar). In this section the pipe appears in bold (|) to indicate that you should enter this character.
To filter show command output, use one of the following commands in EXEC mode:
Command Purpose
Router# show any-command | exclude regular-expression Displays output lines that do not contain the regular
expression.
Router# show any-command | include regular-expression Displays output lines that contain the regular expression.
On most systems you can enter the Ctrl-Z key combination at any time to interrupt the output and return
to EXEC mode. For example, you can enter the show running-config | begin hostname command to
start the display of the running configuration file at the line containing the hostname setting, then use
Ctrl-z when you get to the end of the information you are interested in.
Command Purpose
Router# more any-command | begin regular-expression Begins unfiltered output of a more command with the first
line that contains the regular expression.
You can filter more commands the same way you filter show commands. To filter more command
output, use one of the following commands in EXEC mode:
Command Purpose
Router# more any-command | exclude regular-expression Displays output lines that do not contain the regular
expression.
Router# more any-command | include regular-expression Displays output lines that contain the regular expression.
Command Purpose
-More- Begins unfiltered output with the first line that contains the
/regular-expression regular expression.
You can filter output from --More-- prompts. However, you can only specify one filter for each
command. The filter remains until the show or more command output finishes or until you interrupt the
output (using Ctrl-Z or Ctrl-6). Therefore, you cannot add a second filter at a --More-- prompt if you
already specified a filter at the original command or at a previous --More--prompt.
Note Searching and filtering are different functions. You can search command output using the begin
keyword and specify a filter at the --More-- prompt for the same command.
To filter show or more command output at a --More-- prompt, use one of the following commands in
EXEC mode:
Command Purpose
-More- Displays output lines that do not contain the regular
-regular-expression expression.
-More- Displays output lines that contain the regular expression.
+regular-expression
The help output shows that the set keyword is required. Determine the syntax for entering the time:
Router# clock set ?
hh:mm:ss Current time
Router# clock set
The system indicates that you need to provide additional arguments to complete the command. Press
Ctrl-P or the Up Arrow to automatically repeat the previous command entry. Then add a space and
question mark (?) to reveal the additional arguments:
Router# clock set 13:32:00 ?
<1-31> Day of the month
January Month of the year
February
March
April
May
June
July
August
September
October
November
December
The caret symbol (^) and help response indicate an error at 01. To list the correct syntax, enter the
command up to the point where the error occurred and then enter a question mark (?):
Router# clock set 13:32:00 23 February ?
<1993-2035> Year
Enter the year using the correct syntax and press Enter or Return to execute the command:
Router# clock set 13:32:00 23 February 2001
The following is partial sample output of the more nvram:startup-config | include command. It only
displays lines that contain the regular expression ip .
Router# more nvram:startup-config | include ip
ip subnet-zero
ip domain-name cisco.com
ip name-server 198.92.30.32
ip name-server 171.69.2.132
The following is partial sample output of the more nvram:startup-config | exclude command. It
excludes lines that contain the regular expression service. At the --More-- prompt, the user specifies a
filter with the regular expression Dialer1 . Specifying this filter resumes the output with the first line
that contains Dialer1 .
Router# more nvram:startup-config | exclude service
!
version 12.2
!
hostname router
!
boot system flash
no logging buffered
!
ip subnet-zero
ip domain-name cisco.com
.
.
.
--More--
/Dialer1
filtering...
interface Dialer1
no ip address
no ip directed-broadcast
dialer in-band
no cdp enable
The following is partial sample output of the show interface EXEC command with an output search
specified. The use of the keywords begin Ethernet after the pipe begins unfiltered output with the first
line that contains the regular expression Ethernet . At the --More-- prompt, the user specifies a filter
that displays only the lines that contain the regular expression Serial .
Router# show interface | begin Ethernet
Ethernet0 is up, line protocol is up
Hardware is Lance, address is 0060.837c.6399 (bia 0060.837c.6399)
Description: ip address is 172.1.2.14 255.255.255.0
Internet address is 172.1.2.14/24
.
.
.
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
--More--
+Serial
filtering...
Serial1 is up, line protocol is up
Serial2 is up, line protocol is up
Serial3 is up, line protocol is down
Serial4 is down, line protocol is down
Serial5 is up, line protocol is up
Serial6 is up, line protocol is up
Serial7 is up, line protocol is up
The following is partial sample output of the show buffers | exclude command. It excludes lines that
contain the regular expression 0 misses. At the --More-- prompt, the user specifies a search that
continues the filtered output beginning with the first line that contains Serial0.
Router# show buffers | exclude 0 misses
Buffer elements:
398 in free list (500 max allowed)
Public buffer pools:
Small buffers, 104 bytes (total 50, permanent 50):
50 in free list (20 min, 150 max allowed)
551 hits, 3 misses, 0 trims, 0 created
Big buffers, 1524 bytes (total 50, permanent 50):
49 in free list (5 min, 150 max allowed)
Very Big buffers, 4520 bytes (total 10, permanent 10):
.
.
.
Huge buffers, 18024 bytes (total 0 permanent 0):
0 in free list (0 min, 4 max allowed)
--More--
/Serial0
filtering...
The following is partial sample output of the show interface | include command. The use of the
include ( is ) keywords after the pipe (|) causes the command to display only lines that contain the
regular expression ( is ) . The parenthesis force the inclusion of the spaces before and after is. Use
of the parenthesis ensures that only lines containing is with a space both before and after it will be
included in the output (excluding from the search, for example, words like “disconnect”).
router# show interface | include ( is )
ATM0 is administratively down, line protocol is down
Hardware is ATMizer BX-50
Dialer1 is up (spoofing), line protocol is up (spoofing)
Hardware is Unknown
DTR is pulsed for 1 seconds on reset
Ethernet0 is up, line protocol is up
Hardware is Lance, address is 0060.837c.6399 (bia 0060.837c.6399)
Internet address is 172.21.53.199/24
Ethernet1 is up, line protocol is up
Hardware is Lance, address is 0060.837c.639c (bia 0060.837c.639c)
Internet address is 5.5.5.99/24
Serial0:0 is down, line protocol is down
Hardware is DSX1
.
.
.
--More--
At the --More-- prompt, the user specifies a search that continues the filtered output beginning with the
first line that contains Serial0:13 :
/Serial0:13
filtering...
Serial0:13 is down, line protocol is down
Hardware is DSX1
Internet address is 11.0.0.2/8
0 output errors, 0 collisions, 2 interface resets
Timeslot(s) Used:14, Transmitter delay is 0 flag
The Cisco IOS software includes two features that simplify or automate the configuration of Cisco
devices. AutoInstall allows a network manager to load configuration files onto new Cisco devices
automatically. Setup is a Cisco IOS software feature that guides a user through the first-time
configuration of a Cisco device. This chapter describes AutoInstall, Setup, and provides a brief summary
of external configuration applications. It include the following sections:
• Using AutoInstall
• Using Setup
• Using Configuration Applications
For a complete description of the setup command, refer to the Setup command reference page in the
Release 12.2 Cisco IOS Configuration Fundamentals Command Reference. To locate documentation of
other commands that appear in this chapter, use the Cisco IOS Command Reference Master Index or
search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Note This chapter uses quotation marks around file names to improve readability. Also, all instances of the
term “router” in this chapter should be assumed to apply to any Cisco device that supports Cisco IOS
Release 12.2.
Using AutoInstall
This section provides the following information about the AutoInstall feature in Cisco IOS software:
• Understanding AutoInstall
• AutoInstall Configuration Task List
• Monitoring and Completing the AutoInstall Process
• AutoInstall Configuration Examples
AutoInstall allows you to connect a new router to the network, turn on the new router, and have it
configured automatically from a preexisting configuration file. This process was designed to facilitate
the centralized management of router installation.
The AutoInstall process begins any time a Cisco IOS software-based device is turned on and a valid
configuration file is not found in nonvolatile random-access memory (NVRAM). A configuration file is
typically not available when a router is turned on for the first time, or when the configuration file has
been manually deleted from NVRAM.
Note To configure a new router manually, connect directly to the console port and ensure that the router is not
connected to the network via any of the interface ports before you turn on the router. It may take several
minutes for the router boot software to determine that AutoInstall is not connected to the network. See
the “Using Setup” section later in this chapter for information on configuring a new router manually.
The following sections describes the options available to prepare your network for the AutoInstall
process. Network set up for AutoInstall can also be performed with network management applications
such as the AutoInstall Manager in CiscoWorks software. For details on other ways to set up the
AutoInstall process, refer to the documentation for your application, or search for Network Management
information on Cisco.com.
Understanding AutoInstall
There are two basic approaches to preparing your network for AutoInstall. One approach is to create a
minimal configuration file that provides just enough configuration information to allow you to Telnet to
the new router and configure it manually. The other approach is to create a host-specific configuration
file for each new router containing all of the necessary configuration information. In each case, the
configuration file should be created and stored on a TFTP server on the network prior to connecting the
new router.
Before the new router can attempt to download a configuration file, however, it must acquire an IP
address. This means that a service must be available on the network to provide an IP address to the new
router. Your choice of service will determine which interface port on the new router should be connected
to the network.
AutoInstall is supported over Ethernet, Token Ring, and FDDI interfaces for LANs and serial interfaces
with High-Level Data Link Control (HDLC) encapsulation or serial interfaces with Frame Relay
encapsulation for WANs. If a LAN interface is used, AutoInstall will attempt to acquire an IP address
for the attached interface using Dynamic Host Configuration Protocol (DHCP) requests, Bootstrap
Protocol (BOOTP) requests, or Reverse Address Resolution Protocol (RARP) requests. If a serial
interface with HDLC encapsulation is connected, AutoInstall will attempt to acquire an IP address for
the attached interface using Serial Line Address Resolution Protocol (SLARP). Table 8 summarizes this
information.
Note Cisco IOS Release 12.2 replaces the use of BOOTP with DHCP for LAN interfaces in AutoInstall.
DHCP (defined in RFC 2131) is based on BOOTP, which provides the framework for passing
configuration information to hosts on a TCP/IP network. DHCP adds the capability of automatic
allocation of reusable network addresses and additional configuration options. Because AutoInstall
supports RFC 1534 (Interoperation Between DHCP and BOOTP), BOOTP servers can provide limited
responses to DHCP requests sent during the AutoInstall process. Likewise, those routing devices using
BOOTP requests can be serviced by DHCP servers. This interoperability maintains backward
compatibility for your network, and allows for a seamless transition to the newer DHCP-based
AutoInstall process. For further information on BOOTP-based AutoInstall, please see RFC 951, The
Bootstrap Protocol (BOOTP), and the Cisco IOS Configuration Fundamentals Configuration Guide for
Release 12.1 or earlier releases.
When the AutoInstall process begins, the new router will send DHCP, BOOTP, and RARP requests out
any attached interfaces. AutoInstall will use the first available method for configuration. If all LAN
interface requests fail, AutoInstall will attempt to configure an available serial interface using SLARP.
Note Of Token Ring interfaces, only those that set ring speed with physical jumpers support AutoInstall.
AutoInstall does not work with Token Ring interfaces for which the ring speed must be set with software
configuration commands. If the ring speed is not set, the interface is set to shutdown mode.
In addition to a TFTP server, and a DHCP, BOOTP, RARP, or SLARP server, you may need to configure
other elements in your network to enable AutoInstall, as follows:
• If the new router is not directly connected to the device providing the IP address resolution service,
you will need to configure the intermediate router to forward requests. In this chapter, we refer to
this intermediate router as the staging router. For serial interfaces, a directly attached router
providing a SLARP service is required.
• If you wish to enable the new router to download a host-specific configuration file, you can
configure a Domain Name System (DNS) server on the LAN network to provide the new router with
its hostname. In this case, an IP address-to-hostname mapping for the new router must be added to
the DNS database file prior to beginning AutoInstall. Note that a DNS server is not necessary if you
configure a DHCP server to provide a hostname for the new router and to provide the IP address of
the TFTP server to the new router.
Figure 2 shows a hypothetical network topology that utilizes these various elements and shows an
example of the AutoInstall process.
Console terminal
TFTP server
Router A Router B
Router C
New router Staging router
DNS server
Router D
56540
DHCP server
The following steps outline an example of the AutoInstall process that would be used for the topology
in Figure 2:
1. Router A (the new router) sends a DHCP request out of its attached Ethernet 0 (E0) interface.
2. Router B (the staging router) forwards the request to Router D, which is running a DHCP service.
3. The DHCP server in Router D sends a reply back to Router A. The reply contains a temporary IP
address for the E0 interface on Router A and the IP address of the TFTP server.
4. Router A sends a request for a network configuration file to the TFTP server using the address
acquired in Step 3.
5. The network configuration file downloaded from the TFTP server does not contain an IP address to
hostname mapping for Router A’s new IP address, so Router A sends out a DNS request (forwarded
by Router B) to acquire its new hostname.
6. The DNS server in Router C resolves the IP address of the new router to the hostname “rtr1” and
sends this data to Router A.
7. Router A uses its hostname to send a unicast request to the TFTP server for the host-specific
configuration file “rtr1-confg”, using the address acquired in Step 3.
8. The “rtr1-confg” file is loaded as the running configuration for Router A. The new configuration
contains a permanent IP address assignment, so Router A releases the leased IP address from the
DHCP server (using a DHCPRELEASE message).
Note that these steps are simplified to give an impression of the process flow (for example, the DHCP
request forwarding in steps 1 and 2 actually consist of multiple discover, offer, and request messages).
Note For more information on the Cisco implementation of DHCP, see the “Configuring DHCP” chapter of
the Release 12.2 Cisco IOS IP Configuration Guide.
In this example, the TFTP, DNS, and DHCP services are provided by different devices. However, more
than one service may be enabled on any particular device. For example, the Cisco Server Suite 1000
includes a DHCP/BOOTP server, a DNS server, and a TFTP server all on one platform. Note that you
can enable more than one service (such as a TFTP server and a DNS server) on a Cisco router. The
example in Figure 2 also shows Cisco routers acting as DNS and DHCP servers, but these services can
be provided by any standard workstation. For information on the configuration of this example, see the
“Network Configuration for DHCP-Based AutoInstall Example” section on page 57.
Tip A network management tool can help immensely in implementing features like AutoInstall for complex
networks. One such tool is the Cisco Network Registrar (CNR), which automates common tasks such as
IP address assignment and maintenance to simplify and streamline network administration. CNR
includes robust DNS and DCHP servers and utilities within the program. For more information about
CNR, see http://www.cisco.com/go/cnr/.
Note In this section, the forwarding device is a router. However, any addressable device capable of forwarding
IP packets can be specified as the default first hop.
Figure 3 shows an example of a network topology in which a default router needs to be specified.
(request)
TFTP server
Router B
(reply)
Router
A
DHCP/DNS
server
New
router
Router C
56542
In the example shown in Figure 3, there are multiple routers on the same LAN as the interface
performing Autoinstall. Router C is the router forwarding the TFTP packets from the TFTP server to the
new router, but only Router B is capable of forwarding the TFTP request from the new router to the TFTP
server. In this case, the IP address of Router B should be configured as the default router, using option 3
in the DHCP configuration. The new router will interpret the value of option 3 (specified in the DHCP
configuration) as the next-hop toward the TFTP server during Autoinstall. Option 3 will take effect only
if information (hostname or IP address) for the TFTP server is also returned in the DHCP/BOOTP reply.
Note that option 3 cannot be used to specify the default router for DNS requests. For configuration
details, see the “Specifying the Default Router on a Cisco DHCP Server” section on page 56.
Tip We recommend that configuration files intended for specific hosts be saved with the name
“hostname-confg” or, if using a DOS-based TFTP server, “hostname.cfg”, where hostname is the name
of the intended routing device. The hostname specified in the configuration file should match the
filename.
Default network configuration files should have IP address to hostname mappings (using ip host ip
address hostname command line entries).
In general, AutoInstall will attempt to download “-confg” files first, then “.cfg” files. AutoInstall will
attempt to download default configuration files in the following order:
• “network-confg”
• “cisconet.cfg”
• “router-confg”
• “router.cfg”
• “ciscortr.cfg”
The request cycle is repeated three times.
When the AutoInstall process begins, the new router will attempt to acquire an IP address for the
connected interface.
The new router will send DHCP discover packets out all attached LAN interfaces to determine if a DHCP
server is available. If an offer is returned from a DHCP server, the new router will act as a DHCP client
and send a DHCP request. If more than one offer is returned, the first is used.
If a response is returned first from a BOOTP server, or a DHCP server is not available, the DHCP client
in AutoInstall will use the BOOTP information to continue the AutoInstall process. Because DHCP is
an extension to BOOTP, the DHCP client in AutoInstall can interpret BOOTP replies. Prior to Cisco IOS
Release 12.1(5)T, the TFTP identifier (specified in the siaddr or sname field) and bootfile name
(specified in the file field) in BOOTP server replies were ignored. If you have configured the TFTP
identifier and bootfile name to be provided by the BOOTP server, this information can now be used by
the DHCP AutoInstall process to perform unicast TFTP uploading of configuration files.
Note The MAC address of the new router must be mapped on a DHCP, BOOTP, or RARP server to an IP
address for the new router prior to starting the AutoInstall process over a LAN interface.
If a DHCP server responds, any or all of the following information can be returned to the new router:
• The IP address (yiaddr) and subnet mask (option 1) to be assigned to the interface on the new router
(the values in parenthesis in this section represent the field names for the packet as defined in the
relevant RFCs). The following lines will be written to the configuration of the new router:
interface <type><number>
ip address dhcp
• The address of the TFTP server (siaddr) to be used for AutoInstall requests.
• The name of the configuration file (file or option 67) to be requested from the TFTP server.
• The IP address of the TFTP server (option 150).
• The hostname of the TFTP server (option 66 or sname). Typically either the TFTP address or name
is specified, not both. If only the name of the TFTP server is specified, a DNS server must be
available to translate the name to an IP address.
• The IP addresses of up to two DNS name servers (option 6). You should configure this option to be
returned from the DHCP server only if the DNS server is in the same LAN as the interface
performing AutoInstall.
• The IP address of the staging router (option 3). This option is provided for those cases in which the
TFTP server is not on the same LAN segment as the new router, or if the network topology requires
the use of a specific router. The staging router address is used to specify which router the AutoInstall
TFTP requests should be sent through (in other words, the “first hop” router). This staging router is
also referred to as the “default” or “helper” router. Only one staging router can be specified.
The TFTP server IP address can be deduced from the following sources, from the highest priority to the
lowest: the sname field, option 66, option 150, or the siaddr field. If only the sname or option 66 values
are returned to the new router, a DNS server must be available to resolve the IP address.
Tip The most efficient method is to configure the IP address of the TFTP server (option 150) to be available
on the DHCP server.
If a DHCP server is not available on the network and the sname or siaddr information is not available
from a BOOTP server, the new router will use the BOOTP-based AutoInstall process described in the
Release 12.1 Cisco IOS Configuration Fundamentals Configuration Guide.
After an IP address is assigned to the interface on the new router, the AutoInstall process will send a
DNS request for the corresponding hostname. Likewise, if the new router is assigned a hostname, the
AutoInstall process will send a DNS request for the corresponding IP address.
After acquiring an IP address for the interface on the new router, the AutoInstall process will initiate
attempts to download a configuration file. This is the second phase of the AutoInstall process for LAN
interfaces.
The new router will automatically attempt to download a configuration file using one of the following
methods:
• If the host-specific configuration file (bootfile) name was specified by the DHCP server, that
specific filename is used in the TFTP request. The new router will make three unicast TFTP requests
for the specified bootfile. If the unicast attempts fail, or if a TFTP server address was not provided,
the new router will make three broadcast requests to any available TFTP server for the specified
bootfile.
• If the specified bootfile can not be located, or the new router was not provided a specific bootfile
name by the DHCP server, AutoInstall will unicast or broadcast TFTP requests for a default network
configuration file. The files requested are first for “network-confg” then for “cisconet.cfg”. The
default network configuration file should have IP address to hostname mappings using ip host ip
address hostname entries. If a command line entry for the IP address of the new router is not
included in the configuration file, AutoInstall will attempt to resolve its hostname using a DNS
query. If the new router can determine its hostname, a TFTP request will then be sent for the
“hostname-confg” or “hostname.cfg” file. The hostname variable is replaced by the first eight
characters of the new router’s hostname. If the new router is unable to map its IP address to a
hostname, AutoInstall will send TFTP requests for the default configuration file “router-confg” or
“router.cfg.”
Note The default configuration file (“router-confg” or “router.cfg”) typically sets the hostname of the new
router to “router” and provides just enough configuration information to allow further remote
configuration by a system administrator.
Table 9 shows the type of TFTP requests made by the new router using AutoInstall. The type of TFTP
request depends on the availability of the TFTP server name or address and the host-specific
configuration filename.
Host-Specific Router
TFTP Server Address Configuration Filename
Available? Available? TFTP Request Method
Yes Yes Unicast request for the host-specific router
configuration file to the specified TFTP server.
Yes No Unicast request for a default router configuration
file to the specified TFTP server.
No Yes Broadcast request for the host-specific router
configuration file to any available TFTP server
No No Broadcast request for a default router
configuration file to any available TFTP server.
Essentially, if the TFTP address is known, the router can send a unicast TFTP request for a configuration
file, and if the host-specific configuration filename is known, the router can request the host-specific
configuration file from the TFTP server. If the TFTP address is not known, the router can send a
broadcast TFTP request, and if the configuration filename is not known, the router can request the
default configuration file.
The TFTP server address can be deduced from the following sources:
• The sname field of a DHCP or BOOTP reply
• The TFTP server name (option 66) field of a DHCP reply
• The TFTP server address (option 150) field of a DHCP reply
For AutoInstall over a serial interface, a staging router must be directly connected to the new router using
the serial 0 (S0) interface port.
SLARP reply
56543
In Figure 4, the IP address of the Serial 0 interface on the staging router (Router B) is 192.168.10.1.
AutoInstall therefore assigns the IP address 192.168.10.2 to the Serial 0 interface of the new router.
Note If you are using AutoInstall over HDLC, the last 8 bits of host portion of the IP address on the staging
router must equal 1 or 2.
After acquiring an IP address acquired from the RARP, DHCP, or BOOTP server, the new router will
attempt to resolve its hostname from a network configuration file or from a DNS service.
The new router will first attempt to resolves its IP address-to-hostname mapping by sending a TFTP
broadcast requesting the file “network-confg” or “cisconet.cfg”.
The network configuration file is a configuration file generally shared by several routers. In this case, it
is used to map the IP address of the new router to the name of the new router. The network configuration
file must reside on a reachable TFTP server and must be globally readable. For example, to assign a
hostname of “rtr1” to a new router with the address 192.168.10.2, the following line must appear in the
network configuration file:
ip host rtr1 192.168.10.2
If the new router cannot locate and download a “network-confg” or a “cisconet.cfg” file, or if the IP
address-to-hostname mapping does not match the newly acquired IP address, the new router sends a DNS
broadcast request. If a DNS server is available and has an entry that maps the acquired IP address of the
new router to its name, the new router successfully resolves its name.
If DNS does not have an entry that maps the new router’s address to its name, the new router cannot
resolve its hostname. The new router will then attempt to download a default configuration file
(“router-confg”, “router.cfg”, or “ciscortr.cfg”) from the TFTP server. If this attempt also fails, the router
will enter Setup mode, or, if using Frame Relay-based AutoInstall, will enter user EXEC mode.
To set up AutoInstall using an Ethernet, Token Ring, or FDDI interface, you must modify the
configuration of the staging router. To configure the staging router to forward requests from the new
router using a LAN interface connection, use the following commands beginning in global configuration
mode:
Command Purpose
Step 1 Router(config)# interface {ethernet | tokenring | Enters interface configuration mode for the specified
fddi} [slot/]port LAN interface.
Step 2 Router(config-if)# ip address address mask Specifies an IP address for the interface.
Step 3 Router(config-if)# ip helper-address address Specifies the destination broadcast or host address for
TFTP server, BOOTP server, and DNS server requests.
A separate ip helper-address command is needed for
each server if they are on different hosts. You can also
configure multiple TFTP server targets by using
multiple ip helper-address commands.
Command Purpose
Step 4 Router(config-if)# ^Z Exits to EXEC mode.
Step 5 Router# copy running-config startup-config Saves the running configuration to the startup
configuration file.
Typically, the LAN interface and IP address are already configured on the existing router.
In the following example, the configuration file for the staging router contains the commands needed to
configure the router for AutoInstall on an Ethernet interface:
Router# show running-config
.
.
.
interface Ethernet 0
ip address 172.31.10.1 255.255.255.0
ip helper-address 172.31.20.5
.
.
.
To set up AutoInstall to use a serial line with HDLC encapsulation (the default for serial interfaces), you
must configure the staging router. To configure the staging router to forward requests from the new
router using a HDLC-encapsulated serial interface connection, use the following commands beginning
in global configuration mode:
Command Purpose
Step 1 Router(config)# interface serial interface-number Configures the serial interface that connects to the new
router with HDLC encapsulation (the default), and
enters interface configuration mode for the specified
interface.
Step 2 Router(config-if)# ip address address mask Enters an IP address for the interface. The host portion
of the address must have a value of 1 or 2. (AutoInstall
over Frame Relay does not have this address constraint.)
Step 3 Router(config-if)# ip helper-address address Specifies the destination broadcast or host address for
TFTP server, BOOTP server, and DNS server requests.
A separate ip helper-address command is needed for
each server if they are on different hosts. You can also
configure multiple TFTP server targets by using
multiple ip helper-address commands.
Step 4 Router(config-if)# clock rate bps (Optional) Configures a DCE clock rate for the serial
line. This step is needed only for DCE appliques.
Step 5 Router(config-if)# ^Z Ends the current configuration session and returns you
to privileged EXEC mode.
Step 6 Router# copy running-config startup-config Saves the running configuration to the startup
configuration file.
In the following example, the configuration file for the staging router contains the commands needed to
configure the router for AutoInstall on a serial line using HDLC encapsulation:
To set up AutoInstall to use a serial line with Frame Relay encapsulation, you must configure the staging
router. To configure the staging router to forward requests from the new router using a Frame
Relay-encapsulated serial interface connection, use the following commands beginning in global
configuration mode:
Command Purpose
Step 1 Router(config)# interface serial slot/port Configures the serial interface that connects to the new
router, and enters interface configuration mode.
Step 2 Router(config-if)# encapsulation frame-relay Configures Frame Relay encapsulation on the interface
that connects to the new router.
Step 3 Router(config-if)# frame-relay map ip ip-address Creates a Frame Relay map pointing back to the new
dlci-number router.
or or
Router(config-if)# frame-relay interface-dlci For point-to-point subinterfaces, assigns a data link
dlci-number [protocol ip ip-address] connection identifier (DLCI) to the interface that
connects to the new router, and provides the IP address
of the serial port on the new router. This command
should be used if the staging router is acting as the
BOOTP server.
Step 4 Router(config-if)# frame-relay intf-type dce Configures a Frame Relay switch type. This step is
required only for DCE appliques.
Step 5 Router(config-if)# ip address address mask Specifies an IP address for the interface. This step sets
the IP address of the existing router.
Step 6 Router(config-if)# ip helper-address address Configures a helper address for the TFTP server.
Step 7 Router(config-if)# clock rate bps (Optional) Configures a DCE clock rate for the serial
line. This step is needed only for DCE appliques.
Step 8 Router(config-if) keepalive [seconds] (Optional) Configures the keepalive interval, which is
the frequency at which the Cisco IOS software sends
messages to itself (for Ethernet and Token Ring) or to
the other end (for serial) to ensure a network interface
is “up.”
Step 9 Router(config-if)# ^Z Ends the current configuration session and returns you
to privileged EXEC mode.
Step 10 Router# copy running-config startup-config Saves the running configuration to the startup
configuration file.
You must use a DTE interface on the new router because the network always provides the clock signal.
In the following example, the configuration file for the staging router contains the commands needed to
configure the router for Frame Relay-based AutoInstall on a serial line:
Router# show running-config
.
.
.
interface serial 0
ip address 172.31.20.20 255.255.255.0
encapsulation frame-relay
!In the following command, 172.31.10.1 is the IP address of the new router’s interface
!and 48 is the PVC identifier
frame-relay map ip 172.31.10.1 255.255.255.0 48 dlci
ip helper-address 172.31.20.5
.
.
.
Note The configuration tasks used in this section use manual bindings for DHCP address allocation, which
requires you to enter the MAC address for the new router. However, you can also use the automatic
binding available for DHCP. For complete DHCP configuration details, refer to the “Configuring DHCP”
chapter of the Release 12.2 Cisco IOS IP Configuration Guide.
You have the option of configuring the DHCP server to provide a specific configuration filename to be
used by the DHCP client during the AutoInstall process. When you associate the MAC address of a new
router with a specific configuration file, AutoInstall will be able to request this file from the TFTP server.
To determine the name of the specific configuration file, the DHCP client will examine the “file” field
of the DHCP/BOOTP reply, or, if there is an option overload of the “file” field, at the value of option 67.
When a configuration file (bootfile) is specified, this configuration file should be in the /tftpboot
directory of the TFTP server.
Tip We recommend that configuration files intended for specific hosts be saved with the name
“hostname-confg” or, if using a DOS-based TFTP server, “hostname.cfg”, where hostname is the name
of the intended routing device. The hostname specified in the configuration file should match the
filename.
To specify the name of the configuration file to be used by the DHCP client, use the following commands
on the Cisco routing device running the DHCP server beginning in global configuration mode:
Command Purpose
Step 1 Router(config)# service dhcp Enables the DHCP server on your routing device.
Step 2 Router(config)# ip dhcp pool identifier Specifies a pool to be used for DHCP address allocation, and
enters DHCP pool configuration mode. The identifier
argument is the alphanumeric “name” of the DHCP pool to
be configured.
Step 3 Router(config-dhcp)# host address Specifies the IP address to be assigned to the DHCP client.
[mask | /prefix-length]
Step 4 Router(config-dhcp)# hardware-address Specifies the MAC address of the DHCP client.
hardware-address [type]
Step 5 Router(config-dhcp)# bootfile filename Specifies the name of the configuration file that the DHCP
client should download from the TFTP server.
There are two ways of configuring the DHCP server to return the IP address of the TFTP server to be
used by the DHCP client during AutoInstall: by specifying the siaddr field or option 150. The
recommended method is to configure the DHCP server to return a value for option 150.
To configure the value for option 150, use the following commands on the Cisco routing device running
the DHCP server beginning in global configuration mode:
Command Purpose
Step 1 Router(config)# ip dhcp pool identifier Specifies a pool to be used for DHCP address allocation and
enters DHCP pool configuration mode. The identifier
argument is the alphanumeric “name” of the DHCP pool to
be configured.
Step 2 Router(config-dhcp)# host address Specifies the IP address to be assigned to the DHCP client.
[mask | /prefix-length]
Command Purpose
Step 3 Router(config-dhcp)# hardware-address Specifies the MAC address of the DHCP client.
MAC-address [type]
Step 4 Router(config-dhcp)# option 150 ip address Specifies the IP address of the TFTP server (option 150) to
be used by the DHCP client.
To configure the value to be returned in the siaddr field, use the following commands on the Cisco
routing device running the DHCP server beginning in global configuration mode:
Command Purpose
Step 1 Router(config)# ip dhcp pool identifier Specifies a pool to be used for DHCP address allocation and
enters DHCP pool configuration mode. The identifier is the
alphanumeric “name” of the DHCP pool to be configured.
Step 2 Router(config-dhcp)# host address Specifies the IP address to be assigned to the DHCP client.
[mask | /prefix-length]
Step 3 Router(config-dhcp)# hardware-address Specifies the MAC address of the DHCP client.
MAC-address [type]
Step 4 Router(config-dhcp)# next-server address Specifies the IP address of the TFTP server (ipaddr) to be
[address2...address8] used by the DHCP client. The [address2...address8]
syntax indicates that more than one TFTP server (up to
eight) can be specified if you want to configure backup
TFTP servers.
The alternative to specifying the IP address of the TFTP server to be used during AutoInstall is to specify
the hostname of the TFTP server. This information can be returned to the DHCP client in the sname field
of a BOOTP reply or in the option 66 field of a DHCP reply. If only the TFTP server name is to returned,
a DNS server must be available to the new router to translate the TFTP server name to an IP address.
To configure the DHCP server to return the TFTP server name as option 66, use the following commands
on the Cisco routing device running the DHCP server, beginning in global configuration mode:
Command Purpose
Step 1 Router(config)# ip dhcp pool identifier Specifies a pool to be used for DHCP address allocation and
enters DHCP pool configuration mode. The identifier
argument is the alphanumeric “name” of the DHCP pool to
be configured.
Step 2 Router(config-dhcp)# host ip-address Specifies the IP address to be assigned to the DHCP client.
[mask | /prefix-length]
Step 3 Router(config-dhcp)# hardware-address Specifies the MAC address of the DHCP client.
hardware-address [type]
Step 4 Router(config-dhcp)# option 66 ascii Specifies the TFTP server name (option 66) to be returned
tftp-server-name to the DHCP client for use in the AutoInstall process. The
TFTP server name should be a Fully Qualified Domain
Name (FQDN).
To specify the DNS sever that should be used during the AutoInstall process, use the following command
on the DHCP server in DHCP pool configuration mode:
Command Purpose
Router(dhcp-config)# dns-server address Specifies the IP address of the DNS server to use to
resolve hostnames during the AutoInstall process.
In cases where more than one router is connected to new router, you may need to specify a default router
through which the new router running AutoInstall should send TFTP and DNS requests. To configure
the DHCP server to return this information to the DHCP client, use the following command on the DHCP
server in DHCP pool configuration mode:
Command Purpose
Router(dhcp-config)# default-router address Specifies the IP address of the router to use as the
first hop for AutoInstall unicast requests.
If the TFTP server IP address can be deduced by AutoInstall and if the default router option is provided,
Autoinstall will recognize that the default router is the first hop toward the TFTP server. If the TFTP
server IP address cannot be deduced, the default router option (if present) will be ignored.
In the following example, the address 10.0.20.20 is specified as the next hop toward the TFTP server
with the address 172.16.1.1:
ip dhcp pool 1
host 10.0.20.54 255.255.255.240
hardware-address 0000.0c59.fcb0
bootfile R1-confg
!option 150 specifies the TFTP server address
option 150 ip 172.16.1.1
default-router 10.0.20.20
Note If you do not respond to the setup prompts, AutoInstall will begin automatically after a short period of
time.
You will see the following display as the AutoInstall operation is in progress:
Please Wait. AutoInstall being attempted!!!!!!!!!!!!!!!!!!!
Typically, additional notifications will be displayed as the process goes through the steps outlined earlier
in this chapter. If the AutoInstall succeeds, and the configuration file contains all of the required
configuration information, the CLI will enter user EXEC mode. After the AutoInstall process is
completed, you should verify that the entire configuration file was downloaded, and that the file is
uncorrupted. This verification can be performed from the console terminal, or by using a Telnet
connection from an external host on the network. You can view the running configuration file using the
show running-config or more system:running-config EXEC mode commands.
After verifying the running configuration, you should save it as the start-up configuration using the
copy running-config startup-config or copy system:running-config nvram:startup-config EXEC
mode command.
If the AutoInstall process fails, or if the configuration file does not contain all of the required
configuration information, the router will remain in Setup mode to allow you to complete the
configuration process. If no input is entered, the new router will continue to issue AutoInstall broadcast
requests to attempt to learn its hostname and acquire IP addresses. The broadcast frequency will dwindle
to every 10 minutes after several attempts.
Console terminal
.1
172.16.2.0
TFTP server
Router A 192.168.2.0 Router B
.1 .4
Console port e0 e0 Router C
New router Staging router .2
DNS server
Router D
56541
.3
DHCP server
Using Setup
Setup (also known as the System Configuration Dialog) is an interactive CLI mode that guides you
through first-time configuration by prompting you for the details needed to start your router functioning
in the network. While Setup mode is a quick and easy way to perform first-time configuration of a router,
you can also use it after first-time startup to perform basic configuration changes, as described in the
following sections:
• Using Setup After First-Time Startup
• Using Streamlined Setup
Before using Setup, you should have the following information so that you can configure the system
properly:
• Which interfaces you want to configure
• Which routing protocols you wish to enable
• Whether the router is to perform bridging
• Network addresses for the protocols being configured
• Password strategy for your environment
Note Refer to the documentation for your particular hardware platform for information on how you should use
Setup for first-time startup.
Note If you use Setup to modify a configuration because you have added to or modified the hardware, be sure
to verify the physical connections using the show version EXEC command. Also, verify the logical port
assignments using the show running-config EXEC command to ensure that you configure the proper
port. Refer to the hardware documentation for your platform for details on physical and logical port
assignments.
To enter Setup mode, use the following command in privileged EXEC mode:
Command Purpose
Router# setup Enters Setup mode.
When you enter the setup EXEC command after first-time startup, an interactive dialog called the
System Configuration Dialog appears on the system console screen. The System Configuration Dialog
guides you through the configuration process. It prompts you first for global parameters and then for
interface parameters. The values shown in brackets next to each prompt reflect either the default settings
or the last configured setting.
You must progress through the System Configuration Dialog until you come to the item that you intend
to change. To accept default settings for items that you do not want to change, press the Return or Enter
key. The default choice is indicated by square brackets (for example, [yes]) before the prompt colon (:).
To exit Setup and return to privileged EXEC mode without making changes and without progressing
through the entire System Configuration Dialog, press Ctrl-C.
The facility also provides help text for each prompt. To access help text, press the question mark (?) key
at a prompt.
When you complete your changes, the system will automatically display the configuration file that was
created during the Setup session. It also asks you if you want to use this configuration. If you answer
Yes, the configuration is saved to NVRAM as the startup configuration file. If you answer No, the
configuration is not saved and the process begins again. There is no default for this prompt; you must
answer either Yes or No.
Note If any problems exist with the configuration file pointed to in NVRAM, or if the ignore NVRAM bit (bit
6) is set in the configuration register, the router enters the streamlined Setup mode. For more information
on the streamlined Setup mode, see the “Using Streamlined Setup” section.
In the following example Setup is used to configure interface serial 0 and to add ARAP and IP/IPX PPP
support on the asynchronous interfaces. Note that prompts and the order in which they appear on the
screen vary depending on the platform and the interfaces installed in the device.
Router# setup
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.
First, would you like to see the current interface summary? [yes]:
!
interface Ethernet0
ip address 172.16.72.2 255.255.255.0
appletalk cable-range 1-1 1.204
appletalk zone Sales
ipx network 1
no mop enabled
!
interface Serial0
no shutdown
no ip address
ip unnumbered Ethernet0
appletalk cable-range 3-3
appletalk zone ZZ Serial
ipx network 3
no mop enabled
!
interface Serial1
no ip address
ip unnumbered Ethernet0
appletalk cable-range 2-2 2.2
appletalk zone ZZ Serial
ipx network 2
no mop enabled
!
Interface Async1
ipx network 4
ip unnumbered Ethernet0
peer default ip address 172.16.72.4
async mode interactive
!
Interface Async2
ipx network 5
ip unnumbered Ethernet0
peer default ip address 172.16.72.5
async mode interactive
!
Interface Async3
ipx network 6
ip unnumbered Ethernet0
peer default ip address 172.16.72.6
async mode interactive
!
Interface Async4
ipx network 7
ip unnumbered Ethernet0
peer default ip address 172.16.72.7
async mode interactive
async dynamic address
!
Interface Async5
ipx network 8
ip unnumbered Ethernet0
peer default ip address 172.16.72.8
async mode interactive
!
Interface Async6
ipx network 9
ip unnumbered Ethernet0
peer default ip address 172.16.72.9
async mode interactive
!
Interface Async7
ipx network A
ip unnumbered Ethernet0
peer default ip address 172.16.72.10
async mode interactive
!
Interface Async8
ipx network B
ip unnumbered Ethernet0
peer default ip address 172.16.72.11
async mode interactive
!
Interface Async9
ipx network C
ip unnumbered Ethernet0
peer default ip address 172.16.72.12
async mode interactive
!
Interface Async10
ipx network D
ip unnumbered Ethernet0
peer default ip address 172.16.72.13
async mode interactive
!
Interface Async11
ipx network E
ip unnumbered Ethernet0
peer default ip address 172.16.72.14
async mode interactive
!
Interface Async12
ipx network F
ip unnumbered Ethernet0
peer default ip address 172.16.72.15
async mode interactive
!
Interface Async13
ipx network 10
ip unnumbered Ethernet0
peer default ip address 172.16.72.16
async mode interactive
!
Interface Async14
ipx network 11
ip unnumbered Ethernet0
peer default ip address 172.16.72.17
async mode interactive
!
Interface Async15
ipx network 12
ip unnumbered Ethernet0
peer default ip address 172.16.72.18
async mode interactive
!
Interface Async16
ipx network 13
ip unnumbered Ethernet0
peer default ip address 172.16.72.19
async mode interactive
!
router igrp 15
network 172.16.0.0
!
end
Building configuration...
Router#
Note The streamlined Setup mode is available only if your router has an RXBOOT ROM image installed. If a
RXBOOT image is not available, the system will enter ROM monitor mode instead.
The streamlined Setup mode differs from the standard Setup mode because streamlined Setup does not
ask you to configure global router parameters. You are prompted only to configure interface parameters,
which permit your router to boot.
As with ROM monitor mode, the configuration information you provide in RXBOOT setup mode is
temporary and exists only so that you can proceed with booting your system. When you reload the
system, your original configuration is left intact. If your startup configuration is corrupted, enter the
setup EXEC command, and configure the basic parameters. Then issue the copy running-config
startup-config EXEC command to write this configuration to NVRAM.
The following example shows a router entering streamlined Setup mode:
--- System Configuration Dialog ---
Note The message “Configuring interface IP parameters for netbooting” only appears if you are booting over
a network server and your configuration has insufficient IP information.
The streamlined Setup mode continues by prompting you for interface parameters for each installed
interface. The facility asks if an interface is in use. If so, the facility then prompts you to provide an IP
address and subnet mask bits for the interface. Enter the subnet mask bits as a decimal value, such as 5.
The following example shows the portion of the streamlined Setup mode that prompts for interface
parameters. In the example, the streamlined Setup mode is prompting for Ethernet 0 interface parameters
and Serial 0 interface parameters:
Cisco ConfigMaker
Cisco ConfigMaker is an easy-to-use Microsoft Windows (95/98/NT) application used to configure a
small network of Cisco routers (800, 1000, 1600, 1700, 2500, 2600, 3600, and 4000 series), switches,
hubs, and other network devices from a single PC. Using Cisco ConfigMaker does not require knowledge
of the Cisco IOS software command-line interface. Cisco ConfigMaker is designed for resellers and
network administrators of small to medium-sized businesses that are familiar with LAN and WAN
fundamentals and basic network design.
ConfigMaker makes configuring an HDLC, Frame Relay, or ISDN wide-area network connection
between routers or the Internet as easy as drawing a network diagram. The tool guides users step-by-step
through network design and addressing tasks and automatically delivers configuration files to individual
routers on the network. ConfigMaker provides a graphical view of the entire network and lets the user
build network diagrams using standard copy/paste, drag/drop, and online editing functions.
ConfigMaker enables the user to monitor router and network configuration status at a glance with simple
color codes.
The Cisco ConfigMaker software download is made available to customers free of charge. For details
about the Cisco ConfigMaker application, and to download a copy of the software, go to
http://www.cisco.com/go/configmaker.
This document first published April 2001. Last updated September 2003.
This chapter describes how to configure operating characteristics for terminals. For a complete
description of the terminal operation commands in this chapter, refer to the “Terminal Operating
Characteristics Commands” chapter in the Release 12.2 Cisco IOS Configuration Fundamentals
Command Reference. To locate documentation of other commands that appear in this chapter, use the
Cisco IOS Command Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Note For additional information about configuring terminal services, see the Release 12.2 Cisco IOS
Terminal Services Configuration Guide and the Release 12.2 Cisco IOS Dial Technologies
Configuration Guide.
Command Purpose
Router> show whoami text Displays information about the terminal line being used for the
current session, including host name, line number, line speed, and
location. If text is included as an argument in the command, that text
is displayed as part of the additional data about the line.
Router> where Lists all open sessions associated with the current terminal line. An
asterisk (*) in the output indicates the current terminal session.
The following example shows sample output of the show whoami command:
Router> show whoami
--More--
Router>
To prevent the information from disappearing from the screen, the show whoami command always
displays a --More-- prompt before returning to the CLI prompt. Press the Spacebar to return to the
prompt.
Command Purpose
Router# terminal ? Lists the commands for setting terminal parameters.
The following example shows sample output for the terminal ? command. Commands available on your
routing device will vary depending on the software image and hardware you are using.
Router> terminal ?
autohangup Automatically hangup when last connection closes
data-character-bits Size of characters being handled
databits Set number of data bits per character
dispatch-character Define the dispatch character
dispatch-timeout Set the dispatch timer
download Put line into 'download' mode
editing Enable command line editing
escape-character Change the current line's escape character
exec-character-bits Size of characters to the command exec
flowcontrol Set the flow control
Throughout this chapter, many terminal settings can be configured for all terminal sessions or for just
the current terminal session. Settings for all terminal sessions are configured in line configuration mode
and can be saved. Settings for the current session are specified using EXEC mode commands that
generally begin with the word terminal.
Command Purpose
Router(config-line)# private Saves local settings between sessions.
If the private line configuration command is not used, user-set terminal parameters are cleared when the
session ends with either the exit EXEC mode command or when the interval set with the exec-timeout
line configuration command has passed.
Ending a Session
To end a session, use the following command in EXEC mode:
Command Purpose
Router> quit Ends the current session.
Refer to the “Managing Connections, Menus, and System Banners” chapter for more information on
ending sessions and closing connections.
Sequences of keys, such as pressing the Control key and another key, then pressing yet another key, are
also sometimes used (for example Ctrl-^, x). However, in each case these keys are referred to as
characters, because each key or combination of keys is represented by a single ASCII character. For a
complete list of available ASCII characters and their decimal and keyboard equivalents, see the “ASCII
Character Set” appendix of the Release 12.2 Cisco IOS Configuration Fundamentals Command
Reference.
Command Purpose
Router(config-line)# escape-character {ascii-number | Changes the system escape character. We recommend the
ascii-character | break | default | none} use of the ASCII characters represented by the decimal
numbers 1 through 30. The escape character can be a single
character (such as ‘), a key combination (such as Ctrl-X), or
a sequence of keys (such as Ctrl-^, X). The default escape
character (key combination) is Ctrl-Shift-6 (Ctrl-^), or
Ctrl-Shift-6, X (Ctrl-^, X).
Router(config-line)# activation-character ascii-number Defines a session activation character. Entering this
character at a vacant terminal begins a terminal session. The
default activation character is the Return key.
Router(config-line)# disconnect-character ascii-number Defines the session disconnect character. Entering this
character at a terminal ends the session with the router.
There is no default disconnect character.
Router(config-line)# hold-character ascii-number Defines the hold character that causes output to the screen to
pause. After this character has been set, a user can enter the
character at any time to pause output to the terminal screen.
To resume output, the user can press any key. To use the hold
character in normal communications, precede it with the
escape character. There is no default hold character.
For most of the commands described, you can reinstate the default value by using the no form. However,
to return the escape character to its default, you should use the escape-character default
line-configuration command.
Note If you are using the autoselect function (enabled using the autoselect line configuration
command), the activation character should not be changed from the default value of Return.
If you change this default, the autoselect feature may not function.
Command Purpose
Router> terminal escape-character ascii-number Changes the system escape sequence for the current session.
The escape sequence indicates that the codes that follow
have special meaning. The default key combination is
Ctrl-Shift-6 (Ctrl-^).
Router> terminal hold-character ascii-number Defines the hold sequence or character that causes output to
the terminal screen to pause for this session. There is no
default sequence. To continue the output, type any character
after the hold character. To use the hold character in normal
communications, precede it with the escape character. You
cannot suspend output on the console terminal.
The terminal escape-character EXEC command is useful, for example, if you have the default escape
character defined for a different purpose in your keyboard file. Entering the escape character followed
by the X key returns the router to EXEC mode when the router is connected to another device.
Command Purpose
Router> terminal telnet break-on-ip Generates a hardware Break signal on the EIA/TIA-232 line
that is associated with a reverse Telnet connection for the
current line and session.
The hardware Break signal occurs when a Telnet Interrupt-Process command is received on that
connection. This command can be used to control the translation of Telnet IP commands into X.25 Break
indications.
This command is also a useful workaround in the following situations:
• Several user Telnet programs send an Interrupt-Process command, but cannot send a Telnet Break
signal.
• Some Telnet programs implement a Break signal that sends an Interrupt-Process command.
Some EIA/TIA-232 hardware devices use a hardware Break signal for various purposes. A hardware
Break signal is generated when a Telnet Break command is received.
Command Purpose
Router> terminal telnet refuse-negotiations Sets the current line to refuse to negotiate full-duplex for the current
session.
Command Purpose
Router> terminal telnet speed default-speed Allows the Cisco IOS software to negotiate transmission speed for
maximum-speed the current line and session.
You can match line speeds on remote systems in reverse Telnet, on host machines that connect to the
network through an access server, or on a group of console lines hooked up to an access server when
disparate line speeds are in use at the local and remote ends of the connection. Line speed negotiation
adheres to the Remote Flow Control option, defined in RFC 1080.
Command Purpose
Router> terminal telnet sync-on-break Causes the Cisco IOS software to send a Telnet Synchronize
signal when it receives a Telnet Break signal on the current line
and session.
Command Purpose
Router> terminal telnet transparent Causes the current terminal line to send a CR signal as a CR
followed by a NULL instead of a CR followed by an LF.
This command ensures interoperability with different interpretations of end-of-line handling in the
Telnet protocol specification.
Command Purpose
Router> terminal download Configures the terminal line to act as a transparent pipe for file transfers.
The terminal download command is equivalent to using all the following commands:
• terminal telnet transparent
• terminal no escape-character
• terminal no hold-character
• terminal no padding 0
• terminal no padding 128
• terminal parity none
• terminal databits 8
Note Setting the EXEC character width to an 8-bit character set can cause failures. If a user on
a terminal that is sending parity enters the help command, an “unrecognized command”
message appears because the system is reading all eight bits, although the eighth bit is not
needed for help.
If you are using the autoselect function, the activation character should be set to the default Return, and
the EXEC character bit should be set to 7. If you change these defaults, the application does not
recognize the activation request.
Command Purpose
Router(config)# default-value exec-character-bits {7 | 8} Specifies the character set used in command characters.
Router(config)# default-value special-character-bits {7 | 8} Specifies the character set used in special characters
such as software flow control, hold, escape, and
disconnect characters.
Command Purpose
Router(config-line)# databits {5 | 6 | 7 | 8} Sets the number of data bits per character that are generated and
interpreted by hardware.
Router(config-line)# data-character-bits {7 | 8} Sets the number of data bits per character that are generated and
interpreted by software.
Router(config-line)# exec-character-bits {7 | 8} Specifies the character set used in EXEC and configuration
command characters on a per-line basis.
Router(config-line)# special-character-bits {7 | 8} Specifies the character set used in special characters (such as
software flow control, hold, escape, and disconnect characters)
on a per-line basis.
Command Purpose
Router> terminal databits {5 | 6 | 7 | 8} Sets the number of data bits per character that are generated and
interpreted by hardware for the current session.
Router> terminal data-character-bits {7 | 8} Sets the number of data bits per character that are generated and
interpreted by software for the current session.
Router> terminal exec-character-bits {7 | 8} Specifies the character set used in EXEC and configuration
command characters on a per-line basis for the current session.
Router> terminal special-character-bits {7 | 8} Specifies the character set used in special characters (such as
software flow control, hold, escape, and disconnect characters)
on a per-line basis for the current session.
Command Purpose
Router(config-line)# padding ascii-number count Sets padding on a specific output character for the specified line.
Command Purpose
Router> terminal padding ascii-number count Sets padding on a specific output character for the specified line
for the current session.
Command Purpose
Router(config-line)# terminal-type {terminal-type} Specifies the terminal type. Any string is accepted for the
terminal-type argument.
This feature is used by TN3270 terminals to identify the keymap and ttycap passed by the Telnet protocol
to the end host.
Specifying the Terminal and Keyboard Type for the Current Session
To specify the type of terminal connected to the current line for the current session, use the following
command in EXEC mode:
Command Purpose
Router> terminal terminal-type terminal-type Specifies the terminal type for the current session.
Indicate the terminal type if it is different from the default of VT100. This default is used by TN3270
terminals for display management and by Telnet and rlogin to inform the remote host of the terminal
type.
To specify the current keyboard type for a session, use the following command in EXEC mode:
Command Purpose
Router> terminal keymap-type keymap-name Specifies the keyboard type for the current session.
You must specify the keyboard type when you use a keyboard other than the default of VT100. The
system administrator can define other keyboard types (using the terminal-type line configuration
command) and provide these names to terminal users.
Command Purpose
Router(config-line)# length screen-length Sets the screen length.
Router(config-line)# width characters Sets the screen width.
Setting the Terminal Screen Length and Width for the Current Session
To set the number of lines or character columns on the current terminal screen for the current session,
use the following commands in EXEC mode, as needed:
Command Purpose
Router> terminal length screen-length Sets the screen length for the current session.
Router> terminal width characters Sets the screen width for the current session.
Command Purpose
Router(config-line)# notify Enables a line to notify users of pending output on another
connection.
Command Purpose
Router> terminal notify Sets up a line to notify a user of pending output for the current
session.
Command Purpose
Router(config-line)# state-machine name state Specifies the transition criteria for the states in a TCP state
firstchar lastchar [nextstate | transmit] machine.
Router(config-line)# dispatch-machine name Specifies the state machine for TCP packet dispatch.
Router(config-line)# dispatch-character Defines a character that triggers packet transmission.
ascii-number [ascii-number2 . . . ascii-number]
Router(config-line)# dispatch-timeout milliseconds Sets the dispatch timer.
Router(config-line)# buffer-length length Specifies the maximum length of the data stream to be
forwarded.
Command Purpose
Router> terminal dispatch-character ascii-number1 Defines a character that triggers packet transmission
[ascii-number2 . . . ascii-number] for the current session.
Command Purpose
Router> terminal flowcontrol {none | software [in | Sets the terminal flow control for this session.
out] | hardware}
Router> terminal start-character ascii-number1 Sets the flow control start character in the current session.
Router> terminal stop-character ascii-number1 Sets the flow control stop character in the current session.
1. This command is seldom used. Typically, you only need to use the terminal flowcontrol command.
Command Purpose
Router(config-line)# lockable Enables a temporary terminal-locking mechanism.
Command Purpose
Router(config-line)# autobaud Configures a line to automatically detect the baud rate.
Note Do not use the autobaud command with the autoselect command.
To start communications using automatic baud detection, use multiple Returns at the terminal.
A 600-, 1800-, or 19200-baud line requires three Returns to detect the baud rate. A line at any other baud
rate requires only two Returns. If you use extra Returns after the baud rate is detected, the EXEC facility
simply displays another system prompt.
Command Purpose
Router(config-line)# insecure Sets the line as a dialup line.
In early releases of Cisco IOS software, any line that used modem control was reported as dialup
connection through the LAT protocol; this command allows more direct control of your line.
Command Purpose
Router> terminal {speed | txspeed | rxspeed} bps Sets the line speed for the current session. Choose from line
speed, transmit speed, or receive speed.
Router> terminal databits {5 | 6 | 7 | 8} Sets the data bits for the current session.
Router> terminal stopbits {1 | 1.5 | 2} Sets the stop bits for the current session.
Router> terminal parity {none | even | odd | space Sets the parity bit for the current session.
| mark}
Command Purpose
Router# terminal monitor Displays debug command output and system error messages in
EXEC mode on the current terminal.
Remember that all terminal parameter-setting commands are set locally and do not remain in effect after
a session is ended. You must use this command at the privileged-level EXEC prompt at each session to
display the debugging messages.
Command Purpose
Router(config-line)# location text Records the location of a serial device.
Command Purpose
Router(config)# terminal-queue entry-retry-interval Changes the retry interval for a terminal port queue.
interval
Command Purpose
Router(config)# printer printername {line number | Configures a printer and specifies a tty line (or lines) for the
rotary number} [newline-convert] device.
If you use the printer command, you also must modify the /etc/printcap file on the UNIX system to
include the definition of the remote printer on the router. Use the optional newline-convert keyword on
UNIX systems that do not handle single character line terminators to convert a new line to a character
Return, line-feed sequence.
The following example includes the configuration of the printer named saturn on the host memphis:
commlpt|Printer on cisco AccessServer:\
:rm=memphis:rp+saturn:\
:sd+/usr/spool/lpd/comm1pt:\
:lf=?var/log/lpd/commlpt:
The content of the actual file may differ, depending on the configuration of your UNIX system.
To print, users use the standard UNIX lpr command.
Support for the LPD protocol allows you to display a list of currently defined printers and current usage
statistics for each printer. To do so, use the following command in EXEC mode:
Command Purpose
Router> show printer Lists currently defined printers and their current usage statistics.
To provide access to LPD features, your system administrator must configure a printer and assign a TTY
line (or lines) to the printer. The administrator must also modify the /etc/printcap file on your UNIX
system to include the definition of the remote printer in the Cisco IOS software.
This chapter describes how to manage connections to other hosts, set banner messages for router users,
and create menus of specific user tasks.
For a complete description of the connections, menu, and system banner commands in this chapter, refer
to the “Connection, Menu, and System Banner Commands” chapter in the Release 12.2 Cisco IOS
Configuration Fundamentals Command Reference. To locate documentation of other commands that
appear in this chapter, use the Cisco IOS Command Reference Master Index or search online
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Managing Connections
To configure connection-management activities that apply to all supported connection protocols,
perform the tasks described in the following sections. All tasks are optional.
• Displaying Current Terminal Characteristics
• Escaping Terminal Sessions and Switching to Other Connections
• Assigning a Logical Name to a Connection
• Changing a Login Name
• Locking Access to a Terminal
• Sending Messages to Other Terminals
• Clearing TCP Connections
• Exiting a Session Started from a Router
• Logging Out of a Router
• Disconnecting a Line
Command Purpose
Router# show terminal Displays current settings for the terminal.
Note In screen output examples that show two caret (^^) symbols together, the first caret represents the
Control key (Ctrl) and the second caret represents the key sequence Shift-6. The double-caret
combination (^^) means hold down the Ctrl key while you press the Shift and the 6 key.
By default, the escape key sequence is Ctrl-Shift-6, X. However, the escape key sequence can be changed
using the escape-character line configuration command. To determine the current setting for the escape
character, use the show terminal EXEC command.
You can have several concurrent sessions open and switch back and forth between them.
The number of sessions that can be open at one time is defined by the session-limit command.
To switch between sessions by escaping one session and resuming a previously opened session, perform
the following steps:
Step 1 Escape out of the current session by pressing the escape key sequence (Ctrl-Shift-6 then X [Ctrl^, X] by
default) and return to the EXEC prompt.
Step 2 Enter the where command to list the open sessions. All open sessions associated with the current
terminal line are displayed.
Step 3 Enter the resume command and the session number to make the connection.
You also can resume the previous session by pressing the Return key.
The Ctrl^, X key combination and the where and resume EXEC commands are available with all
supported connection protocols (for example, Telnet).
Command Purpose
Router# name-connection Assigns a logical name to a connection.
The logical name can be useful for keeping track of multiple connections.
You are prompted for the connection number and name to assign. The where EXEC command displays
a list of the assigned logical connection names.
Command Purpose
Router> login Allows you to log in to the system a second time for the
purposes of changing your login name.
When you enter this command, the system prompts you for a username and password. Enter the new
username and the original password. If the username does not match, but the password does, the
Cisco IOS software updates the session with the new username used by the login command attempt. For
example, assume that a user logged in as user1 needs to change the login name to user2:
Router> login
Username: user2
Password: <letmein>
Router>
In this example, the password letmein is the same password used at the initial login. (The angle brackets
in the example indicate that the password is not displayed on the screen when entered.) At the second
Router> prompt, the user is now logged in as user2.
If no username and password prompts appear, the network administrator did not specify that a username
and password be required at login time. If both the username and password are entered correctly, the
session becomes associated with the specified username.
To access a system with Terminal Access Controller Access Control System (TACACS) security, enter
your login name or specify a TACACS server by using the user@tacacs-server syntax when the
“Username:” prompt appears, as shown in the following steps:
Command Purpose
Step 1 Router> login Allows you to log in to the system a second time for the
purposes of changing your login name.
Step 2 Username: user@tacacs-server Specifies the new username and authenticates the name
with the server specified with the tacacs-server
argument.
Step 3 Password: <password> Specifies the TACACS password for the username
specified in Step 2.
Only the specified host (tacacs-server) is accessed for user authentication information.
In the following example, user2 specifies the TACACS host host1 to authenticate the password:
Router> login
Username: user2@host1
Translating “HOST1”...domain server (131.108.1.111) [OK]
Password: <letmein2>
If you do not specify a host, the router tries each of the TACACS servers in the list until it receives a
response. If you specify a host that does not respond, no other TACACS server will be queried. The
router either will deny access or function, according to the action specified by the tacacs-server
last-resort global configuration command, if it is configured. If you specified a TACACS server host
with the user@tacacs-server argument, the TACACS server specified is used for all subsequent
authentication or notification queries, with the possible exception of Serial Line Internet Protocol (SLIP)
address queries.
For more information on configuring TACACS, refer to the tacacs-server host global configuration
command in the “TACACS, Extended TACACS, and TACACS+ Commands” chapter of the Cisco IOS
Security Command Reference.
For an example of changing a login name, see the “Changing a Login Name Example” section at the end
of this chapter.
The Cisco IOS software honors session timeouts on locked lines. You must clear the line to remove this
feature.
The following is an example of the prompts displayed after the lock command is entered. Note that the
entered password does not appear on screen.
Router# lock
Password:
Again:
Locked
Password:
Router#
Command Purpose
Router# send {line-number | *} Sends a message to other terminals.
The system prompts for the message, which can be up to 500 characters long. Press Ctrl-Z to end the
message. Press Ctrl-C to abort the command.
Command Purpose
Router# clear tcp {line line-number | local host-name port Clears a TCP connection.
remote host-name port | tcb tcb-address}
The clear tcp command is particularly useful for clearing hung TCP connections.
The clear tcp line line-number command terminates the TCP connection on the specified tty line. All
TCP sessions initiated from that tty line are also terminated.
The clear tcp local host-name port remote host-name port command terminates the specific TCP
connection identified by the host name/port pair of the local and remote router.
Disconnecting a Line
Note Avoid disconnecting a line to end a session. Instead, log out of the host to allow the router to clear
the connection. You should disconnect a line only if you cannot log out of an active session (for
example, if the line is stuck or frozen).
Command Purpose
Router# disconnect [connection] Disconnects a line.
Command Purpose
Router(config-line)# vacant-message [d message d] Configures the system to display an idle terminal
message. The argument d indicates any delimiting
character.
Tips Commands requiring a delimiting character (the d argument) are used throughout this chapter. Any
character can be used as the delimiting character, but we recommend the use of the quote sign ("),
because this character is unlikely to be needed within the message itself. Other commonly used
delimiting characters include the percent sign (%) or the forward slash (/), but because these
characters have meanings within certain Cisco IOS commands, they are not recommended. For
example, to set the vacant message to This terminal is idle you would enter the command
vacant-message " This terminal is idle ".
Command Purpose
Router(config-line)# refuse-message d message d Configures the system to display a “line in use”
message. The argument d indicates any delimiting
character.
If you do not define such a message, the user receives a system-generated error message when all lines
are in use. You also can use this message to provide the user with further instructions.
Command Purpose
Router(config-line)# busy-message hostname d message d Configures the system to display a “host failed”
message. The argument d indicates any delimiting
character.
Command Purpose
Router(config)# banner motd d message d Configures the system to display a message-of-the-day
banner. The argument d indicates any delimiting
character.
Command Purpose
Router(config)# banner login d message d Configures the system to display a banner before the
username and password login prompts. The argument d
indicates any delimiting character.
The login banner cannot be disabled on a per-line basis. To globally disable the login banner, you must
delete the login banner with the no banner login command.
Command Purpose
Router(config)# banner exec d message d Configures the system to display a banner whenever an
EXEC process is initiated. The argument d indicates
any delimiting character.
Command Purpose
Router(config)# banner incoming d message d Configures the system to display a banner when there is
an incoming connection to a terminal line from a host
on the network. The argument d indicates any
delimiting character.
Command Purpose
Router(config)# banner slip-ppp d message d Configures a SLIP-PPP banner to display a customized
message. The argument d indicates any delimiting
character.
Command Purpose
Router(config-line)# no exec-banner Suppresses the display of MOTD and EXEC banners.
Router(config-line)# exec-banner Reinstates the display of the EXEC or MOTD banners.
Router(config-line)# no motd-banner Suppresses the display of MOTD banners.
Router(config-line)# motd-banner Reinstates the display of the MOTD banners.
These commands determine whether the router will display the EXEC banner and the MOTD banner
when an EXEC session is created. These banners are defined with the banner motd and banner exec
global configuration commands. By default, the MOTD banner and the EXEC banner are enabled on all
lines.
Disable the EXEC and MOTD banners using the no exec-banner command.
The MOTD banners can also be disabled by the no motd-banner line configuration command, which
disables MOTD banners on a line. If the no exec-banner command is configured on a line, the MOTD
banner will be disabled regardless of whether the motd-banner command is enabled or disabled.
Table 11 summarizes the effects of the combination of the exec-banner command and the motd-banner
command.
For reverse Telnet connections, the EXEC banner is never displayed. Instead, the incoming banner is
displayed. The MOTD banner is displayed by default, but it is disabled if either the no exec-banner
command or no motd-banner command is configured. Table 12 summarizes the effects of the
combination of the exec-banner command and the motd-banner command for reverse Telnet
connections.
Creating Menus
A menu is a displayed list of actions from which a user can select without needing to know anything
about the underlying command-level details. A menu system (also known as a user menu) effectively
controls the functions a user can access. Figure 6 illustrates the parts that make up a typical menu.
Item
selection
S3128
text
Any user that can enter configuration mode can create menus. Remember the following guidelines when
you create menus:
• Each menu item represents a single user command.
• The menu system default is a standard “dumb” terminal that only displays text in a
24-line-by-80-column format.
• A menu can have no more than 18 menu items. Menus containing more than 9 menu items are
automatically configured as single-spaced menus; menus containing 9 or fewer menu items are
automatically configured as double-spaced menus, but can be configured as single-spaced menus
using the menu single-space global configuration command. (For more information about menu
display configuration options, see the section “Specifying Menu Display Configuration Options”
later in this chapter.)
• Item keys can be numbers, letters, or strings. If you use strings, you must configure the menu
line-mode global configuration command.
• When you construct a menu, always specify how a user exits a menu and where the user goes. If you
do not provide an exit from a menu—such as with the menu-exit command (described in the section
“Specifying the Underlying Command for the Menu Item” later in this chapter), the user will be
trapped.
The exec-timeout line configuration command can be used to close and clean up an idle menu; the
session-timeout command can be used to clean up a menu with an open connection.
Command Purpose
Router(config)# menu menu-name title d title d Specifies the title for the menu. The argument d
indicates any delimiting character.
The following example specifies the title that is displayed when the OnRamp menu is selected. The
following four main elements create the title:
• The menu title command
• Delimiter characters that open and close the title text
• Escape characters to clear the screen (optional)
• Title text
The following example shows the command used to create the title for the menu shown in Figure 6:
Router(config)# menu OnRamp title %^[[H^[[J
Enter TEXT message. End with the character '%'.
Welcome to OnRamp Internet Services
You can position the title of the menu horizontally by preceding the title text with blank characters. You
can also add lines of space above and below the title by pressing Enter.
In this example, the title text consists of the following elements:
• One-line title
• Space
• Two-line menu instruction banner
Title text must be enclosed within text delimiter characters—the percent sign character (%) in this
example. Title text delimiters are characters that do not ordinarily appear within the text of a title, such
as slash (/), double quote ("), or tilde (~). You can use any character that is not likely to be used within
the text of the title as delimiter characters. Ctrl-C is reserved for special use and should not be used in
the text of the title.
This title text example also includes an escape character sequence to clear the screen before displaying
the menu. In this case the string ^[[H^[[J is an escape string used by many VT100-compatible terminals
to clear the screen. To enter it, you must enter Ctrl-V before each escape character (^[).
You can also use the menu clear-screen global configuration command to clear the screen before
displaying menus and submenus, instead of embedding a terminal-specific string in the menu title. This
option uses a terminal-independent mechanism based on termcap entries defined in the router and the
terminal type configured for the user terminal. The menu clear-screen command allows the same menu
to be used on multiple types of terminals instead of terminal-specific strings being embedded within
menu titles. If the termcap entry does not contain a clear string, the menu system inserts 24 new lines,
causing all existing text to scroll off the top of the terminal screen.
To clear the screen before displaying the menu, use the following command in global configuration
mode:
Command Purpose
Router(config)# menu menu-name clear-screen Specifies screen clearing before displaying menus and
submenus.
The following example clears the screen before displacing the OnRamp menu or a submenu:
Router(config)# menu OnRamp clear-screen
Command Purpose
Router(config)# menu menu-name prompt d prompt d Specifies the prompt for the menu. The argument d
indicates any delimiting character.
Command Purpose
Router(config)# menu menu-name text menu-item menu-text Specifies the text for the menu item.
The following example specifies the text that is displayed for the three entries in the OnRamp menu:
Router(config)# menu OnRamp text 1 Read email
Router(config)# menu OnRamp text 2 UNIX Internet Access
Router(config)# menu OnRamp text 9 Exit menu system
You can provide access to context-sensitive help by creating a “help server” host and using a menu entry
to make a connection to that host.
Menu selection keys need not be contiguous. You can provide consistency across menus by assigning a
particular number, letter, or string to a special function—such as Help or Exit—regardless of the number
of menu entries in a given menu. For example, menu entry H could be reserved for help across all menus.
When more than nine menu items are defined in a menu, the menu line-mode and menu single-space
global configuration commands are activated automatically. The commands can be configured explicitly
for menus of nine items or fewer. For more information on these commands, see the section “Specifying
Menu Display Configuration Options” later in this chapter.
Command Purpose
Router(config)# menu menu-name command menu-item command Specifies the command to be performed when the menu
item is selected.
The following example specifies the commands that are associated with the three entries in the OnRamp
menu:
Router(config)# menu OnRamp command 1 rlogin mailsys
Router(config)# menu OnRamp command 2 rlogin unix.cisco.com
Router(config)# menu OnRamp command 9 menu-exit
The menu-exit command is available only from within menus. This command provides a way to return
to a higher-level menu or to exit the menu system.
When a menu item allows you to make a connection, the menu item should also contain entries that can
be used to resume connections; otherwise, when you try to escape from a connection and return to the
menu, there is no way to resume the session. It will sit idle until you log out.
You can build the resume connection EXEC command into a menu entry so that the user can resume a
connection, or you can configure the line using the escape-char none command to prevent users from
escaping their sessions.
To specify connection resumption as part of the menu item command, use the following command in
global configuration mode:
Command Purpose
Router(config)# menu menu-name command menu-item resume Specifies that the resume command will be performed
[connection] /connect [connect string] when the menu item is selected.
Embedding the resume command within the menu command permits a user to resume the named
connection or make another connection using the specified name, if there is no active connection by that
name. As an option, you can also supply the connect string needed to connect initially. When you do not
supply this connect string, the command uses the specified connection name.
You can use the resume command in the following menu entries:
• Embedded in a menu entry
• As a separate, specific menu entry
• As a “rotary” menu entry that steps through several connections
In the following example, the resume command is embedded in the menu command so that selecting
the menu item either starts the specified connection session (if one is not already open) or resumes the
session (if one is already open):
Router(config)# menu Duluth text 1 Read email
Router(config)# menu Duluth command 1 resume mailsys /connect rlogin mailsys
In the following example, the resume command is used in a separate menu entry (entry 3) to resume a
specific connection:
Router(config)# menu Duluth text 3 Resume UNIX Internet Access
Router(config)# menu Duluth command 3 resume unix.cisco.com
You use the resume/next command to resume the next open connection in the user list of connections.
This command allows you to create a single menu entry that advances through all of the user
connections. To specify resume/next connection resumption as part of the menu item command, use the
following command in global configuration mode:
Command Purpose
Router(config)# menu menu-name command menu-item Specifies resume/next connection resumption.
resume/next
The following example shows a menu entry (entry 6) created to advance through all of the user
connections:
Router(config)# menu Duluth text 6 Resume next connection
Router(config)# menu Duluth command 6 resume/next
Command Purpose
Router(config)# menu menu-name default menu-item Specifies the command to be performed when the menu
users does not select a menu item.
Creating a Submenu
To create submenus that are opened by selecting a higher-level menu entry, use the menu command to
invoke a menu in a line menu entry. To specify a submenu item command, use the following commands
in global configuration mode:
Command Purpose
Step 1 Router(config)# menu menu-name text menu-item Specifies the menu item that invokes the submenu.
menu-text
Step 2 Router(config)# menu menu-name command menu-item Specifies the command to be used when the menu item
menu menu-name2 is selected.
Step 3 Router(config)# menu menu-name title delimiter Specifies the title for the submenu.
menu-title delimiter
Step 4 Router(config)# menu menu-name text menu-item Specifies the submenu item.
menu-text
Step 5 Router(config)# menu menu-name command menu-item Specifies the command to be used when the submenu
command item is selected. Repeat this command as needed.
The following example specifies that the menu item (entry 8) activates the submenu in the OnRamp
menu:
Router(config)# menu OnRamp text 8 Set terminal type
The following example specifies the command that is performed when the menu item (entry 8) is
selected in the OnRamp menu:
Router(config)# menu OnRamp command 8 menu Terminals
The following example specifies the title for the Terminals submenu:
Router(config)# menu Terminals title /
Supported Terminal Types
The following example specifies the submenu items for the Terminals submenu:
Router(config)# menu Terminals text 1 DEC VT420 or similar
Router(config)# menu Terminals text 2 Heath H-19
Router(config)# menu Terminals text 3 IBM 3051 or equivalent
Router(config)# menu Terminals text 4 Macintosh with gterm emulator
Router(config)# menu Terminals text 9 Return to previous menu
The following example specifies the commands associated with the items in the Terminals submenu:
Router(config)# menu Terminals command 1 term terminal-type vt420
Router(config)# menu Terminals command 2 term terminal-type h19
Router(config)# menu Terminals command 3 term terminal-type ibm3051
Router(config)# menu Terminals command 4 term terminal-type gterm
Router(config)# menu Terminals command 9 menu-exit
When you select entry 8 on the main menu, the following Terminals submenu appears:
2 Heath H-19
Note If you nest too many levels of menus, the system displays an error message on the terminal and
returns to the previous menu level.
Command Purpose
Router(config)# menu menu-name command menu-item command Specifies the command to be used when the hidden
menu entry is selected.
The following example shows the command associated with the submenu entry in the OnRamp menu:
Router(config)# menu OnRamp command 7 show whoami
If additional text is appended to the show whoami command, that text is displayed as part of the data
about the line. For example, the hidden menu entry created by the command
Router(config)# menu OnRamp command 7 show whoami Terminals submenu of OnRamp Internet
Access menu
To prevent the information from being lost if the menu display clears the screen, this command always
displays a --More-- prompt before returning.
Command Purpose
Router(config)# menu menu-name line-mode Configures the menu to use line mode for entering
menu items.
The line-mode option is invoked automatically when more than nine menu items are defined, but it can
also be configured explicitly for menus of nine items or fewer.
In order to use strings as selection keys, you must enable the menu line-mode command.
Command Purpose
Router(config)# menu menu-name single-space Configures the specified menu to display single-spaced.
To display the status-line option, use the following command in global configuration mode:
Command Purpose
Router(config)# menu menu-name status-line Configures the specified menu to display a status line.
Command Purpose
Router(config)# menu menu-name options menu-item pause Configures the system to pause after the specified menu
item is selected by the user. Enter this command once
for each menu item that pauses.
Router(config)# menu menu-name options menu-item login Configures the specified menu item to require a login
before executing the command. Enter this command
once for each menu item that requires a login.
Command Purpose
Router# menu menu-name Invokes a preconfigured user menu.
You can define menus containing privileged EXEC commands, but users must have privileged access
when they start up the menu.
To ensure that a menu is automatically invoked on a line, make sure the menu does not have any exit
paths that leave users in an interface they cannot operate, then configure that line with the autocommand
menu menu-name line configuration command. (The autocommand menu menu-name command
configures the line to automatically execute the menu menu-name command when a user initiates a
connection over that line.)
Menus also can be invoked on a per-user basis by defining an autocommand command for that local
username.
1 Read email
Command Purpose
Router(config)# no menu menu-name Deletes the menu by specifying the menu name.
In order to use the menu again, you must reconfigure the entire menu.
The following example deletes the OnRamp menu from the configuration:
Router(config)# no menu OnRamp
Next, the user attempts the login change again, with the username user2, but enters the correct (original)
password. This time the password matches the current login information, the login username is changed
to user2, and the user is allowed access to the EXEC at the user-level.
Router> login
Username: user2
Password:
Router>
Router# send *
Enter message, end with CTRL/Z; abort with CTRL/C:
this is a message^Z
Send message? [confirm]
Router#
***
***
*** Message from tty50 to all terminals:
***
this is a message
Router#
SRTT: 710 ms, RTTO: 4442 ms, RTV: 1511 ms, KRTT: 0 ms
minRTT: 0 ms, maxRTT: 300 ms, ACK hold: 300 ms
The following example clears a TCP connection by specifying its local router host name and port and its
remote router host name and port. The show tcp brief EXEC command displays the local (Local
Address) and remote (Foreign Address) host names and ports to use in the clear tcp EXEC command.
Router# show tcp brief
TCB Local Address Foreign Address (state)
60A34E9C router1.cisco.com.23 router20.cisco.1055 ESTAB
The following example clears a TCP connection using its TCB address. The show tcp brief EXEC
command displays the TCB address to use in the clear tcp EXEC command.
Router# show tcp brief
TCB Local Address Foreign Address (state)
60B75E48 router1.cisco.com.23 router20.cisco.1054 ESTAB
When someone connects to the router, the MOTD banner appears before the login prompt. After the user
logs in to the router, the router will display the EXEC banner or incoming banner, depending on the type
of connection. For a reverse Telnet login, the router will display the incoming banner. For all other
connections, the router will display the EXEC banner.
When a user enters the slip command, that user will see the following banner. Notice that the $(token)
syntax is replaced by the corresponding configuration variable.
Starting SLIP connection from 192.168.69.96 to 172.16.80.8 using a maximum packet size of
1500 bytes...
Telnet Menu
^C
menu new prompt ^C
The Cisco IOS software includes a Web browser user interface (UI) from which you can issue Cisco IOS
commands. The Cisco IOS Web browser UI is accessed from the router home page, and can be
customized for your business environment. For example, you can view pages in different languages and
save them in Flash memory for easy retrieval.This chapter discusses the tasks associated with using and
customizing the Cisco Web browser UI.
For a complete description of the Cisco Web browser UI configuration commands in this chapter, refer
to the “Cisco IOS Web Browser User Interface Commands” chapter of the Release 12.2 Cisco IOS
Configuration Fundamentals Command Reference. To locate documentation of other commands that
appear in this chapter, use the Cisco IOS Command Reference Master Index or search online.
Command Purpose
Router(config)# ip http server Enables the HTTP server (web server) on the system.
Command Purpose
Router(config)# ip http authentication {aaa | enable | Specifies how the HTTP server users are authenticated.
local | tacacs}
The ip http authentication command specifies the authentication method to be used for login when a
client connects to the HTTP server. Use of the ip http authentication aaa command option is
recommended. The enable, local, and tacacs methods should be specified using the aaa authentication
login command.
If you do not use this command, the default authentication method is used. The default method of
authentication for the HTTP server is to use the configured “enable” password. The “enable” password
is configured with the enable password global configuration command. If the enable password is used
as the HTTP server login authentication method, the client connects to the HTTP server with a default
privilege level of 15.
Note When the “enable” password is used as the HTTP server login authentication method, any username
entered will be ignored; the server will only verify the “enable” password. This may make it easier for
an attacker to access the router. Because a username and password pair is more secure than using only a
password for authentication, using only “enable” password for authentication is strongly discouraged.
Instead, use of the local or tacacs authentication options, configured as part of a global Authentication,
Authorization, and Accounting (AAA) framework, is recommended.
To configure HTTP access as part of a AAA policy, use the ip http authentication aaa command option.
The “local”, “tacacs”, or “enable” authentication methods should then be configured using the aaa
authentication login command.
For information about adding users into the local username database, refer to the Cisco IOS Security
Configuration Guide.
Command Purpose
Router(config)# ip http access-class {access-list-number | Applies an access list to the HTTP server used by the
access-list-name} Cisco IOS ClickStart software or the Cisco Web
browser user interface.
Command Purpose
Router(config)# ip http port number Assigns a port number to be used by the Cisco Web
browser interface.
Step 1 Enter http://router-name/ in the URL field of your Web browser and press Return . (For example, to
access a Cisco router named cacophony, type http://cacophony/.) The browser then prompts you for the
password.
Step 2 Enter the password. The required password is dependent on the user authentication method configured
for the HTTP server (using the ip http authentication global configuration command).
After entering the password, the browser will display the router home page. An example of a router home
page is shown in shown in Figure 7.
The default privilege level when accessing a router home page is privilege level 15 (global access). If
privilege levels have been configured on the router and you have been assigned a privilege level other
than 15, you must specify the privilege level to access the router home page.
When you specify a privilege level, the Cisco Web Browser UI will display and accept only those
commands that have been defined for your user level. (For more information about privilege levels, see
the “Configuring Passwords and Privileges” chapter in the Release 12.2 Cisco IOS Security
Configuration Guide.)
To access a router Web page for a preassigned privilege level other than the default of 15, perform the
following steps:
Step 1 Enter http://router-name/level/level/exec in the URL field of your Web browser and press Return. For
example, to request access to EXEC mode at user privilege level of 12 on a Cisco router named
cacophony, type http://cacophony/level/12/exec. The browser will then prompt you for your username
and password.
Step 2 Enter your username and password and press Return. The required password is dependent on the user
authentication method configured for the HTTP server. The Web browser will display a Web page
specific to your user privilege level.
Figure 8 The Command Field Web Page for a Router Named example
Argument Description
router-name Name of the router being configured.
level/level (Optional) The privilege level you are requesting at which you are
requesting access.
mode The mode the command will be executed in, such as EXEC,
configuration, or interface.
command The command you want to execute. Replace spaces in the command
syntax with forward slashes. If you do not specify a command in the
URL, your browser will display a web page listing all of the commands
available for the specified command mode.
For example, to execute a show running-configuration EXEC command on a router named example,
you would enter the following in the URL window:
http://example/exec/show/running-configuration
After issuing this command, the Cisco Web browser UI will display the running configuration for the
router.
The difference between entering a command in the Command field and entering a command in the URL
window is that in the URL window, forward slashes should be used instead of spaces in the command
syntax.
Understanding SSIs
SSIs are HTML formatted commands or variables that you insert into HTML pages when you customize
Cisco IOS platform configuration pages for a Web browser. These SSI commands and SSI variables
display Cisco IOS command output and Cisco IOS platform-specific variables.
Note The majority of the customization features in this section are for the ClickStart EZsetup feature for
the Cisco 1000 series, Cisco 1003/1004 series, and Cisco 1005 series routers only.
The Cisco IOS software supports two HTML SSI commands defined for customizing HTML pages: the
SSI EXEC command and the SSI ECHO command. The HTML format of the SSI EXEC command is
<!--#exec cmd=“xxx”-->, and the HTML format of the SSI ECHO command is
<!--#echo var=“yyy”-->. (See the section “Customizing HTML Pages Using SSIs” later in this chapter
for a description of how to use these commands).
In addition to the two SSI commands, the Cisco IOS software supports several SSI variables defined for
customizing HTML pages. SSI variables are used with the SSI ECHO command. One SSI variable is
defined for all Cisco IOS platforms (SERVER_NAME), and other SSI variables are specifically defined
for ISDN, Frame Relay, and asynchronous serial platforms. The format and a description of all the
available SSI variables are provided in Table 14. (See the section “Customizing HTML Pages Using
SSIs” later in this chapter for a description of how to use these SSI variables with the
SSI ECHO command).
The SSI EXEC command is supported on all platforms. The SSI ECHO command, used with SSI
variables, is supported on all platforms listed in Table 14.
Once you have designed a set of HTML pages that include SSIs, you can copy these pages to a Cisco IOS
platform’s Flash memory. When you retrieve these pages from Flash memory and display them using a
Web browser, any SSI command that was designed into these pages will display either Cisco IOS
command output or a current variable or identifier defined in Table 14. For example, the SSI ECHO
command with the variable SERVER_NAME will display the current host name of the HTTP server you
are using, and the SSI ECHO command with the variable EZSETUP_ISDN_SWITCHTYPE will display
the current ISDN switch type you are using.
Using SSIs, you can customize set of HTML pages to appear in languages other than English and copy
these pages to Flash memory on multiple Cisco IOS platforms. When you retrieve these pages from the
Flash memory of a Cisco IOS platform, current variables and identifiers associated with the platform you
are currently using are displayed. SSIs save you from needing to duplicate these international pages
(considered relatively large images that contain 8-bit or multibyte characters) and store them in the
source code for each platform you are using.
The contents that the Web browser receives when the HTML file is retrieved from Flash memory are as
follows:
<HTML>
<HEAD>
<TITLE> SSI EXEC Command Example</TITLE>
</HEAD>
<BODY>
This is an example of the SSI EXEC command
<HR>
USERS:<BR>
<PRE>
</PRE>
<BR>
</BODY>
</HTML>
The contents that the Web browser receives when the HTML file is retrieved from Flash memory are as
follows:
<HTML>
<HEAD>
<TITLE>SSI Echo Command Example</TITLE>
</HEAD>
<BODY>
This is an example of the SSI echo command
<HR>
The name of this server is:<BR>
rain
<BR>
</BODY>
</HTML>
This chapter describes the Cisco IOS File System (IFS) feature, which provides a single interface to all
the file systems available on your routing device, including the following:
• Flash memory file systems
• Network file systems (TFTP, rcp, and FTP)
• Any other endpoint for reading or writing data (such as NVRAM, the running configuration, ROM,
raw system memory, system bundled microcode, Xmodem, Flash load helper log, modems, and BRI
multiplexing device [mux] interfaces)
For a complete description of the IFS commands in this chapter, refer to the “Cisco IOS File System
Commands” chapter in the “File Management Commands” part of the Release 12.2 Cisco IOS
Configuration Fundamentals Command Reference. To locate documentation of other commands that
appear in this chapter, use the Cisco IOS Command Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Understanding IFS
IFS capabilities and benefits are described in the following sections:
• Displaying and Classifying Files
• Platform-Independent Commands
• Minimal Prompting for Commands
• Creating and Navigating Directories
Platform-Independent Commands
With IFS, the file system user interface is no longer platform-specific. Commands have the same syntax,
regardless of which platform is used. Thus, you can use the same commands for all of your routers.
However, not all commands are supported on all platforms and file systems. Because different types of
file systems support different operations, certain commands are not available for all file systems.
Platforms will support commands for the file systems they use.
The following example specifies the file named mill-config on the server named enterprise.cisco.com.
The router uses the username liberty and the password secret to access this server via FTP.
ftp://liberty:[email protected]/mill-config
When referring to a file system instead of a file, use the prefix: form. This form specifies the file system
itself, rather than a file in the file system. Use this form to issue commands on file systems themselves,
such as commands to list the files in a file system or to format the file system.
For example, slot0: can indicate the first Personal Computer Memory Card Industry Association
(PCMCIA) Flash memory card in slot 0.
Note Maintenance Operation Protocol (MOP) servers are no longer supported as file systems.
In all commands, the colon is required after the file system name. However, commands that did not
require the colon previously will continue to be supported, although they will not be available in the
context-sensitive help.
If you use tab completion without specifying any characters, the router uses the first file in the file
system.
Router# show file info nvram:<tab>
Router# show file info nvram:private-config<Enter>
Command Purpose
Router> show file systems Lists the file systems available on your platform. This
command also displays information about each file
system.
Command Purpose
Router> cd filesystem: Sets a default Flash memory device.
The following example sets the default file system to the Flash memory card inserted in slot 0:
cd slot0:
Command Purpose
Router> pwd Displays the current file system.
The following example shows that the default file system is slot 0:
Router> pwd
slot0:
The following example uses the cd command to change the default file system to system and then uses
the pwd command to verify that the default file system was changed:
Router> cd system:
Router> pwd
system:
To display information about files on a file system, use the following commands in EXEC mode, as
needed:
Command Purpose
Router# dir [/all] [filesystem:][filename] Displays a list of files on a file system.
Router# show file systems Displays detailed information about each of the files on
a file system.
Router# show file information file-url Displays information about a specific file.
Router# show file descriptors Displays a list of open file descriptors.
The following example compares the different commands used to display information about files for the
PCMCIA card in the first slot. Notice that deleted files appear in the dir /all command output but not in
the dir command output.
Router# dir slot0:
Directory of slot0:/
Displaying a File
To display the contents of any readable file, including a file on a remote file system, use the following
command in EXEC mode:
Command Purpose
Router# more [/ascii | /binary | /ebcdic] file-url Displays the specified file.
The following example displays the contents of a configuration file on a TFTP server:
Router# more tftp://serverA/hampton/savedconfig
!
! Saved configuration on server
!
version 11.3
service timestamps log datetime localtime
service linenumber
service udp-small-servers
service pt-vty-logging
!
end
Type Platforms
Class A Cisco 7000 series (including the Cisco 7500 series),
Cisco 12000 Gigabit Switch Router (GSR), LS1010
Class B Cisco 1003, Cisco 1004, Cisco 1005, Cisco 2500 series,
Cisco 3600 series, Cisco 4000 series, Cisco AS5200
Class C Cisco MC3810, disk0 of SC3640
Command Purpose
Router# delete [device:]filename Deletes a file from a Flash memory device.
If you omit the device, the router uses the default device specified by the cd EXEC command.
If you attempt to delete the file specified by the CONFIG_FILE or BOOTLDR environment variable, the
system prompts you to confirm the deletion. Also, if you attempt to delete the last valid system image
specified in the BOOT environment variable, the system prompts you to confirm the deletion.
The following example deletes the file named myconfig from a Flash memory card inserted in slot 0:
delete slot0:myconfig
Command Purpose
Step 1 Router# dir /all [filesystem:] Determines the index of the deleted file.
Step 2 Router# undelete index [filesystem:] Restores a deleted file on a Flash memory device.
You must undelete a file by its index because you can have multiple deleted files with the same name.
For example, the “deleted” list could contain multiple configuration files with the name router-config.
You undelete by index to indicate which of the many router-config files from the list to undelete. Use the
dir command with the /all option to learn the index number of the file you want to undelete.
You cannot undelete a file if a valid file with the same name exists. Instead, first delete the existing file
and then undelete the file you want. For example, if you had a file with the name router-config and you
wanted to use a file with the same name that you had previously deleted, you cannot simply undelete the
previous version by index. You must first delete the existing router-config file and then undelete the
previous router-config file by index. You can undelete a file as long as the file has not been permanently
erased with the squeeze EXEC command. You can delete and undelete a file up to 15 times.
The following example recovers the deleted file whose index number is 1 to the Flash memory card
inserted in slot 0:
undelete 1 slot0:
Command Purpose
Router# squeeze filesystem: Permanently deletes all files marked “deleted” on a
Flash memory device.
On Cisco 2600 and 3600 series routers,the entire flash file system needs to be erased once before the
squeeze command can be used. After being erased once, the squeeze command should operate properly
on the flash file system for the rest of the flash file system’s history.
To erase an entire flash file system on a Cisco 2600 or 3600 series router, perform the following steps:
Command Purpose
Router# no partition flash-filesystem: Removes all partitions on the specified flash file
system.
Note The reason for removing partitions is to ensure
that the entire flash file system is erased. The
squeeze command can be used in a flash file
system with partitions after the flash file system
is erased once.
Router# erase filesystem: Erases all of the file on the specified flash file system.
When you issue the squeeze command, the router copies all valid files to the beginning of Flash memory
and erases all files marked “deleted.” At this point, you cannot recover deleted files, and you can now
write to the reclaimed Flash memory space.
Note The squeeze operation can take as long as several minutes because it can involve erasing and
rewriting almost an entire Flash memory space.
Verifying Flash
To recompute and verify the checksum of a file in Flash memory on a Class A Flash file system, use the
verify EXEC command.
No such file
In the following example, the image is deleted. In order to reclaim the space taken up by the deleted file,
the squeeze EXEC command is issued.
Router# delete slot1:c7200-js-mz
Delete filename [c7200-js-mz]?
Delete slot1:c7200-js-mz? [confirm]
Router# squeeze slot1:
All deleted files will be removed. Continue? [confirm]
Squeeze operation may take a while. Continue? [confirm]
Erasing squeeze log
Squeeze of slot1: complete
Router# dir /all slot1:
Directory of slot1:/
No such file
Command Purpose
Router# delete [device:]filename Deletes a file from a Flash memory device.
If you omit the device, the router uses the default device specified by the cd EXEC command.
The following example deletes the file named myconfig from a Flash memory card inserted in slot 0:
delete slot0:myconfig
Command Purpose
Step 1 Router# dir /all [filesystem:] Determines the index of the deleted file.
Step 2 Router# undelete index [filesystem:] Undeletes a deleted file on a Flash memory device.
You must undelete a file by its index because you can have multiple deleted files with the same name.
For example, the “deleted” list could contain multiple configuration files with the name router-config.
You undelete by index to indicate which of the many router-config files from the list to undelete. Use the
dir command with the /all option to learn the index number of the file you want to undelete.
You cannot undelete a file if a valid (undeleted) one with the same name exists. Instead, first delete the
existing file and then undelete the file you want. For example, if you had an undeleted version of the
router-config file and you wanted to use a previous, deleted version instead, you cannot simply undelete
the previous version by index. You must first delete the existing router-config file and then undelete the
previous router-config file by index. You can undelete a file as long as the file system has not been
permanently erased with the erase EXEC command. You can delete and undelete a file up to 15 times.
The following example recovers the deleted file whose index number is 1 to the Flash memory card
inserted in slot 0:
undelete 1 slot0:
To erase a Flash memory device, use the following command in EXEC mode:
Command Purpose
Router# erase filesystem: Erases the Flash file system.
Verifying Flash
To recompute and verify the checksum of a file in Flash memory on a Class B Flash file system, use the
verify EXEC command.
Command Purpose
Router# delete [device:]filename Deletes a file from a Flash memory device.
If you omit the device, the router uses the default device specified by the cd EXEC command.
If you attempt to delete the file specified by the CONFIG_FILE or BOOTLDR environment variable, the
system prompts you to confirm the deletion. Also, if you attempt to delete the last valid system image
specified in the BOOT environment variable, the system prompts you to confirm the deletion.
The following example permanently deletes the file named myconfig from a Flash memory card inserted
in slot 0:
delete slot0:myconfig
Formatting Flash
To format a Class C Flash file system, use the following command in EXEC mode:
Command Purpose
Router# format filesystem Formats a Flash file system.
If you format a Flash device, all of the files are erased and cannot be recovered.
The following example displays the contents of the NVRAM file system on a Class A Flash file system
platform. The file named startup-config is the current startup configuration file, in physical NVRAM or
in Flash memory. If the file is located in a Flash memory file system, this entry is a symbolic link to the
actual file. The file named underlying-config is always the NVRAM version of the configuration.
Router# dir nvram:
Directory of nvram:/
Router# cd system:?
system:memory system:running-config system:ucode system:vfiles
Router# cd system:
Router# dir
Directory of system:/
On some platforms, the system file system contains microcode in its ucode directory, as follows:
Router# dir system:/ucode
Directory of system:/ucode/
This chapter describes how to create, load, and maintain configuration files. Configuration files contain
a set of user-configured commands that customize the functionality of your Cisco routing device using
Cisco IOS Release 12.2.
The tasks in this chapter assume that you have at least a minimal configuration running on your system.
You can create a basic configuration file using the setup command (see the “Using AutoInstall and
Setup” chapter in this document for details).
For a complete description of the configuration file management commands in this chapter, refer to the
“Configuration File Management Commands” chapter in the Release 12.2 Cisco IOS Configuration
Fundamentals Command Reference. To locate documentation of other commands that appear in this
chapter, use the Cisco IOS Command Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
To change the startup configuration file, you can either save the running configuration file to the startup
configuration using the copy running-config startup-config EXEC command or copy a configuration
file from a file server to the startup configuration (see the “Copying Configuration Files from a Network
Server to the Router” section for more information).
Command Purpose
Router# show bootvar Lists the contents of the BOOT environment variable, the name of the
configuration file pointed to by the CONFIG_FILE environment variable,
and the contents of the BOOTLDR environment variable.
Router# more file-url Displays the contents of a specified file.
Router# show running-config Displays the contents of the running configuration file. (Command alias
for the more system:running-config command.)
Router# show startup-config Displays the contents of the startup configuration file. (Command alias
for the more nvram:startup-config command.)
On all platforms except the Class A Flash file system platforms, the
default startup-config file usually is stored in NVRAM. On the Class A
Flash file system platforms, the CONFIG_FILE environment variable
points to the default startup-config file. The CONFIG_FILE variable
defaults to NVRAM.
Configuring from the terminal allows you to enter configuration commands at the command line, as
described in the following section. Configuring from memory loads the startup configuration file. See
the “Reexecuting the Configuration Commands in the Startup Configuration File” section for more
information. Configuring from the network allows you to load and execute configuration commands over
the network. See the “Copying Configuration Files from a Network Server to the Router” section for
more information.
EXEC mode command. Comments are stripped out of the configuration file when it is loaded onto the
router. However, you can list the comments in configuration files stored on a File Transfer Protocol
(FTP), remote copy protocol (rcp), or Trivial File Transfer Protocol (TFTP) server.
When you configure the software using the CLI, the software executes the commands as you enter them.
To configure the software using the CLI, use the following commands beginning in privileged EXEC
mode:
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Enter the necessary configuration commands. The Cisco IOS
documentation set describes configuration commands organized by
technology.
Step 3 Router(config)# end Ends the configuration session and exits to EXEC mode.
In the following example, the router prompt name of the router is configured. The comment line,
indicated by the exclamation mark (!), does not execute any command.
In this example, the hostname command is used to change the router name from Router to new_name.
By pressing Ctrl-Z (^Z) or entering the end command, the user quits configuration mode. The copy
system:running-config nvram:startup-config command saves the current configuration to the startup
configuration.
Router# configure terminal
Router(config)# !The following command provides the router host name.
Router(config)# hostname new_name
new_name(config)# end
new_name# copy system:running-config nvram:startup-config
When the startup configuration is NVRAM, it stores the current configuration information in text format
as configuration commands, recording only nondefault settings. The memory is checksummed to guard
against corrupted data.
Note Some specific commands might not get saved to NVRAM. You will need to enter these commands
again if you reboot the machine. These commands are noted in the documentation. We recommend
that you keep a list of these settings so that you can quickly reconfigure your router after rebooting.
Command Purpose
Router# copy system:running-config Copies the running configuration file to a TFTP server.
tftp:[[[//location]/directory]/filename]
Router# copy nvram:startup-config Copies the startup configuration file to a TFTP server.
tftp:[[[//location]/directory]/filename]
After you have issued the copy command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies a configuration file from a router to a TFTP server:
Tokyo# copy system:running-config tftp://172.16.2.155/tokyo-confg
Write file tokyo-confg on host 172.16.2.155? [confirm] y
The rcp copy commands rely on the rsh server (or daemon) on the remote system. To copy files using
rcp, you need not create a server for file distribution, as you do with TFTP. You need only to have access
to a server that supports the remote shell (rsh). (Most UNIX systems support rsh.) Because you are
copying a file from one place to another, you must have read permission on the source file and write
permission on the destination file. If the destination file does not exist, rcp creates it for you.
Although the Cisco rcp implementation emulates the functions of the UNIX rcp
implementation—copying files among systems on the network—the Cisco command syntax differs from
the UNIX rcp command syntax. The Cisco rcp support offers a set of copy commands that use rcp as the
transport mechanism. These rcp copy commands are similar in style to the Cisco TFTP copy commands,
but they offer an alternative that provides faster performance and reliable delivery of data. These
improvements are possible because the rcp transport mechanism is built on and uses the TCP/IP stack,
which is connection-oriented. You can use rcp commands to copy system images and configuration files
from the router to a network server and vice versa.
You also can enable rcp support to allow users on remote systems to copy files to and from the router.
To configure the Cisco IOS software to allow remote users to copy files to and from the router, use the
ip rcmd rcp-enable global configuration command.
If the router IP address translates to Router1.company.com, then the .rhosts file for User0 on the rcp
server should contain the following line:
Router1.company.com Rtr1
Refer to the documentation for your rcp server for more information.
Command Purpose
Step 1 Router# configure terminal (Optional) Enters global configuration mode.
Step 2 Router(config)# ip rcmd remote-username username (Optional) Changes the default remote username.
Step 3 Router(config)# end (Optional) Exits global configuration mode.
Step 4 Router# copy system:running-config Specifies that the router running configuration file be
rcp:[[[//[username@]location]/directory]/filename] stored on an rcp server.
or or
Router# copy nvram:startup-config Specifies that the router startup configuration file be
rcp:[[[//[username@]location]/directory]/filename] stored on an rcp server.
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies the running configuration file named rtr2-confg to the netadmin1
directory on the remote host with an IP address of 172.16.101.101:
Router# copy system:running-config rcp://[email protected]/Rtr2-confg
Write file rtr2-confg on host 172.16.101.101?[confirm]
Building configuration...[OK]
Connected to 172.16.101.101
Router#
The following example shows how to store a startup configuration file on a server by using rcp to copy
the file:
Rtr2# configure terminal
Rtr2(config)# ip rcmd remote-username netadmin2
Rtr2(config)# end
Rtr2# copy nvram:startup-config rcp:
Remote host[]? 172.16.101.101
Name of configuration file to write [rtr2-confg]?
Write file rtr2-confg on host 172.16.101.101?[confirm]
![OK]
Command Purpose
Step 1 Router# configure terminal (Optional) Enters configuration mode from the
terminal. This step is required only if you want to
override the default remote username or password (see
Steps 2 and 3).
Step 2 Router(config)# ip ftp username username (Optional) Specifies the default remote username.
Step 3 Router(config)# ip ftp password password (Optional) Specifies the default password.
Command Purpose
Step 4 Router(config)# end (Optional) Exits global configuration mode. This step
is required only if you override the default remote
username or password (see Steps 2 and 3).
Step 5 Router# copy system:running-config Copies the running configuration or startup
ftp:[[[//[username[:password]@]location] configuration file to an FTP server.
/directory]/filename]
or
Router# copy nvram:startup-config
ftp:[[[//[username[:password]@]location]
/directory]/filename]
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies the running configuration file named rtr2-confg to the netadmin1
directory on the remote host with an IP address of 172.16.101.101:
Router# copy system:running-config ftp://netadmin1:[email protected]/Rtr2-confg
Write file rtr2-confg on host 172.16.101.101?[confirm]
Building configuration...[OK]
Connected to 172.16.101.101
Router#
The following example shows how to store a startup configuration file on a server by using FTP to copy
the file:
Rtr2# configure terminal
Rtr2(config)# ip ftp username netadmin2
Rtr2(config)# ip ftp password mypass
Rtr2(config)# end
Rtr2# copy nvram:startup-config ftp:
Remote host[]? 172.16.101.101
Name of configuration file to write [rtr2-confg]?
Write file rtr2-confg on host 172.16.101.101?[confirm]
![OK]
The copy {ftp: | rcp: | tftp:} system:running-config EXEC command loads the configuration files into
the router as if you were typing the commands in at the command line. The router does not erase the
existing running configuration before adding the commands. If a command in the copied configuration
file replaces a command in the existing configuration file, the existing command will be erased. For
example, if the copied configuration file contains a different IP address in a particular command than the
existing configuration, the IP address in the copied configuration will be used. However, some
commands in the existing configuration may not be replaced or negated. In this case, the resulting
configuration file will be a mixture of the existing configuration file and the copied configuration file,
with the copied configuration file having precedence.
In order to restore a configuration file to an exact copy of a file stored on a server, you need to copy the
configuration file directly to the startup configuration (using the copy {ftp: | rcp: | tftp:}
nvram:startup-config command) and reload the router.
To copy configuration files from a server to a router, perform the tasks described in the following
sections:
• Copying a Configuration File from a TFTP Server to the Router
• Copying a Configuration File from an rcp Server to the Router
• Copying a Configuration File from an FTP Server to the Router
The protocol you use depends on which type of server you are using. The FTP and rcp transport
mechanisms provide faster performance and more reliable delivery of data than TFTP. These
improvements are possible because the FTP and rcp transport mechanisms are built on and use the
TCP/IP stack, which is connection-oriented.
Command Purpose
Router# copy tftp:[[[//location]/directory]/filename] Copies a configuration file from a TFTP server to the
system:running-config running configuration.
Router# copy tftp:[[[//location]/directory]/filename] Copies a configuration file from a TFTP server to the
nvram:startup-config startup configuration.
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
In the following example, the software is configured from the file named tokyo-config at IP address
172.16.2.155:
Router1# copy tftp://172.16.2.155/tokyo-confg system:running-config
Configure using tokyo-confg from 172.16.2.155? [confirm] y
Booting tokyo-confg from 172.16.2.155:!!! [OK - 874/16000 bytes]
Command Purpose
Step 1 Router# configure terminal (Optional) Enters configuration mode from the
terminal. This step is required only if you override the
default remote username (see Step 2).
Step 2 Router(config)# ip rcmd remote-username username (Optional) Specifies the remote username.
Step 3 Router(config)# end (Optional) Exits global configuration mode. This step
is required only if you override the default remote
username (see Step 2).
Step 4 Router# copy Copies the configuration file from a rcp server to the
rcp:[[[//[username@]location]/directory]/filename] running configuration or startup configuration.
system:running-config
or
Router# copy
rcp:[[[//[username@]location]/directory]/filename]
nvram:startup-config
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies a configuration file named host1-confg from the netadmin1 directory on
the remote server with an IP address of 172.16.101.101, and loads and runs those commands on the
router:
The following example specifies a remote username of netadmin1. Then it copies the configuration file
named host2-confg from the netadmin1 directory on the remote server with an IP address of
172.16.101.101 to the startup configuration.
Rtr2# configure terminal
Rtr2(config)# ip rcmd remote-username netadmin1
Rtr2(config)# end
Rtr2# copy rcp: nvram:startup-config
Address of remote host [255.255.255.255]? 172.16.101.101
Name of configuration file[rtr2-confg]? host2-confg
Configure using host2-confg from 172.16.101.101?[confirm]
Connected to 172.16.101.101
Loading 1112 byte file host2-confg:![OK]
[OK]
Rtr2#
%SYS-5-CONFIG_NV:Non-volatile store configured from host2-config by rcp from
172.16.101.101
If the server has a directory structure, the configuration file or image is written to or copied from the
directory associated with the username on the server. For example, if the system image resides in the
home directory of a user on the server, specify that user name as the remote username.
Refer to the documentation for your FTP server for more information.
Use the ip ftp username and ip ftp password global configuration commands to specify a username and
password for all copies. Include the username in the copy command if you want to specify a username
for that copy operation only.
Command Purpose
Step 1 Router# configure terminal (Optional) Allows you to enter global configuration
mode. This step is required only if you want to override
the default remote username or password (see Steps 2
and 3).
Step 2 Router(config)# ip ftp username username (Optional) Specifies the default remote username.
Step 3 Router(config)# ip ftp password password (Optional) Specifies the default password.
Step 4 Router(config)# end (Optional) Exits global configuration mode. This step
is required only if you override the default remote
username or password (see Steps 2 and 3).
Step 5 Router# copy Using FTP, copies the configuration file from a
ftp:[[[//[username[:password]@]location]/directory network server to running memory or the startup
]/filename] system:running-config
configuration.
or
Router# copy
ftp:[[[//[username[:password]@]location]
/directory]/filename] nvram:startup-config
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies a host configuration file named host1-confg from the netadmin1 directory
on the remote server with an IP address of 172.16.101.101, and loads and runs those commands on the
router:
Router# copy rcp://netadmin1:[email protected]/host1-confg system:running-config
Configure using host1-confg from 172.16.101.101? [confirm]
Connected to 172.16.101.101
Loading 1112 byte file host1-confg:![OK]
Router#
%SYS-5-CONFIG: Configured from host1-config by ftp from 172.16.101.101
The following example specifies a remote username of netadmin1. Then it copies the configuration file
named host2-confg from the netadmin1 directory on the remote server with an IP address of
172.16.101.101 to the startup configuration.
Rtr2# configure terminal
Rtr2(config)# ip ftp username netadmin1
Rtr2(config)# ip ftp password mypass
Rtr2(config)# end
Rtr2# copy ftp: nvram:startup-config
Address of remote host [255.255.255.255]? 172.16.101.101
Name of configuration file[rtr2-confg]? host2-confg
Configure using host2-confg from 172.16.101.101?[confirm]
Connected to 172.16.101.101
Loading 1112 byte file host2-confg:![OK]
[OK]
Rtr2#
%SYS-5-CONFIG_NV:Non-volatile store configured from host2-config by ftp from
172.16.101.101
Command Purpose
Step 1 Router(config)# service compress-config Specifies that the configuration file be compressed.
Step 2 Router(config)# end Exits global configuration mode.
Command Purpose
Step 3 Use FTP, rcp, or TFTP to copy the new Enters the new configuration.
configuration. If you try to load a configuration
that is more than three times larger than the
NVRAM size, the following error message is
displayed:
“[buffer overflow - file-size/buffer-size bytes].”
or
Router# configure terminal
Step 4 Router(config)# copy system:running-config When you have finished changing the
nvram:startup-config running-configuration, saves the new configuration.
The size of the configuration must not exceed three times the NVRAM size. For a 128-KB size NVRAM,
the largest expanded configuration file size is 384 KB.
The service compress-config global configuration command works only if you have Cisco IOS software
Release 10 or later release boot ROMs. Installing new ROMs is a one-time operation and is necessary
only if you do not already have Cisco IOS Release 10 in ROM. If the boot ROMs do not recognize a
compressed configuration, the following message is displayed:
Boot ROMs do not support NVRAM compression Config NOT written to NVRAM
Command Purpose
Step 1 Router# copy nvram:startup-config Copies the current startup configuration to the new
flash-filesystem:filename location to create the configuration file.
Step 2 Router# configure terminal Enters global configuration mode.
Step 3 Router(config)# boot config flash-filesystem:filename Specifies that the startup configuration file be
stored in Flash memory by setting the
CONFIG_FILE variable.
Command Purpose
Step 4 Router(config)# end Exits global configuration mode.
Step 5 Use FTP, rcp, or TFTP to copy the new configuration. If Enters the new configuration.
you try to load a configuration that is more than three
times larger than the NVRAM size, the following error
message is displayed:
“[buffer overflow - file-size/buffer-size bytes].”
or
Router# configure terminal
Step 6 Router# copy system:running-config nvram:startup-config When you have finished changing the
running-configuration, saves the new
configuration.
See the “Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems” section
for more information.
The following example stores the configuration file in slot 0:
Router# copy nvram:startup-config slot0:router-config
Router# configure terminal
Router(config)# boot config slot0:router-config
Router(config)# end
Router# copy system:running-config nvram:startup-config
Care must be taken when editing or changing a large configuration. Flash memory space is used every
time a copy system:running-config nvram:startup-config EXEC command is issued. Because file
management for Flash memory, such as optimizing free space, is not done automatically, you must pay
close attention to available Flash memory. Use the squeeze command to reclaim used space. We
recommend that you use a large-capacity Flash card of at least 20 MB.
Command Purpose
Step 1 Router# copy system:running-config {ftp: | rcp: | Saves the running configuration to an FTP, rcp, or
tftp:} TFTP server.
Step 2 Router# configure terminal Enters global configuration mode.
Step 3 Router(config)# boot network Specifies that the startup configuration file be loaded
{ftp:[[[//[username[:password]@]location]/director from the network server at startup.
y]/filename] |
rcp:[[[//[username@]location]/directory]/filename]
| tftp:[[[//location]/directory]/filename]}
Step 4 Router(config)# service config Enables the router to download configuration files at
system startup.
Step 5 Router(config)# end Exits global configuration mode.
Step 6 Router# copy system:running-config Saves the configuration.
nvram:startup-config
See the “Copying Configuration Files from the Router to a Network Server” and “Configuring the Router
to Download Configuration Files” sections for more information on these commands.
Command Purpose
Router# clear parser cache Clears the parse cache entries and hit/miss statistics
stored for the Parser Cache feature.
Command Purpose
Router(config)# no parser cache Disables the Parser Cache feature.
When the parser cache is disabled, the no parser cache command line is written to the running
configuration file.
Tips If you wish to disable the parser cache to free system resources, you should clear the parser cache
before issuing the no parser cache command. You will not be able to clear the parser cache after
disabling it.
Command Purpose
Router(config)# parser cache Enables the Parser Cache feature.
Command Purpose
Router# show parser statistics Displays statistics about the last configuration file
parsed and the status of the Parser Cache feature.
The following example shows sample output from the show parser statistics command:
Router# show parser statistics
Last configuration file parsed:Number of Commands:1484, Time:1272 ms
The show parser statistics command displays two sets of data, as follows:
• The number of commands in the configuration file that was last copied into the running
configuration, and the time it took for the system to parse them (a configuration file can be loaded
into the running configuration at system startup, or by issuing commands such as the copy source
running-config EXEC command).
• The status of the parser cache (enabled or disabled) and the number of command matches (hits or
misses) since the system was started or since the parser cache was cleared.
In the example shown, the hit/miss statistics (0/0) do not match the number of commands in the last
configuration file parsed (1484), which indicates that the last configuration file was loaded while the
parser cache was disabled.
Command Purpose
Router> copy filesystem:[partition-number:][filename] Loads a configuration file directly into NVRAM.
nvram:startup-config
Router> copy filesystem:[partition-number:][filename] Copies a configuration file to your running
system:running-config configuration.
The following example copies the file named ios-upgrade-1 from partition 4 of the Flash memory
PC Card in slot 0 to the router startup configurations:
Router# copy slot0:4:ios-upgrade-1 nvram:startup-config
Command Purpose
Step 1 Router> show source-filesystem: Displays the layout and contents of Flash memory to
verify the filename.
Step 2 Router> copy Copies a configuration file between Flash memory
source-filesystem:[partition-number:][filename] devices.
dest-filesystem:[partition-number:][filename]
Step 3 Router> verify Verifies the checksum of the file you copied.
dest-filesystem:[partition-number:][filename]
Note The source device and the destination device cannot be the same. For example, the copy slot1: slot1:
command is invalid.
System flash
Command Purpose
Step 1 Router# configure terminal (Optional) Enters global configuration mode. This step
is required only if you override the default remote
username or password (see Steps 2 and 3).
Step 2 Router(config)# ip ftp username username (Optional) Specifies the remote username.
Step 3 Router(config)# ip ftp password password (Optional) Specifies the remote password.
Step 4 Router(config)# end (Optional) Exits configuration mode. This step is
required only if you override the default remote
username (see Steps 2 and 3).
Step 5 Router# copy ftp: Copies the configuration file from a network server to
[[[//[username:password@]location]/directory]/file the Flash memory device using FTP.
name]
flash-filesystem:[partition-number:][filename]
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
To copy a configuration file from an rcp server to a Flash memory device, use the following commands
in privileged EXEC mode:
Command Purpose
Step 1 Router# configure terminal (Optional) Enters global configuration mode. This step
is required only if you override the default remote
username (see Step 2).
Step 2 Router(config)# ip rcmd remote-username username (Optional) Specifies the remote username.
Step 3 Router(config)# end (Optional) Exits global configuration mode. This step
is required only if you override the default remote
username (see Step 2).
Step 4 Router# copy Copies the configuration file from a network server to
rcp:[[[//[username@]location]/directory]/filename] the Flash memory device using rcp. Reply to any router
flash-filesystem:[partition-number:][filename]
prompts for additional information or confirmation.
The prompting will depending on how much
information you provide in the copy command and the
current setting of the file prompt command.
To copy a configuration file from a TFTP server to the router, use the following command in EXEC
mode:
Command Purpose
Router> copy tftp:[[[//location]/directory]/filename] Copies the file from a TFTP server to the Flash
flash-filesystem:[partition-number:][filename] memory device. Reply to any router prompts for
additional information or confirmation. The prompting
will depending on how much information you provide
in the copy command and the current setting of the file
prompt command.
The following example shows the copying of the configuration file named router-config from a TFTP
server to the Flash memory card inserted in slot 0 of the Network Processing Engine (NPE) or Route
Switch Processor (RSP) card of a Cisco 7500 series router. The copied file is renamed new-config.
Router# copy tftp:router-config slot0:new-config
Command Purpose
Router# configure memory Reexecutes the configuration commands located in the startup configuration file.
Command Purpose
Router> erase nvram: Clears the contents of your startup configuration.
For all platforms except the Class A Flash file system platforms, this command erases NVRAM. The
startup configuration file cannot be restored once it has been deleted.
On Class A Flash file system platforms, when you use the erase startup-config EXEC command, the
router erases or deletes the configuration pointed to by CONFIG_FILE environment variable. If this
variable points to NVRAM, the router erases NVRAM. If the CONFIG_FILE environment variable
specifies a Flash memory device and configuration filename, the router deletes the configuration file.
That is, the router marks the file as “deleted,” rather than erasing it. This feature allows you to recover
a deleted file.
Command Purpose
Router> delete flash-filesystem:filename Deletes a specified configuration file on a specified Flash device.
On Class A and B Flash file systems, when you delete a specific file in Flash memory, the system marks
the file as deleted, allowing you to later recover a deleted file using the undelete EXEC command.
Erased files cannot be recovered. To permanently erase the configuration file, use the squeeze EXEC
command.
On Class C Flash file systems, you cannot recover a file that has been deleted.
If you attempt to erase or delete the configuration file specified by the CONFIG_FILE environment
variable, the system prompts you to confirm the deletion.
The following example deletes the file named myconfig from a Flash memory card inserted in slot 0:
Router# delete slot0:myconfig
Command Purpose
Step 1 Router> copy [flash-url | ftp-url | rcp-url | Copies the configuration file to the Flash file system
tftp-url | system:running-config | from which the router will load the file upon restart.
nvram:startup-config] dest-flash-url
Step 2 Router# configure terminal Enters global configuration mode.
Step 3 Router(config)# boot config dest-flash-url Sets the CONFIG_FILE environment variable. This
step modifies the runtime CONFIG_FILE environment
variable.
Step 4 Router(config)# end Exits global configuration mode.
Step 5 Router> copy system:running-config Saves the configuration performed in Step 3 to the
nvram:startup-config startup configuration.
Step 6 Router> show bootvar (Optional) Allows you to verify the contents of the
CONFIG_FILE environment variable.
After you specify a location for the startup configuration file, the nvram:startup-config command is
aliased to the new location of the startup configuration file. The more nvram:startup-config EXEC
command will display the startup configuration, regardless of its location. The erase
nvram:startup-config EXEC command will erase the contents of NVRAM and delete the file pointed
to by the CONFIG_FILE environment variable.
When you save the configuration using the copy system:running-config nvram:startup-config
command, the router saves a complete version of the configuration file to the location specified by the
CONFIG_FILE environment variable and a distilled version to NVRAM. A distilled version is one that
does not contain access list information. If NVRAM contains a complete configuration file, the router
prompts you to confirm your overwrite of the complete version with the distilled version. If NVRAM
contains a distilled configuration, the router does not prompt you for confirmation and proceeds with
overwriting the existing distilled configuration file in NVRAM.
Note If you specify a file in a Flash device as the CONFIG_FILE environment variable, every time you
save your configuration file with the copy system:running-config nvram:startup-config command,
the old configuration file is marked as “deleted,” and the new configuration file is saved to that
device. Eventually, Flash memory will be full, because the old configuration files still take up
memory. Use the squeeze EXEC command to permanently delete the old configuration files and
reclaim the space.
The following example copies the running configuration file to the first PCMCIA slot of the RSP card
in a Cisco 7500 series router. This configuration is then used as the startup configuration when the
system is restarted.
Router# copy system:running-config slot0:config2
Router# configure terminal
Router(config)# boot config slot0:config2
Router(config)# end
Router# copy system:running-config nvram:startup-config
[ok]
Router# show bootvar
BOOT variable = slot0:rsp-boot-m
CONFIG_FILE variable = nvram:
Current CONFIG_FILE variable = slot0:config2
The router sends the first valid password in the following list:
1. The password specified in the copy command, if a password is specified.
2. The password set by the ip ftp password command, if the command is configured.
3. The router forms a password [email protected]. The variable username is the
username associated with the current session, routername is the configured host name, and domain
is the domain of the router.
The username and password must be associated with an account on the FTP server. If you are writing to
the server, the FTP server must be properly configured to accept the FTP write request from the user on
the router.
If the server has a directory structure, the configuration file or image is written to or copied from the
directory associated with the username on the server. For example, if the system image resides in the
home directory of a user on the server, specify that user name as the remote username.
Refer to the documentation for your FTP server for more information.
Use the ip ftp username and ip ftp password commands to specify a username and password for all
copies. Include the username in the copy command if you want to specify a username for that copy
operation only.
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router(config)# boot network Specifies the network configuration file to download
{ftp:[[[//[username[:password]@]location]/directory] at startup, and the protocol to be used (TFTP, rcp, or
/filename] |
rcp:[[[//[username@]location]/directory]/filename] |
FTP).
tftp:[[[//location]/directory]/filename]}
Step 3 Router(config)# service config Enables the system to automatically load the network
file upon restart.
Step 4 Router(config)# end Exits global configuration mode.
Step 5 Router# copy system:running-config Saves the running configuration to the startup
nvram:startup-config configuration file.
For Step 2, if you do not specify a network configuration filename, the Cisco IOS software uses the
default filename network-confg. If you omit the address, the router uses the broadcast address.
You can specify more than one network configuration file. The software tries them in order entered until
it loads one. This procedure can be useful for keeping files with different configuration information
loaded on a network server.
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router(config)# boot host Specifies the host configuration file to download at
{ftp:[[[//[username[:password]@]location]/directory] startup, and the protocol to be used (FTP, rcp, or
/filename] |
rcp:[[[//[username@]location]/directory]/filename] |
TFTP).
tftp:[[[//location]/directory]/filename] }
Step 3 Router(config)# service config Enables the system to automatically load the host file
upon restart.
Step 4 Router(config)# end Exits global configuration mode.
Step 5 Router# copy system:running-config Saves the running configuration to the startup
nvram:startup-config configuration file.
If you do not specify a host configuration filename, the router uses its own name to form a host
configuration filename by converting the name to all lowercase letters, removing all domain information,
and appending “-confg.” If no host name information is available, the software uses the default host
configuration filename router-confg. If you omit the address, the router uses the broadcast address.
You can specify more than one host configuration file. The Cisco IOS software tries them in order
entered until it loads one. This procedure can be useful for keeping files with different configuration
information loaded on a network server.
In the following example, a router is configured to download the host configuration file named hostfile1
and the network configuration file named networkfile1. The router uses TFTP and the broadcast address
to obtain the file.
Router# configure terminal
Router(config)# boot host tftp:hostfile1
Router(config)# boot network tftp:networkfile1
Router(config)# service config
Router(config)# end
Router# copy system:running-config nvram:startup-config
Published: 04/30/2001
This chapter describes how to load and maintain system images and microcode. System images contain
the system software. Microcode typically contains system images or hardware-specific software that can
be loaded directly on to various hardware devices.
For a complete description of the system image and microcode commands mentioned in this chapter,
refer to the “System Image and Microcode Commands” chapter in the Release 12.2 Cisco IOS
Configuration Fundamentals Command Reference. To locate documentation of other commands that
appear in this chapter, use the Cisco IOS Command Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Understanding Images
System images contain the Cisco IOS software. Your router already has an image on it when you receive
it. However, you may want to load a different image onto the router at some point. For example, you may
want to upgrade your software to the latest release, or use the same version of the software for all the
routers in a network. Different system images contain different sets of Cisco IOS features. To determine
which version (release number) of Cisco IOS is currently running on your system, and the filename of
the system image, use the show version command in Exec mode. For example, “Version 12.2” indicates
Cisco IOS Release 12.2, and “c7200-js-mz” indicates the system image for a Cisco 7200 series router
(c7200) containing the “enterprise” feature set (jz).
Types of Images
The following are the two main types of image your router may use:
• System image—The complete Cisco IOS software. This image is loaded when your router boots and
is used most of the time.
On most platforms, the image is located in Flash memory. On platforms with multiple Flash memory
file systems (Flash, boot flash, slot 0, or slot 1), the image can be located in any existing Flash file
system. Use the show file systems EXEC command to determine which file systems your router
supports. Refer to your hardware documentation for information about where these images are
located by default.
• Boot image—A subset of the Cisco IOS software. This image is used to perform network booting
or to load Cisco IOS images onto the router. This image is also used if the router cannot find a valid
system image. Depending on your platform, this image may be called xboot image, rxboot image,
bootstrap image, or boot loader/helper image.
On some platforms, the boot image is contained in ROM. In others, the boot image can be stored in
Flash memory. On these platforms, you can specify which image should be used as the boot image
using the boot bootldr global configuration command. Refer to your hardware documentation for
information about the boot image used on your router.
Command Purpose
Router# show bootvar Lists the contents of the BOOT environment
variable, the name of the configuration file pointed
to by the CONFIG_FILE environment variable, and
the contents of the BOOTLDR environment
variable.
Router# show flash-filesystem: [partition number] [all | chips Lists information about Flash memory for Class B
| detailed | err | summary] file systems.
Router# show flash-filesystem: [all | chips | filesys] Lists information about Flash memory for Class A
file systems.
Router# show flash-filesystem: Lists information about Flash memory for Class C
file systems.
Router# show microcode Displays microcode information.
Router# show version Lists the currently running system image filename,
and the system software release version, the
configuration register setting, and other
information.
Refer to the Release 12.2 Cisco IOS Configuration Fundamentals Command Reference for examples of
these commands.
Command Purpose
Step 1 Router# show flash-filesystem: (Optional) Displays the system image filename in Flash
memory. Use this command to verify the url-path of the file
and the exact spelling of the system image filename for use in
the next command.
Step 2 Router# copy flash-url Copies the system image from Flash memory to a TFTP
tftp:[[[//location]/directory]/filename] server. Specify the file location and filename as the flash-url
argument.
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
hostname Rtr1
ip rcmd remote-username User0
If the router’s IP address translates to Router1.domain.com, then the .rhosts file for User0 on the rcp
server should contain the following line:
Router1.domain.com Rtr1
Refer to the documentation for your rcp server for more information.
To copy a system image from Flash memory to a network server, use the following commands:
Command Purpose
Step 1 Router# show flash-filesystem: (Optional) Displays the system image filename in
Flash memory. Use this command to verify the
url-path of the file and the exact spelling of the
system image filename for use in the copy EXEC
command.
Step 2 Router# configure terminal (Optional) Enters global configuration mode from the
terminal. This step is required only if you want to
change the default remote username (see Step 3).
Step 3 Router(config)# ip rcmd remote-username username (Optional) Configures the remote username.
Step 4 Router(config)# end (Optional) Exits global configuration mode. This step
is required only if you want to change the default
remote username (see Step 3).
Step 5 Router# copy flash-url Copies the system image from Flash memory to a
rcp:[[[//[username@]location]/directory]/filename] network server using rcp.
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
Writing test
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Upload to server done
Flash device copy took 00:00:08 [hh:mm:ss]
Command Purpose
Step 1 Router# configure terminal (Optional) Enters global configuration mode. This step
is required only if you override the default remote
username or password (see Steps 2 and 3).
Step 2 Router(config)# ip ftp username username (Optional) Changes the default remote username.
Step 3 Router(config)# ip ftp password password (Optional) Changes the default password.
Step 4 Router(config)# end (Optional) Exits global configuration mode. This step is
required only if you override the default remote
username or password (see Steps 2 and 3).
Step 5 Router# show flash-filesystem: (Optional) Displays the system image file in the
specified Flash directory. If you do not already know it,
note the exact spelling of the system image filename in
Flash memory.
Step 6 Router# copy flash-filesystem:filename Copies the image to the FTP server.
ftp:[[[//[username
[:password]@]location]/directory]/filename]
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example uses the show flash: EXEC command to learn the name of the system image file
and the copy flash: tftp: EXEC command to copy the system image (c3640-2is-mz) to a TFTP server.
The router uses the default username and password.
Router# show flash:
The following example uses the show slot1: EXEC command to display the name of the system image
file in the second PCMCIA slot, and copies the file (test) to an FTP server.
Router# show slot1:
In this example, the file named your-ios is copied from partition 1 of the Flash memory PC card in slot
0 to the TFTP server at 172.23.1.129. The file will be saved with the name your-ios in the dirt/sysadmin
directory relative to the directory of the remote username.
Router# show slot0: partition 1
Note When you are upgrading or changing to a different Cisco IOS release, refer to the appropriate release
notes for information on system requirements and limitations.
Note The destination filename must be an alphanumeric expression (contains all letters or a combination
of letters and numberals). For example, “1” is an invalid filename.
The filename can be in either lowercase or uppercase; the system ignores case. If more than one file of
the same name is copied to Flash, regardless of case, the last file copied becomes the valid file.
Note For the Cisco 3600 series routers, if you do not have access to a network server and need to download
a system image, you can copy an image from a local or remote computer (such as a PC, UNIX
workstation, or Macintosh) using the Xmodem or Ymodem protocols. See the section “Recovering a
System Image Using Xmodem or Ymodem” later in this chapter.
On Cisco 2500, Cisco 3000, and Cisco 4000 systems, if the file being downloaded to Flash memory is
an uncompressed system image, the copy command automatically determines the size of the file being
downloaded and validates it with the space available in Flash memory.
On Class B Flash file systems, the router gives you the option of erasing the existing contents of Flash
memory before writing to it. If no free Flash memory is available, or if no files have ever been written
to Flash memory, the erase routine is required before new files can be copied. If there is enough free
Flash memory, the router gives you the option of erasing the existing Flash memory before writing to it.
The system will inform you of these conditions and prompt you for a response.
Note If you enter n after the “Erase flash before writing?” prompt, the copy process continues. If you enter
y and confirm the erasure, the erase routine begins. Be sure to have ample Flash memory space before
entering n at the erasure prompt.
If you attempt to copy a file into Flash memory that is already there, a prompt informs you that a file
with the same name already exists. This file is “deleted” when you copy the new file into Flash.
• On Class A and B Flash file systems, the first copy of the file still resides within Flash memory, but
it is rendered unusable in favor of the newest version and is listed with the “deleted” tag when you
use the show flash-filesystem: EXEC command. If you terminate the copy process, the newer file is
marked “deleted” because the entire file was not copied and is not valid. In this case, the original
file in Flash memory is valid and available to the system.
• On Class C Flash file systems, the first copy of the file is erased.
You can copy normal or compressed images to Flash memory. You can produce a compressed system
image on any UNIX platform using the compress interface configuration command. Refer to your UNIX
platform’s documentation for the exact usage of the compress command.
On some platforms, the Flash security jumper must be installed in order to write to Flash memory. In
addition, some platforms have a write protect switch which must be set to unprotected in order to write
to Flash memory.
Command Purpose
Router# copy tftp: [[[//location]/directory]/filename] Copies a system image or a boot image to Flash
flash-filesystem:[filename] memory.
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies a system image named igs-p-l from a TFTP server to a Class B Flash file
system when Flash memory is too full to copy the file:
Router# copy tftp: flash:
IP address or name of remote host [255.255.255.255]? dirt
Translating “DIRT”...domain server (255.255.255.255) [OK]
Zeroing bank...zzzzzzzzzzzzzzzz
Verify zeroed...vvvvvvvvvvvvvvvv
Erasing bank...eeeeeeeeeeeeeeee
Zeroing bank...zzzzzzzzzzzzzzzz
Verify zeroed...vvvvvvvvvvvvvvvv
Erasing bank...eeeeeeeeeeeeeeee
Zeroing bank...zzzzzzzzzzzzzzzz
Verify zeroed...vvvvvvvvvvvvvvvv
Erasing bank...eeeeeeeeeeeeeeee
Zeroing bank...zzzzzzzzzzzzzzzz
Verify zeroed...vvvvvvvvvvvvvvvv
Erasing bank...eeeeeeeeeeeeeeee
Copying from a TFTP Server to Flash Example When File by the Same Name Already Exists Example
The following example shows how to copy a system image named igs-p-l into the current Flash
configuration in which a file named igs-p-l already exists:
Router# copy tftp://172.16.13.111/igs-p-l flash:igs-p-l
File igs-p-l already exists; it will be invalidated!
Copy igs-p-l from 172.16.13.111 into flash memory? [confirm]
2287500 bytes available for writing without erasure.
Erase flash before writing? [confirm]n
Loading from 172.16.1.111:!!!!...
[OK - 1906676 bytes]
Verifying via checksum...
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
vvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvvv
vvvvvvvvvvvvvvvvvvvvvvvvvvvvv
Flash verification successful. Length = 1902192, checksum = 0x12AD
Copying from TFTP Server to Flash Example Without Security Jumper Installed Example
In the following example, the Flash security jumper is not installed, so you cannot write files to Flash
memory:
Router# copy tftp: flash:
Flash: embedded flash security jumper(12V)
must be strapped to modify flash memory
In the following example, the file named c3600-i-mz on the TFTP server at 172.23.1.129 is copied to the
first partition of internal Flash Memory:
Command Purpose
Step 1 See the instructions in the section “Copying Make a backup copy of the current system or bootstrap
Images from Flash Memory to a Network Server.” software image.
Step 2 Router# configure terminal (Optional) Enters global configuration mode from the
terminal. This step is required only if you override the
default remote username (see Step 3).
Step 3 Router(config)# ip rcmd remote-username username (Optional) Specifies the remote username.
Step 4 Router# end (Optional) Exits global configuration mode. This step is
required only if you override the default remote
username (see Step 3).
Step 5 Router# copy rcp: Copies the image from an rcp server to a Flash memory
[[[//[username@]location]/directory] /filename] file system.
flash-filesystem:[filename]
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies a system image named mysysim1 from the netadmin1 directory on the
remote server named SERVER1.CISCO.COM with an IP address of 172.16.101.101 to Flash memory.
To ensure that enough Flash memory is available to accommodate the system image to be copied, the
Cisco IOS software allows you to first erase the contents of Flash memory.
Router1# configure terminal
Router1(config)# ip rcmd remote-username netadmin1
Router1(config)# end
Router# copy rcp: flash:
Connected to 172.16.101.101
In the following example, the file named c3600-i-mz on the rcp server at the IP address 172.23.1.129 is
copied to partition 3 in slot 0. Because no username is specified, the router uses the default rcp remote
username.
Router# show slot0: partition 3
The username and password must be associated with an account on the FTP server. If you are writing to
the server, the FTP server must be properly configured to accept the FTP write request from the user on
the router.
If the server has a directory structure, the configuration file or image is written to or copied from the
directory associated with the username on the server. For example, if the system image resides in the
home directory of a user on the server, specify that user’s name as the remote username.
Refer to the documentation for your FTP server for more information.
Use the ip ftp username and ip ftp password commands to specify a username and password for all
copies. Include the username in the copy command if you want to specify a username for that copy
operation only.
Command Purpose
Step 1 See the instructions in the section “Copying Make a backup copy of the current software image or
Images from Flash Memory to a Network Server.” bootstrap image.
Step 2 Router# configure terminal (Optional) Enters global configuration mode from the
terminal. This step is required only if you want to
override the default remote username or password (see
Steps 3 and 4).
Step 3 Router(config)# ip ftp username username (Optional) Changes the default remote username.
Step 4 Router(config)# ip ftp password password (Optional) Changes the default password.
Step 5 Router(config)# end (Optional) Exits global configuration mode. This step is
required only if you override the default remote
username or password (see Steps 3 and 4).
Step 6 Router# copy ftp: Copies the configuration file from a network server to
[[[//[username[:password]@]location] running memory or the startup configuration using rcp.
/directory]/filename] flash-filesystem:[filename]
After you have issued the copy EXEC command, you may be prompted for additional information or for
confirmation of the action. The prompting will depend on how much information you provide in the copy
command and the current setting of the file prompt global configuration command.
The following example copies a the file named c7200-js-mz from the FTP server the server using a
username of myuser and a password of mypass:
Router# copy ftp://myuser:mypass@theserver/tftpboot/ken/c7200-js-mz slot1:c7200-js-mz
Accessing ftp://theserver/tftpboot/ken/c7200-js-mz...Translating "theserver"...domain
server (192.168.2.132) [OK]
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 4823492 bytes]
Caution If the checksum value does not match the value in the README file, do not reboot the router.
Instead, issue the copy command and compare the checksums again. If the checksum repeatedly is
incorrect, copy the original system software image back into Flash memory before you reboot the
router from Flash memory. If you have a corrupted image in Flash memory and try to boot from Flash,
the router will start the system image contained in ROM (assuming that booting from a network
server is not configured). If ROM does not contain a fully functional system image, the router will
not function and must be reconfigured through a direct console port connection.
The Flash memory content listing does not include the checksum of individual files. To recompute and
verify the image checksum after an image is copied into Flash memory or a Flash memory device, use
the following command in EXEC mode:
Command Purpose
Router# verify flash-filesystem:[partition-number:] Recomputes and verifies the image checksum after the
[filename] image is copied into Flash memory.
If you do not provide the filename in the command, the router prompts you. By default, it prompts for
the last (most recent) file in Flash. Press Return to recompute the default file checksum, or enter the
filename of a different file at the prompt. Note that the checksum for microcode images is always
0x0000.
The following example verifies the image named c7200-js-mz in slot0:
Router# verify slot0:c7200-js-mz
Verified slot0:c7200-js-mz
Internal Flash
memory on
Cisco 3600
series routers
S5082
Caution Before copying to a new Flash device, you must first format that device.
All new media should be formatted. Memory media used in Cisco devices does not typically come
pre-formatted. Even if pre-formatted, an inital format using the Cisco filesystem may help to prevent
potential problems with incompatible formatting.
Attempts to copy images to unformatted or improperly formatted Flash devices may not generate
failure messages on some devices. For this reason, the show and verify steps below are strongly
recommended.
For instructions on formatting your flash device, see the “Maintaining Router Memory” chapter.
To copy an image between Flash memory file systems, use the following commands in EXEC mode:
Command Purpose
Step 1 Router# show flash-filesystem: Displays the layout and contents of Flash memory.
Step 2 Router# copy source-url destination-url Copies an image between Flash memory devices.
Step 3 Router# verify flash-filesystem:filename Verifies the checksum of the image you copied. (You
can get the MD5 checksum for your image from
Cisco.com).
Note The source device and the destination device cannot be the same. For example, the copy slot1: slot1:
command is invalid.
Signature Verified
Verified slot0:
Router#
You can enter the different types of boot commands in any order in the startup configuration file or in
the BOOT environment variable. If you enter multiple boot commands, the Cisco IOS software tries
them in the order they are entered.
Note Booting from ROM is faster than booting from Flash memory. However, booting from Flash memory
is faster and more reliable than booting from a network server.
Task
Step 1 (Optional) Copy a system image or boot image to Flash memory using TFTP, rcp, and FTP. See the “Copying Images
from a Network Server to Flash Memory” section for more information on performing this step.
Step 2 Configure the system to automatically boot from the desired file and location in Flash memory or boot flash memory.
See the “Configuring the Router to Automatically Boot from an Image in Flash Memory” section.
Step 3 (Optional) Depending on the current configuration register setting, change the configuration register value. See the
“Configuring the Router to Automatically Boot from an Image in Flash Memory” section for more information on
modifying the configuration register.
Step 4 (Optional) For some platforms, set the BOOTLDR environment variable to change the location of the boot image.
Task
Step 5 Save your configuration.
Step 6 Power-cycle and reboot your system to ensure that all is working as expected.
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode from the
terminal.
Step 2 Router(config)# boot system flash [flash-filesystem:] Specifies the filename of an image stored in Flash
[partition-number:] filename memory that should be used for booting.
Step 3 Router(config)# config-register value Sets the configuration register to enable loading of
the system image specified in the configuration file.
Step 4 Router(config)# end Ends your configuration session and exits global
configuration mode.
Step 5 Router# copy system:running-config Saves the system running configurattion as the
nvram:startup-config device startup configuration (startup-config file).
Step 6 Router# more nvram:startup-config (Optional) Allows verification of the contents of
the startup configuration.
Step 7 Router# reload Reboots the system.
For routers that are partitioned, if you do not specify a partition, the router boots from the first partition.
If you do not specify a filename, the router boots from the first valid image found in the partition.
If you enter more than one image filename, the router tries the file names in the order entered.
To remove a filename from the configuration file, enter the no boot system flash global configuration
command and specify the file location.
Note The no boot system configuration command disables all boot system configuration commands
regardless of argument. Specifying the flash keyword or the filename argument with the no boot
system command disables only the commands specified by these arguments.
The following example shows a router configured to automatically boot from an image in Flash memory:
Note If you are using a Sun workstation as a network server and TFTP to transfer the file, configure the
workstation to enable verification and generation of User Datagram Protocol (UDP) checksums. See
Sun documentation for details.
For increased performance and reliability, use rcp to boot a system image from a network server. The rcp
implementation uses the TCP, which ensures reliable delivery of data.
You cannot explicitly specify a remote username when you issue the boot ROM monitor command.
Instead, the host name of the router is used. If the remote server has a directory structure, as do UNIX
systems, and you boot the router from a network server using rcp, the Cisco IOS software searches for
the system image on the server relative to the directory of the remote username.
You can also boot from a compressed image on a network server. One reason to use a compressed image
is to ensure that enough memory is available for storage. On routers that do not contain a run-from-ROM
image in EPROM, when the router boots software from a network server, the image being booted and
the running image both must fit into memory. If the running image is large, there may not be room in
memory for the image being booted from the network server.
If not enough room is in memory to boot a regular image from a network server, you can produce a
compressed software image on any UNIX platform using the compress interface configuration
command. Refer to your UNIX platform’s documentation for more information on using of the
compress command.
To specify the loading of a system image from a network server, use the following commands beginning
in privileged EXEC mode:
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router(config)# boot system [rcp | tftp] filename Specifies the system image file to be booted from a
[ip-address] network server using rcp, TFTP, or MOP.
or
Router(config)# boot system mop filename [mac-address]
[interface]
Step 3 Router(config)# config-register value Sets the configuration register to enable loading of
the image specified in the configuration file.
Step 4 Router(config)# exit Exits configuration mode.
Step 5 Router# copy system:running-config Saves the configuration file to your startup
nvram:startup-config configuration.
or
Router# copy run start
In the following example, a router uses rcp to boot from the testme5.tester system image file on a
network server at IP address 172.16.0.1:
Router# configure terminal
Router(config)# boot system rcp testme5.tester 172.16.0.1
Router(config)# config-register 0x010F
Router(config)# ^Z
Router# copy system:running-config nvram:startup-config
The following section describes how to change request retry times and frequency if you have configured
your system to boot using the boot system mop command.
Command Purpose
Step 1 Router# configure terminal Enters configuration mode from the terminal.
Step 2 Router(config)# mop device-code {cisco | ds200} mop Changes MOP server parameters.
retransmit-timer seconds mop retries count
Step 3 Router(config)# end Exits configuration mode.
Step 4 Router# copy running-config startup-config Saves the configuration file to your startup
configuration.
In the following example, if the MOP boot server does not respond within 10 seconds after the router
sends a message, the software will resend the message:
Router# configure terminal
Router (config)# mop retransmit-timer 10
Router (config)# end
Router# copy running-config startup-config
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router(config)# boot system rom Specifies use of the ROM system image as a backup
image.
Step 3 Router(config)# config-register value Sets the configuration register to enable loading of
the system image specified in the configuration file.
Step 4 Router(config)# end Exits global configuration mode.
Step 5 Router# copy system:running-config Saves the configuration file to your startup
nvram:startup-config configuration.
Note The Cisco 7000 series routers cannot load from ROM.
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router(config)# boot system flash Configures the router to boot from Flash memory.
[flash-filesystem:][partition-number:] filename
Step 3 Router(config)# boot system [rcp | tftp] filename Configures the router to boot from a network server.
[ip-address]
Step 4 Router(config)# boot system rom Configures the router to boot from ROM.
Step 5 Router(config)# config-register value Sets the configuration register to enable loading of
the system image specified in the configuration file.
Step 6 Router(config)# end Exits global configuration mode.
Step 7 Router# copy system:running-config Saves the configuration file to your startup
nvram:startup-config configuration.
In the following example, a router is configured to first boot an internal Flash image named gsxx. Should
that image fail, the router will boot the configuration file gsxx from a network server. If that method
should fail, then the system will boot from ROM.
Router# configure terminal
Router(config)# boot system flash gsxx
Router(config)# boot system gsxx 172.16.101.101
Router(config)# boot system rom
Router(config)# config-register 0x010F
Router(config)# end
Router# copy system:running-config nvram:startup-config
[ok]
Using this strategy, a router has three alternative sources from which to boot. These alternative sources
help lessen the negative effects of a failure on network or file server.
Note Recovering system images using Xmodem or Ymodem is performed only on the Cisco 1600 series
and Cisco 3600 series routers.
Xmodem and Ymodem are common protocols used for transferring files and are included in applications
such as Windows 3.1 (TERMINAL.EXE), Windows 95 (HyperTerminal), Windows NT 3.5x
(TERMINAL.EXE), Windows NT 4.0 (HyperTerminal), and Linux UNIX freeware (minicom).
Cisco 3600 series routers do not support XBOOT functionality, a disaster recovery technique for
Cisco IOS software, and do not have a separate boot helper (rxboot) image.
Xmodem and Ymodem downloads are slow, so you should use them only when you do not have access
to a network server. You can speed up the transfer by setting the transfer port speed to 115200 bps.
On the Cisco 3600 series routers, you can perform the file transfer using Cisco IOS software or, if all
local system images are damaged or erased, the ROM monitor. When you use Cisco IOS software for an
Xmodem or Ymodem file transfer, the transfer can occur on either the AUX port or the console port. We
recommend the AUX port, which supports hardware flow control. File transfers from the ROM monitor
must use the console port.
On the Cisco 1600 series routers, you can only perform the file transfer from the ROM monitor over the
console port.
Figure 10 Copying a System Image to a Cisco 3600 Series Router with Xmodem or Ymodem
Telephone Modem
network
Modem
Cisco 3600 series router
downloading a Cisco IOS Remote PC
software image from a running terminal
remote or local PC emulation software
Local PC running and Xmodem
terminal emulation
S4997
software and Xmodem
To copy a Cisco IOS image from a computer or workstation to a router using the Xmodem or Ymodem
protocol, use the following commands, as needed:
Command Purpose
Router# copy xmodem: Copies a system image from a computer to
flash-filesystem:[partition:][filename] Flash memory using Cisco IOS software in
or EXEC mode (Cisco 3600 series routers only).
Router# copy ymodem:
flash-filesystem:[partition:][filename]
ROMMON > xmodem [-c] [-y] [-e] [-f] [-r] [-x] Copies a system image from a computer to
[-s data-rate] [filename] Flash memory in ROM monitor mode for the
Cisco 1600 series routers.
The -c option provides CRC-16
checksumming; -y uses the Ymodem protocol;
-e erases the first partition in Flash memory; -f
erases all of Flash memory; -r downloads the
image to DRAM (the default is Flash memory);
-x prevents the image from executing after
download; and -s sets the console port data
rate.
ROMMON > xmodem [-c | -y | -r | -x] [filename] Copies a system image from a computer to
Flash memory in ROM monitor mode for the
Cisco 3600 series routers.
The computer from which you transfer the Cisco IOS image must be running terminal emulation
software and the Xmodem or Ymodem protocol.
For the Cisco 1600 series routers, if you include the -r option (download to DRAM), your router must
have enough DRAM to hold the file being transferred. To run from Flash memory, an image must be
positioned as the first file in Flash memory. If you are copying a new image to boot from Flash memory,
erase all existing files first.
To transfer a Cisco IOS image from a computer running terminal emulation software and the Xmodem
protocol, perform the following steps:
Step 1 Place a Cisco IOS software image on the remote computer’s hard drive. You can download an image
from Cisco.com.
Step 2 To transfer from a remote computer, connect a modem to the AUX port of your Cisco 3600 series router
and to the standard telephone network. The AUX port is set by default to a speed of 9600 bps, 2 stop bits,
and no parity. The maximum speed is 115200 bps. Configure the router for both incoming and outgoing
calls by entering the modem inout line configuration command.
Connect a modem to the remote computer and to the telephone network. The remote computer dials
through the telephone network and connects to the router.
To transfer from a local computer, connect the router’s AUX port to a serial port on the computer, using
a null-modem cable. The AUX speed configured on the router must match the transfer speed configured
on the local computer.
Step 3 At the EXEC prompt in the terminal emulator window of the computer, enter the copy xmodem: flash:
EXEC command:
Router# copy xmodem: flash:
**** WARNING ****
x/ymodem is a slow transfer protocol limited to the current speed
settings of the auxiliary/console ports. The use of the auxiliary
port for this download is strongly recommended.
During the course of the download no exec input/output will be
available.
---- ******* ----
Step 5 Determine how many times the software should try to receive a bad block of data before it declares the
copy operation a failure. The default is ten retries. A higher number may be needed for noisy telephone
lines. You can configure an unlimited number of retries.
Max Retry Count [10]: 7
Step 6 Decide whether you want to check that the file is a valid Cisco 3600 series image:
Perform image validation checks? [confirm]
Xmodem download using simple checksumming with image validation
Continue? [confirm]
After the transfer has begun, and if the image is valid, the software determines whether enough Flash
memory space exists on the router to accommodate the transfer:
System flash directory:
File Length Name/status
1 1738244 images/c3600-i-mz
[1738308 bytes used, 2455996 available, 4194304 total]
Step 8 If you do not want the contents of internal Flash memory erased before the file transfer, enter no:
Erase flash device before writing? [confirm] no
Step 9 Start an Xmodem or Ymodem send operation with the terminal emulation software on the computer that
is sending the system image to the router. See your emulation software application’s documentation for
instructions on how to execute a file transfer. Depending on the application you use, the emulation
software may display the progress of the file transfer.
Caution A modem connection from the telephone network to your console port introduces security issues that
you should consider before enabling the connection. For example, remote users can dial in to your
modem and access the router’s configuration settings.
Step 1 Place a Cisco IOS software image on the remote computer’s hard drive. You can download an image
from Cisco.com or from the Feature Pack (Cisco 1600 series routers only).
Step 2 To transfer from a remote computer, connect a modem to the console port of your router and to the
standard telephone network. The modem and console port must communicate at the same speed, which
can be from 9600 to 115200 bps (Cisco 3600 series routers) or from 1200 to 115200 bps (Cisco 1600
series routers), depending on the speed supported by your modem. Use the confreg ROM monitor
command to configure the console port transmission speed for the router. For the Cisco 1600 series
routers, you can also set the transmission speed with the -s option.
Connect a modem to the remote computer and to the telephone network. The remote computer dials
through the telephone network and connects to the router.
To transfer from a local computer, connect the router’s console port to a serial port on the computer,
using a null-modem cable. The console port speed configured on the router must match the transfer speed
configured on the local computer.
Note If you are transferring from a local computer, you may need to configure the terminal
emulation program to ignore Request To Send (RTS)/data terminal ready (DTR) signals.
Step 3 You should see a ROM monitor prompt in the terminal emulation window:
rommon >
Enter the xmodem ROM monitor command, along with any desired copy options and, optionally, the
filename of the Cisco IOS image. The image loads into Flash memory by default; to download to DRAM
instead, use the -r option. The image is normally executed on completion of the file transfer; to prevent
execution, use the -x option. The -c option specifies CRC-16 checksumming, which is more
sophisticated and thorough than standard checksumming, if it is supported by the computer:
rommon > xmodem -c new-ios-image
Do not start the sending program yet...
File size Checksum File name
1738244 bytes (0x1a8604) 0xdd25 george-admin/c3600-i-mz
Step 4 Start an Xmodem send operation, which is initiated from the terminal emulation software on the remote
computer that is sending the system image to the router. See your emulation software application’s
documentation for instructions on how to execute an Xmodem file transfer.
Step 5 The Cisco IOS image is transferred and executed. If you are transferring from a remote computer, the
computer maintains control of your console port even after the new Cisco IOS image is running. To
release control to a local terminal, reconfigure the speed of the router’s console port to match the speed
of the local terminal by entering the speed bps line configuration command from the remote computer
at the router prompt:
Router# configure terminal
Router(config)# line 0
Router(config-line)# speed 9600
The remote connection is broken, and you can disconnect the modem from the console port and
reconnect the terminal line.
Command Purpose
Step 1 Router# copy tftp: flash: (Optional) Copies microcode files into Flash.
Perform this step only if you want to load the
or microcode from Flash.
Router# copy tftp: file-id
See the section “Copying Images from a Network
Server to Flash Memory” for more information
about how to copy images to Flash memory.
Step 2 Router# configure terminal Enters global configuration mode.
Step 3 Router(config)# microcode interface Configures the router to load microcode on a target
[flash-filesystem:filename [slot] | system [slot]] interface from the specified memory location.
Step 4 Router(config)# end Exits global configuration mode.
Step 5 Router# copy system:running-config Saves the new configuration information.
nvram:startup-config
If an error occurs when you are attempting to download microcode, the system loads the default system
microcode image.
Command Purpose
Router(config)# microcode reload Reloads the microcode from the source specified in the
configuration on to all interface and processor cards.
Immediately after you enter the microcode reload global configuration command and press Return, the
system reloads all microcode. Global configuration mode remains enabled. After the reload is complete,
enter the exit global configuration command to return to the EXEC prompt.
If Flash memory is busy because a card is being removed or inserted, or a microcode reload command
is executed while Flash is locked, the files will not be available and the onboard ROM microcode will
be loaded. Issue another microcode reload command when Flash memory is available, and the proper
microcode will be loaded. The show flash EXEC command will reveal if another user or process has
locked Flash memory.
Note The microcode reload command should not be used while Flash is in use. For example, do not use
this command when a copy {ftp: | rcp: | tftp:} flash-filesystem or show flash-filesystem: EXEC
command is active.
The microcode reload command is automatically added to your running configuration when you issue
a microcode command that changes the system’s default behavior of loading all processors from ROM.
In the following example, all controllers are reset, the specified microcode is loaded, and the CxBus
complex is reinitialized according to the microcode configuration commands that have been written to
memory:
Router# configure terminal
Router(config)# microcode reload
Router(config)# end
Command Purpose
Router# show microcode Displays microcode information.
Command Purpose
Step 1 Router(config)# microcode {oc12-atm | oc12-pos | Specifies the type of line card, location of the
oc3-pos-4} flash file_id slot-number microcode image, and the slot of the line card to
download the image. If the slot number is omitted,
the microcode image is downloaded to all line
cards.
Step 2 Router(config)# microcode reload slot-number Reloads the microcode on the specified line card.
Step 3 Router(config)# exit Exits configuration mode.
Step 4 Router# execute-on slot slot-number show version Connects to the line card and verifies that the new
Cisco IOS image is on the line card by checking the
or version number in the display output.
Router# attach slot-number
For further configuration information for Cisco 12000 series routers, see the documentation for
Cisco IOS Release 11.2, Cisco IOS Release 12.0S, and Cisco IOS Release 12.2S, available on
Cisco.com. For further platform specific documentation see
http://www.cisco.com/univercd/cc/td/doc/product/core/.
This document first published April 30, 2001. Last updated February 15, 2005 (minor update).
This chapter describes how to maintain and use the different types of memory on your router. This
document applies to Cisco IOS Release 12.2.
For a complete description of the memory commands mentioned in this chapter, refer to the “Router
Memory Commands” chapter in the Release 12.2 Cisco IOS Configuration Fundamentals Command
Reference. To locate documentation of other commands that appear in this chapter, use the Cisco IOS
Command Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
DRAM
Dynamic random-access memory (DRAM) contains two types of memory:
• Primary, main, or processor memory, which is reserved for the CPU to execute Cisco IOS software
and to hold the running configuration and routing tables.
• Shared, packet, or I/O memory, which buffers data transmitted or received by the router’s network
interfaces.
On the Cisco 3600 series routers, you can use the memory-size iomem command to configure the
proportion of DRAM devoted to main memory and to shared memory.
DRAM often comes on dual in-line memory modules (DIMMs).
EPROM
Erasable programmable read-only memory (EPROM) is often referred to simply as ROM. On Cisco
devices, the EPROM often contains the following:
• ROM Monitor software, which provides a user interface for troubleshooting the ROM.
• The boot loader/helper software, which helps the router boot when it cannot find a valid Cisco IOS
image in Flash memory.
NVRAM
Non-volatile random-access-memory (NVRAM) stores the following information:
• Startup configuration file for every platform except Class A Flash file system platforms (for Class
A Flash file system platforms, the location of the startup configuration depends on the
CONFIG_FILE Environment Variable).
• The software configuration register, which is used to determine which image to use when booting
the router.
Flash Memory
Flash memory stores the Cisco IOS software image. On most platforms, it can store boot-images and/or
configuration files.
Depending on the hardware platform, Flash memory might be available as EPROM, single in-line
memory modules (SIMMs), dual in-line memory modules (DIMMs), or Flash memory cards. Check the
appropriate hardware installation and maintenance guide for information about types of Flash memory
available on a specific platform.
Depending on the platform, Flash memory is available in the following forms:
• Internal Flash memory
– Internal Flash memory often contains the system image.
– Some platforms have two or more banks of Flash memory on one in-line memory module (in
other words, on one SIMM). If the SIMM has two banks, it is sometimes referred to as
dual-bank Flash memory. The banks can be partitioned into separate logical devices. See the
“Partitioning Flash Memory” section for information about how to partition Flash memory.
• Bootflash
– Bootflash often contains the boot image.
– Bootflash sometimes contains the ROM Monitor.
• Flash memory PC cards or PCMCIA cards
A Flash memory card that is inserted in to a Personal Computer Memory Card International
Association (PCMCIA) slot. This card is used to store system images, boot images, and
configuration files.
Note Because some platforms, such as the Cisco 3600 series and Cisco the 7000 family, can boot images
and load configuration files from several locations, these systems use special ROM monitor
environment variables to specify the location and filename of images and configuration files that the
router is to use for various functions.
Many Cisco routers load the system image from flash storage into RAM in order to run the Cisco IOS.
However, some platforms, such as the Cisco 1600 Series and Cisco 2500 Series, execute the Cisco IOS
operation system directly from Flash memory. These platforms are run-from-Flash memory systems.
If you want to partition Flash memory, you must use a relocatable image. Relocatable images can be run
from any location in Flash and can download images to any location. If you are upgrading from a
nonrelocatable image to a relocatable image, you must erase Flash memory during the download so that
the image is downloaded as the first file in Flash memory. All images for run-from-Flash platforms from
Cisco IOS Release 11.0 and later are relocatable. See the “Image Naming Conventions” section in the
“Loading and Maintaining System Images” chapter to determine if your images are run-from-Flash
images or are relocatable.
Flash memory provides write protection against accidental erasing or reprogramming. Some platforms
have a write-protect jumper which can be removed to prevent reprogramming of Flash memory. You
must install the jumper when programming is required. Some platforms have write protect switched on
Flash memory cards that you can use to protect data. You must set the switch to unprotected to write data
to the Flash memory card. Refer to your hardware documentation for information on security jumpers
and write protect switches.
Note The internal Flash and Flash memory cards of a system cannot be used as a contiguous bank of Flash
memory.
Command Purpose
Router# show flash-filesystem: [all | chips | filesys] Lists information about Flash memory for Class A
file systems.
Router# show flash-filesystem: [partition number] [all | chips Lists information about Flash memory for Class B
| detailed | err | summary] file systems.
Router# show flash-filesystem: Lists information about Flash memory for Class C
file systems.
Router# show file systems Lists the names of the file systems currently
supported on the router.
Command Purpose
Router(config)# partition flash partitions [size1 size2] Partitions Flash memory.
Router(config)# partition flash-filesystem: Partitions Flash memory on the Cisco 1600 and
[number-of-partitions] [partition-size] 3600 series.
This task will succeed only if the system has at least two banks of Flash and the partitioning does not
cause an existing file in Flash memory to be split across the partitions.
For all platforms except the Cisco 1600 series and Cisco 3600 series, Flash memory can only be
partitioned into two partitions.
For the Cisco 1600 series and Cisco 3600 series, the number of partitions that you can create in a Flash
memory device equals the number of banks in the device. Enter the show flash-filesystem: all command
to view the number of banks on the Flash memory device. The number of partition size entries you set
must be equal to the number of specified partitions. For example, the partition slot0: 2 8 8 command
configures two partitions to be 8 MB in size each. The first 8 corresponds to the first partition; the
second 8 corresponds to the second partition.
Flash load helper can also be used on systems with multiple banks of Flash memory that support Flash
memory partitioning. Flash load helper enables you to download a new file into the same partition from
which the system is executing an image.
For information about how to partition multiple banks of Flash memory so your system can hold two
different images, see the “Partitioning Flash Memory” section.
Command Purpose
Router# copy tftp: flash: Loads the specified file to Flash memory.
Router# copy rcp: flash:
Router# copy ftp: flash:
The following error message displays if you are in a Telnet session and the system is set for manual
booting (the boot bits in the configuration register are zero):
ERR: Config register boot bits set for manual booting
In case of any catastrophic failure in the Flash memory upgrade, this error message helps to minimize
the chance of the system going down to ROM monitor mode and being taken out of the remote Telnet
user’s control.
The system tries to bring up at least the boot ROM image if it cannot boot an image from Flash memory.
Before reinitiating the copy: command, you must set the configuration register boot field to a nonzero
value, using the config-register global configuration command.
The copy command initiates a series of prompts to which you must provide responses. The dialog is
similar to the following:
Router# copy tftp: flash:
Proceed? [confirm] y
System flash directory:
File Length Name/status
1 2251320 abc/igs-kf.914
[2251384 bytes used, 1942920 available, 4194304 total]
Address or name of remote host [255.255.255.255]? 172.16.1.111
Source file name? abc/igs-kf.914
Destination file name [default = source name]? <Return>
Accessing file ‘abc/igs-kf.914’ on 172.16.1.111....
Loading from 172.16.13.111:
Erase flash device before writing? [confirm] n
File ‘abc/igs-kf.914’ already exists; it will be invalidated!
The Flash Load Helper operation verifies the request from the running image by trying to copy a single
block from the remote server. Then the Flash load helper is executed, causing the system to reload to the
ROM-based system image. If the file does not seem to be a valid image for the system, a warning is
displayed and a separate confirmation is sought from you.
If the configuration has been modified but not yet saved, you are prompted to save the configuration:
System configuration has been modified. Save? [confirm]
Users with open Telnet connections are notified of the system reload, as follows:
**System going down for Flash upgrade**
If the copy process fails, the copy operation is retried up to three times. If the failure happens in the
middle of a copy operation so that only part of the file has been written to Flash memory, the retry does
not erase Flash memory unless you specified an erase operation. The partly written file is marked as
deleted, and a new file is opened with the same name. If Flash memory runs out of free space in this
process, the copy operation is terminated.
After Flash load helper finishes copying (whether the copy operation is successful or not), it
automatically attempts an automatic or a manual boot, depending on the value of bit zero of the
configuration register boot field according to the following:
• If bit zero equals 0, the system attempts a default boot from Flash memory to load up the first
bootable file in Flash memory. This default boot is equivalent to a manual boot flash command at
the ROM monitor prompt.
• If bit zero equals 1, the system attempts to boot based on the boot configuration commands. If no
boot configuration commands exist, the system attempts a default boot from Flash memory; that is,
it attempts to load the first bootable file in Flash memory.
To view the system console output generated during the Flash load helper operation, use the image that
has been booted up after the Flash memory upgrade. Use the following command in privileged EXEC
mode:
Command Purpose
Router# more flh:logfile View the console output generated during the Flash load
helper operation.
If you are a remote Telnet user performing the Flash upgrade without a console connection, this task
allows you to retrieve console output when your Telnet connection has terminated due to the switch to
the ROM image. The output indicates what happened during the download, and is particularly useful if
the download fails.
On the Cisco 7000 family, you must format a new Flash memory card before using it in a PCMCIA slot.
Flash memory cards have sectors that can fail. You can reserve certain Flash memory sectors as “spares”
for use when other sectors fail. Use the format command to specify between 0 and 16 sectors as spares.
If you reserve a small number of spare sectors for emergencies, you do not waste space because you can
use most of the Flash memory card. If you specify zero spare sectors and some sectors fail, you must
reformat the Flash memory card and thereby erase all existing data.
The format operation requires at least Cisco IOS Release 11.0 system software.
Caution The following formatting procedure erases all information in Flash memory. To prevent the loss of
important data, proceed carefully.
Use the following procedure to format Flash memory. If you are formatting internal Flash memory, such
as bootflash, you can skip the first step. If you are formatting a Flash memory card, complete both steps.
Step 1 Insert the new Flash memory card into a PCMCIA slot. Refer to instructions on maintaining the router
and replacing PCMCIA cards in your router’s hardware documentation for instructions on performing
this step.
Step 2 Format Flash memory.
Command Purpose
Router# format [spare spare-number] device1: Formats Flash memory.
[[device2:][monlib-filename]]
The following example shows the format command that formats a Flash memory card inserted in slot 0.
Router# format slot0:
Running config file on this device, proceed? [confirm]y
All sectors will be erased, proceed? [confirm]y
Enter volume id (up to 31 characters): <Return>
Formatting sector 1 (erasing)
Format device slot0 completed
When the router returns you to the EXEC prompt, the new Flash memory card is successfully formatted
and ready for use.
Caution Formatting a Flash memory card to recover from locked blocks will cause existing data to be lost.
Figure 11 Components and Uses of DRAM Memory for Cisco 3600 Series Routers
DRAM memory
Note Routers running two or more ISDN PRI interfaces or 12 or more ISDN BRI interfaces require a
DRAM memory configuration of 40 percent I/O memory and 60 percent processor memory.
However, there are cases where you may have to manually reallocate the DRAM memory split between
processor memory and I/O memory after you have received a router from Cisco Systems.
For example, suppose you receive a Cisco 3640 router with the following running configuration:
• 2 Ethernet and 2 WAN interface card
• 8-port ISDN BRI with an NT1 network module
• IP feature set
• 16 MB of DRAM memory (by default, processor memory = 75%, I/O memory = 25%)
• 4 MB of Flash memory
Later, however, you add a 4-port ISDN BRI network module to the router. You now have 12 ISDN BRI
interfaces running on the router. At this point, you must use the memory-size iomem command to
configure 40 percent of the address space for I/O memory and 60 percent for processor memory.
To view your current mix of processor and I/O memory and reassign memory distribution accordingly,
use the following commands beginning in privileged EXEC mode:
Command Purpose
Step 1 Router# show version Displays the total amount of memory loaded on the
router.
Step 2 Router# show memory1 Displays the amount of free memory.
Step 3 Router# configure terminal Enters global configuration mode.
Step 4 Router(config)# memory-size iomem Allocates processor memory and I/O memory.
I/O-memory-percentage2
Step 5 Router(config)# exit Exits global configuration mode.
Step 6 Router# copy system:running-config Saves the configuration to NVRAM.
nvram:startup-config
Step 7 Router# reload Reloads the router to run the new image.
1. The Free(b) column in the show memory command’s output shows how much I/O memory is available.
2. The default is 40 percent for I/O memory and 60 percent for processor memory.
Valid I/O memory percentage values are 10, 15, 20, 25, 30, 40 (the default), and 50. I/O memory size is
the specified percentage of total memory size, rounded down to the nearest multiple of 1 MB. A
minimum of 4 MB of memory is required for I/O memory. The remaining memory is processor memory.
The memory-size iomem command does not take effect until you save it to NVRAM using the copy
system:running-config nvram:startup-config EXEC command and reload the router. However, when
you enter the command, the software checks whether the new memory distribution leaves enough
processor memory for the currently running Cisco IOS image. If not, the following message appears:
Warning: Attempting a memory partition that does not provide enough Processor memory for
the current image.If you write memory now, this version of software may not be able to
run.
When you enter the reload command to run a new image, the software calculates the new processor and
I/O memory split. If there is not enough processor memory, it automatically reduces I/O memory to an
alternative setting to load the image. If there is still not enough processor memory for the image to run,
then you do not have enough DRAM.
[OK]
Router# reload
If the Memory Scan feature has not been configured, or has been turned off, the show memory scan
command generates a report. In the following example, Memory Scan is turned off:
If errors are detected in the system, the show memory scan command generates an error report. In the
following example, Memory Scan detected a parity error:
Router# show memory scan
Memory scan is on.
Total Parity Errors 1.
Address BlockPtr BlckSize Disposit Region Timestamp
6115ABCD 60D5D090 9517A4 Scrubed Local 16:57:09 UTC Thu Mar 18
For an explanation of the error report fields, see the full details on the show memory scan command in
the “Router Memory Commands” chapter of the Release 12.2 Cisco IOS Configuration Fundamentals
Command Reference.
This chapter describes the basic procedure a Cisco device (such as a router) performs when it reboots,
how to alter the procedure, and how to use the ROM monitor.
For a complete description of the booting commands mentioned in this chapter, refer to the “Booting
Commands” chapter in the Release 12.2 Cisco IOS Configuration Fundamentals Command Reference.
To locate documentation of other commands that appear in this chapter, use the Cisco IOS Command
Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Note The configuration register boot field value is expressed in hexadecimal. Because the boot field only
encompasses the last four bits (represented by the last hexadecimal digit) of the configuration register
value, the only digit we are concerned with in this discussion is the last digit. The makes 0x1 (0000
0001) equivalent to 0x101 (1 0000 0001) in discussions of the boot field, as in both cases the last four
bits are 0001.
When the boot field is 0x102 through 0x10F, the router goes through each boot system command in
order until it boots a valid image. If bit 13 in the configuration register is set, each command will be tried
once (bit 13 is indicated by the position occupied by b in the following hexadecimal notation: 0xb000).
If bit 13 is not set, the boot system commands specifying a network server will be tried up to five more
times. The timeouts between each consecutive attempt are 2, 4, 16, 256, and 300 seconds.
If the router cannot find a valid image, the following events happen:
• If all boot commands in the system configuration file specify booting from a network server and all
commands fail, the system attempts to boot the first valid file in Flash memory.
• If the “boot-default-ROM-software” option in the configuration register is set, the router will start
the boot image (the image contained in boot ROM or specified by the BOORLDR environment
variable).
• If the “boot-default-ROM-software” option in the configuration register is not set, the system waits
for user intervention at the ROM monitor prompt. You must boot the router manually.
• If a fully functional system image is not found, the router will not function and must be reconfigured
through a direct console port connection.
Note Refer to your platform documentation for information on the default location of the boot image.
The
ROM monitor
initializes
2 through F
No
No Was
the netboot Yes The router is
successful? ready to use
Are there
more boot No No
system
commands? Did all
of the boot The router boots the
system commands No
boot image in boot
specify ROM or boot flash
Yes netbooting?
Is there
The router boots Yes a valid image No The router boots the
the image in in Flash boot image in boot
Flash memory memory? ROM or boot flash
S6750
Command Purpose
Router# show bootvar Lists the contents of the BOOT environment variable, the
name of the configuration file pointed to by the
CONFIG_FILE environment variable, and the contents of
the BOOTLDR environment variable.
Router# more nvram:startup-config Lists the startup configuration information.
On all platforms except the Class A Flash file systems, the
startup configuration is usually in NVRAM. On Class A
Flash file systems, the CONFIG_FILE environment variable
points to the startup configuration, defaulting to NVRAM.
Router# show version Lists the system software release version, system image
name, configuration register setting, and other information.
Refer to the Release 12.2 Cisco IOS Configuration Fundamentals Command Reference for examples of
these commands.
You can also use the o command (or the confreg command for some platforms) in ROM monitor mode
to list the configuration register settings on some platforms.
Command Purpose
Step 1 Router# show version Obtains the current configuration register setting. The
configuration register is listed as a hexadecimal value.
Step 2 Router# configure terminal Enters global configuration mode.
Step 3 Router(config)# config-register value Modifies the existing configuration register setting to reflect
the way in which you want to load a system image. The
configuration register value is in hexadecimal form with a
leading “0x.”
Step 4 Router(config)# end Exits configuration mode.
Command Purpose
Step 5 Router# show version (Optional) Verifies that the configuration register setting is
correct. Repeat steps 2 through 5 if the setting is not correct.
Step 6 Router# copy running-config startup-config Saves the running configuration to the startup configuration.
Step 7 Router# reload (Optional) Reboots the router to make your changes take
effect.
In ROM monitor mode, use the o command or the confreg command on some platforms to list the value
of the configuration register boot field.
Modify the current configuration register setting to reflect the way in which you want to load a system
image. To do so, change the least significant hexadecimal digit to one of the following:
• 0 to load the system image manually using the boot command in ROM monitor mode.
• 1 to load the system image from boot ROMs. On the Cisco 7200 series and Cisco 7500 series, this
setting configures the system to automatically load the system image from bootflash.
• 2–F to load the system image from boot system commands in the startup configuration file or from
a default system image stored on a network server.
For example, if the current configuration register setting is 0x101 and you want to load a system image
from boot system commands in the startup configuration file, you would change the configuration
register setting to 0x102.
cisco 4500 (R4K) processor (revision 0x00) with 32768K/4096K bytes of memory.
Processor board ID 01242622
R4600 processor, Implementation 32, Revision 1.0
G.703/E1 software, Version 1.0.
Bridging software.
SuperLAT software copyright 1990 by Meridian Technology Corp).
X.25 software, Version 2.0, NET2, BFE and GOSIP compliant.
TN3270 Emulation software (copyright 1994 by TGV Inc).
Basic Rate ISDN software, Version 1.0.
2 Ethernet/IEEE 802.3 interfaces.
2 Token Ring/IEEE 802.5 interfaces.
4 ISDN Basic Rate interfaces.
This environment variable allows you to have several boot images. After you save the BOOTLDR
environment variable to your startup configuration, the router checks the variable upon startup to
determine which boot image to use if the system cannot be loaded.
Note Refer to your platform documentation for information on the default location of the boot image.
Note When you use these three global configuration commands, you affect only the running configuration.
You must save the environment variable settings to your startup configuration to place the
information under ROM monitor control and for the environment variables to function as expected.
Use the copy system:running-config nvram:startup-config command to save the environment
variables from your running configuration to your startup configuration.
You can view the contents of the BOOT, BOOTLDR, and the CONFIG_FILE environment variables by
issuing the show bootvar command. This command displays the settings for these variables as they exist
in the startup configuration as well as in the running configuration if a running configuration setting
differs from a startup configuration setting.
Use the more nvram:startup-config command to display the contents of the configuration file pointed
to by the CONFIG_FILE environment variable.
Command Purpose
Step 1 Router# dir [flash-filesystem:] Verifies that internal Flash or bootflash contains the boot
helper image.
Step 2 Router# configure terminal Enters the configuration mode from the terminal.
Step 3 Router(config)# boot bootldr file-url Sets the BOOTLDR environment variable to specify the
Flash device and filename of the boot helper image. This
step modifies the runtime BOOTLDR environment variable.
Step 4 Router# end Exits configuration mode.
Step 5 Router# copy system:running-config Saves the configuration you just performed to the system
nvram:startup-config startup configuration.
Step 6 Router# show bootvar (Optional) Verifies the contents of the BOOTLDR
environment variable.
The following example sets the BOOTLDR environment to change the location of the boot helper image
from internal Flash to slot 0.
Router# dir bootflash:
-#- -length- -----date/time------ name
1 620 May 04 1995 26:22:04 rsp-boot-m
2 620 May 24 1995 21:38:14 config2
Command Purpose
Router# reload in [hh:]mm [text] Schedules a reload of the software to take effect in mm
minutes (or hh hours and mm minutes) from now.
Router# reload at hh:mm [month day | day month] [text] Schedules a reload of the software to take place at the
specified time (using a 24-hour clock). If you specify the
month and day, the reload is scheduled to take place at the
specified time and date. If you do not specify the month and
day, the reload takes place at the specified time on the
current day (if the specified time is later than the current
time), or on the next day (if the specified time is earlier than
the current time). Specifying 00:00 schedules the reload for
midnight.
Note The at keyword can only be used if the system clock has been set on the router (either through NTP,
the hardware calendar, or manually). The time is relative to the configured time zone on the router.
To schedule reloads across several routers to occur simultaneously, the time on each router must be
synchronized with NTP. For information on configuring NTP, see the “Performing Basic System
Management” chapter in the Cisco IOS Network Management Configuration Guide, Release 12.4.
The following example illustrates how to use the reload command to reload the software on the router
on the current day at 7:30 p.m.:
Router# reload at 19:30
Reload scheduled for 19:30:00 UTC Wed Jun 5 1996 (in 2 hours and 25 minutes)
Proceed with reload? [confirm]
The following example illustrates how to use the reload command to reload the software on the router
at a future time:
Router# reload at 02:00 jun 20
Reload scheduled for 02:00:00 UTC Thu Jun 20 1996 (in 344 hours and 53 minutes)
Proceed with reload? [confirm]
Command Purpose
Router# show reload Displays reload information, including the time the reload is
scheduled to occur, and the reason for the reload if it was
specified when the reload was scheduled.
Command Purpose
Router# reload cancel Cancels a previously scheduled reload of the software.
The following example illustrates how to use the reload cancel command to stop a scheduled reload:
Router# reload cancel
Router#
***
*** --- SHUTDOWN ABORTED ---
***
Command Purpose
Step 1 Router# reload Enter ROM monitor mode from privileged EXEC mode.
1
Press the Break key during the first 60
seconds while the system is booting.
Step 2 ? List the ROM monitor commands.
1. This key will not work on the Cisco 7000 unless it has at least Cisco IOS Release 10 boot ROMs.
Timesaver If you are planning to use ROM monitor mode on a regular basis, or wish users to load using ROM
monitor commands, you can configure the system to default to ROMMON. To automatically boot
your system in ROM monitor mode, reset the configuration register to 0x0 by using the config-register
0x0 configuration command. The new configuration register value, 0x0, takes effect after the router
or access server is rebooted with the reload command. If you set the configuration to 0x0, you will
have to manually boot the system from the console each time you reload the router or access server.
To exit ROMMON mode, use the continue command. If you have changed the configuration, use the
copy running-config startup-config command and then issue the reload command to save your
configuration changes.
If your options appear in the above menu-type format, you can use the listed aliased commands. To
initialize the router or access server, enter the i command. The i command causes the bootstrap program
to reinitialize the hardware, clear the contents of memory, and boot the system. To boot the system image
file, use the b command.
The ROM monitor software characteristics will vary depending on your platform. For further details on
ROM monitor mode commands, refer to the appropriate hardware installation guide, or perform a search
on Cisco.com.
Command Purpose
ROMMON > boot flash [filename] Manually boot the router from Flash. Refer to your
ROMMON > boot flash partition-number:[filename] hardware documentation for the correct form of this
ROMMON > boot flash flash:[ partition-number:] [filename]
ROMMON > boot [flash-fs:][partition-number:][filename]
command to use.
(Cisco 1600 series and Cisco 3600 series)
ROMMON >
boot device:[filename] (Cisco 7000 family)
If the filename is not specified, the first bootable file found in the device and partition is used.
In the following example, a router is manually booted from Flash memory. Because the optional filename
argument is absent, the first valid file in Flash memory is loaded.
> boot flash
F3: 1858656+45204+166896 at 0x1000
In the following example, the boot flash command is used with the filename gs7-k—the name of the file
that is loaded:
> boot flash gs7-k
F3: 1858656+45204+166896 at 0x1000
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR
RRRRRRRRRRRRRR [OK - 1903912/13765276 bytes]
F3: 1858676+45204+166896 at 0x1000
The following command instructs the ROM monitor to boot the first file in the first partition of internal
Flash memory:
> boot flash:
This command instructs the ROM monitor to boot the first file in the second partition of the Flash
memory card in slot 0:
> boot slot0:2:
In this example, the ROM monitor boots the file named image name from the third partition of the Flash
memory card in slot 0:
> boot slot0:3:imagename
The following command fails to specify a valid device type (flash:, slot0:, or slot1:), so the ROM
monitor invokes the boot helper to boot a system image.
> boot flash
Command Purpose
ROMMON > boot filename [ip-address] Manually boots the router from a network file.
In the following example, a router is manually booted from the network file network1:
>boot network1
Command Purpose
ROMMON > boot Manually boots the router from ROM.
On the Cisco 7200 series and Cisco 7500 series, the boot command loads the first bootable image located
in bootflash.
Command Purpose
ROMMON > boot system mop filename [mac-address] Manually boots the router using MOP.
[interface]
The Cisco 7200 series and Cisco 7500 series do not support the boot mop command.
In the following example, a router is manually booted from a MOP server:
>boot mop network1
Command Purpose
ROMMON > continue Resumes loading the startup configuration file and brings
the user to EXEC mode.
This chapter describes how to configure a router as a Trivial File Transfer Protocol (TFTP) or Reverse
Address Resolution Protocol (RARP) server, configure the router to forward extended BOOTP requests
over asynchronous interfaces, and configure rcp, rsh, and FTP in Cisco IOS Release 12.2.
For a complete description of the file transfer function commands mentioned in this chapter, refer to the
“Basic File Transfer Services Commands” chapter in the Release 12.2 Cisco IOS Configuration
Fundamentals Command Reference. To locate documentation of other commands that appear in this
chapter, use the Cisco IOS Command Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Note For the Cisco 7000 family, the filename used must represent a software image that is present in Flash
memory. If no image resides in Flash memory, the client router will boot the server’s ROM image as
a default.
Flash memory can be used as a TFTP file server for other routers on the network. This feature allows
you to boot a remote router with an image that resides in the Flash server memory.
Some Cisco devices allow you to specify one of the different Flash memory locations (bootflash:, slot0:,
slot1:, slavebootflash:, slaveslot0:, or slaveslot1:) as the TFTP server.
In the description that follows, one Cisco 7000 router is referred to as the Flash server, and all other
routers are referred to as client routers. Example configurations for the Flash server and client routers
include commands as necessary.
Caution For full functionality, the software image sent to the client must be the same type as the ROM
software installed on the client router. For example, if the server has X.25 software, and the client
does not have X.25 software in ROM, the client will not have X.25 capabilities after booting from
the server’s image in Flash memory.
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router(config)# tftp-server flash Specifies the system image to send in response to Read
[partition-number:]filename1 [alias filename2] Requests. You can enter multiple lines to specify
[access-list-number]
multiple images.
or
Router(config)# tftp-server flash device:filename
(Cisco 7000 family only)
or
Router(config)# tftp-server flash
[device:][partition-number:]filename
(Cisco 1600 series and Cisco 3600 series only)
or
Router(config)# tftp-server rom alias filename1
[access-list-number]
Step 3 Router(config)# end Ends the configuration session and returns you to
privileged EXEC mode.
Step 4 Router# copy running-config startup-config Saves the running configuration to the startup
configuration file.
The TFTP session can sometimes fail. TFTP generates the following special characters to help you
determine why a TFTP session fails:
• An “E” character indicates that the TFTP server received an erroneous packet.
• An “O” character indicates that the TFTP server received an out-of-sequence packet.
• A period (.) indicates a timeout.
For diagnosing any undue delay in the transfer, the output is useful. For troubleshooting procedures,
refer to the Internetwork Troubleshooting Guide publication.
In the following example, the system can use TFTP to send copies of the Flash memory file version-10.3
in response to a TFTP Read Request for that file. The requesting host is checked against access list 22.
tftp-server flash version-10.3 22
In the following example, the system can use TFTP to send a copy of the ROM image gs3-k.101 in
response to a TFTP Read Request for the gs3-k.101 file:
tftp-server rom alias gs3-k.101
The following example a router to send a copy of the file gs7-k.9.17 in Flash memory in response to a
TFTP Read Request. The client router must reside on a network specified by access list 1. Thus, in the
example, the any clients on network 172.16.101.0 are permitted access to the file.
Server# configure terminal
Enter configuration commands, one per line. End with CTRL/Z
Server(config)# tftp-server flash gs7-k.9.17 1
Server(config)# access-list 1 permit 172.16.101.0 0.0.0.255
Server(config)# end
Server# copy running-config startup-config
[ok]
Server#
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router(config)# no boot system (Optional) Removes all previous boot system
statements from the configuration file.
Step 3 Router(config)# boot system [tftp] filename Specifies that the client router load a system image
[ip-address] from the server.
Step 4 Router(config)# boot system rom Specifies that the client router loads its own ROM
image if the load from a server fails.
Step 5 Router(config)# config-register value Sets the configuration register to enable the client
router to load a system image from a network server.
Step 6 Router(config)# end Exits global configuration mode.
Step 7 Router# copy running-config startup-config Saves the configuration file to your startup
configuration.
Step 8 Router# reload (Optional) Reloads the router to make your changes
take effect.
After the system reloads, you should use the show version EXEC mode command to verify that the
system booted the desired image.
Caution Using the no boot system command, as in the following example, will invalidate all other boot
system commands currently in the client router system configuration. Before proceeding, determine
whether the system configuration stored in the client router should first be saved (uploaded) to a
TFTP file server so you have a backup copy.
In the following example, the router is configured to boot from a specified TFTP server:
Client# configure terminal
Enter configuration commands, one per line. End with CTRL/Z
Client(config)# no boot system
Client(config)# boot system c5300-js-mz.121-5.T.bin 172.16.111.111
Client(config)# boot system rom
Client(config)# config-register 0x010F
Client(config)# end
Client# copy running-config startup-config
[ok]
Client# reload
In this example, the no boot system command invalidates all other boot system commands currently in
the configuration memory, and any boot system commands entered after this command will be executed
first. The second command, boot system filename address, tells the client router to look for the file
c5300-js-mz.121-5.T.bin on the TFTP server with an IP address of 172.16.111.111. Failing this, the
client router will boot from its system ROM in response to the boot system rom command, which is
included as a backup in case of a network problem. The copy running-config startup-config command
copies the configuration to the startup configuration, and the reload command boots the system.
Note The system software to be booted from the server must reside in Flash memory on the server. If it is
not in Flash memory, the client router will boot the server’s system ROM.
The following example shows sample output of the show version command after the router has rebooted:
Router> show version
.
.
.
The important information in this example is contained in the first line “Cisco IOS (tm)..” and in the line
that begins “System image file....” The “Cisco IOS (tm)...” line shows the version of the operating
system in NVRAM. The “System image file....” line show the filename of the system image loaded from
the TFTP server.
To configure the router as a RARP server, use the following commands, beginning in global
configuration mode:
Command Purpose
Router(config)# interface type [slot/]port Specifies the interface that you will be configuring the
RARP service on and enters interface configuration
mode for the specified interface.
Router(config-if)# ip rarp-server ip-address Enables the RARP service on the router.
Figure 13 illustrates a network configuration in which a router is configured to act as a RARP server for
a diskless workstation. In this example, the Sun workstation attempts to resolve its MAC (hardware)
address to an IP address by sending a SLARP request, which is forwarded by the router to the Sun server.
Sun server
172.30.3.100
E1 172.30.3.4
Router A
E0 172.30.2.4
Sun workstation
172.30.2.5
S1495a
Mac address
0800.2002.ff5b
The Sun client and server’s IP addresses must use the same major network number because of a
limitation with the current SunOS rpc.bootparamd daemon.
In the following example, an access server is configured to act as a RARP server.
! Allow the access server to forward broadcast portmapper requests
ip forward-protocol udp 111
! Provide the access server with the IP address of the diskless sun
Command Purpose
Router(config)# async-bootp tag [:hostname] data Configures extended BOOTP requests for asynchronous interfaces.
You can display the extended data that will be sent in BOOTP responses by using the following command
in EXEC mode:
Command Purpose
Router# show async bootp Displays parameters for BOOTP responses.
For example, if the DNS server address is specified as extended data for BOOTP responses, you will see
output similar to the following:
Router# show async bootp
The following extended data will be sent in BOOTP responses:
dns-server 172.22.53.210
For information about configuring your Cisco device as a BOOTP server, see the “Using AutoInstall and
Setup” chapter.
Command Purpose
Router(config)# ip rcmd source-interface interface-id Specifies the interface address that will be used to label
all outgoing rsh and rcp traffic.
Specifying the source-interface is most commonly used to specify a loopback interface. This allows you
to associate a permanent IP address with RCMD communications. Having a permanent IP address is
useful for session identification (remote device can consistently idendify the origin of packets for the
session). A “well-known” IP address can also be used for security purposes, as you can then create access
lists on remote devices which include the address.
Command Purpose
Router(config)# no ip rcmd domain-lookup Disables the Domain Name Service (DNS) reverse
lookup function for remote command (rcmp)
applications (rsh and rcp).
Configuring the Router to Allow Remote Users to Execute Commands Using rsh
To configure the router as an rsh server, use the following commands in global configuration mode:
Command Purpose
Step 1 Router(config)# ip rcmd remote-host local-username Creates an entry in the local authentication database
{ip-address | host} remote-username [enable [level]] for each remote user who is allowed to execute rsh
commands.
Step 2 Router(config)# ip rcmd rsh-enable Enables the software to support incoming rsh
commands.
To disable the software from supporting incoming rsh commands, use the no ip rcmd rsh-enable
command.
Note When support of incoming rsh commands is disabled, you can still issue an rsh command to be
executed on other routers that support the remote shell protocol and on UNIX hosts on the network.
The following example shows how to add two entries for remote users to the authentication database,
and enable a router to support rsh commands from remote users:
ip rcmd remote-host Router1 172.16.101.101 rmtnetad1
ip rcmd remote-host Router1 172.16.101.101 netadmin4 enable
ip rcmd rsh-enable
The users, named rmtnetad1 and netadmin4, are both on the remote host at IP address 172.16.101.101.
Although both users are on the same remote host, you must include a unique entry for each user. Both
users are allowed to connect to the router and remotely execute rsh commands on it after the router is
enabled for rsh. The user named netadmin4 is allowed to execute privileged EXEC mode commands on
the router. Both authentication database entries give the router’s host name Router1 as the local
username. The last command enables the router for to support rsh commands issued by remote users.
.
Command Purpose
Step 1 Router> enable [password] Enters privileged EXEC mode.
Step 2 Router# rsh {ip-address | host} [/user username] Executes a command remotely using rsh.
remote-command
The following example executes the “ls -a” command in the home directory of the user sharon on
mysys.cisco.com using rsh:
Router# enable
Router# rsh mysys.cisco.com /user sharon ls -a
.
..
.alias
.cshrc
.emacs
.exrc
.history
.login
.mailrc
.newsrc
.oldnewsrc
.rhosts
.twmrc
.xsession
jazz
Router#
Command Purpose
Step 1 Router(config)# ip rcmd remote-host local-username Create an entry in the local authentication database
{ip-address | host} remote-username [enable [level]] for each remote user who is allowed to execute rcp
commands.
Step 2 Router(config)# ip rcmd rcp-enable Enable the software to support incoming rcp requests.
To disable the software from supporting incoming rcp requests, use the no ip rcmd rcp-enable
command.
Note When support for incoming rcp requests is disabled, you can still use the rcp commands to copy
images from remote servers. The support for incoming rcp requests is distinct from its ability to
handle outgoing rcp requests.
The following example shows how to add two entries for remote users to the authentication database and
then enable the software to support remote copy requests from remote users. The users, named
netadmin1 on the remote host at IP address 172.16.15.55 and netadmin3 on the remote host at IP address
172.16.101.101, are both allowed to connect to the router and remotely execute rcp commands on it after
the router is enabled to support rcp. Both authentication database entries give the host name Router1 as
the local username. The last command enables the router to support for rcp requests from remote users.
ip rcmd remote-host Router1 172.16.15.55 netadmin1
ip rcmd remote-host Router1 172.16.101.101 netadmin3
ip rcmd rcp-enable
Note In Cisco products, ttys are commonly used in access servers. The concept of tty originated with
UNIX. For UNIX systems, each physical device is represented in the file system. Terminals are called
tty devices, which stands for teletype, the original UNIX terminal.
and the router’s IP address translates to Router1.company.com, then the .rhosts file for User0 on the rcp
server should contain the following line:
Router1.company.com Rtr1
Refer to the documentation for your rcp server for more details.
If the server has a directory structure, the configuration file or image is written or copied relative to the
directory associated with the remote username on the server. Use the ip rcmd remote-username
command to specify which directory on the server to use. For example, if the system image resides in
the home directory of a user on the server, you can specify that user’s name as the remote username.
If you copy the configuration file to a personal computer used as a file server, the computer must support
rsh.
To override the default remote username sent on rcp requests, use the following command in global
configuration mode:
Command Purpose
Router(config)# ip rcmd remote-username username Specifies the remote username.
To remove the remote username and return to the default value, use the no ip rcmd remote-username
command.
Command Purpose
Router(config)# ip ftp username string Specifies the user name to be used for the FTP connection.
Router(config)# ip ftp password [type] password Specifies the password to be used for the FTP connection.
Router(config)# ip ftp passive Configures the router to only use passive-mode FTP
connections.
or or
Router(config)# no ip ftp passive Allows all types of FTP connections (default).
Router(config)# ip ftp source-interface interface Specifies the source IP address for FTP connections.
The following example demonstrates how to capture a core dump using the Cisco IOS FTP feature. The
router accesses a server at IP address 192.168.10.3 with login name zorro and password sword. The
default passive-mode FTP is used, and the server is accessed using Token Ring interface to1 on the router
where the core dump will occur:
ip ftp username zorro
ip ftp password sword
ip ftp passive
ip ftp source-interface to1
! The following command allows the core-dump code to use FTP rather than TFTP or RCP
exception protocol ftp
! The following command creates the core dump in the event the system at IP address
! 192.168.10.3 crashes
exception dump 192.168.10.3
This chapter describes the basic tasks that you can perform to manage the general system features of the
Cisco IOS software—those features that are generally not specific to a particular protocol.
This document applies to Cisco IOS Release 12.2.
For a complete description of the basic system management commands in this chapter, refer to the “Basic
System Management Commands” chapter in the “Cisco IOS System Management Commands” part of
the Release 12.2 Cisco IOS Configuration Fundamentals Command Reference. To locate documentation
of other commands that appear in this chapter, use the Cisco IOS Command Reference Master Index or
search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com or refer to the software release notes for a specific release. For more information, see the
“Identifying Platform Support for Cisco IOS Software Features” section in the “About Cisco IOS
Software Documentation” chapter.
Command Purpose
Router(config)# hostname name Sets the host name.
For an example of configuring a system name, see the section “System Configuration File Example” at
the end of this chapter.
Command Purpose
Router(config)# prompt string Customizes the CLI prompt.
Router(config)# no service prompt config Disables the display of the CLI prompt.
Command Purpose
Router(config)# alias mode alias-name alias-command-line Configures a command alias.
To display a list of command aliases currently configured on your system, and the original command
syntax for those aliases, use the following command in EXEC mode:
Command Purpose
Router# show aliases [mode] Displays all command aliases and original command
syntax, or displays the aliases for only a specified
command mode.
Keep in mind that any aliases you configure will only be effective on your system, and that the original
command syntax will appear in the configuration file.
To enable TCP or UDP services, use the following commands in global configuration mode, as needed:
Command Purpose
Router(config)# service tcp-small-servers Enables the minor TCP services echo, chargen, discard,
and daytime.
Router(config)# service udp-small-servers Enables the minor UDP services echo, chargen, and
discard.
Because the minor services can be misused, these commands are disabled by default.
Caution Enabling minor services creates the potential for certain types of denial-of-service attacks, such as
the UDP diagnostic port attack. Therefore, any network device that has UDP, TCP, BOOTP, or Finger
services should be protected by a firewall or have the services disabled. For information on
preventing UDP diagnostic port attacks, see the white paper titled Defining Strategies to Protect
Against UDP Diagnostic Port Denial of Service Attacks, available on Cisco.com.
Note that the no form of the service tcp-small-servers and service udp-small-servers commands will
appear in the configuration file to inform you when these basic services are disabled.
Command Purpose
Router(config)# no ip bootp server Disables the BOOTP server.
Because Dynamic Host Configuration Protocol (DHCP) is based on the Bootstrap Protocol, both of these
service share the "well-known" UDP server port of 67 (per the internet standards and RFCs). For more
information about DHCP configuration in Cisco IOS software, see the Cisco IOS IP Configuration
Guide. For more information about BOOTP, see RFC 951. Interoperation between BOOTP and DHCP
is defined in RFC 1534. DHCP is defined in RFC 2131.
Command Purpose
Router(config)# ip finger Enables the Finger protocol service, which allows the
system to respond to finger requests.
To configure the finger protocol to be compliant with RFC 1288, use the following command in global
configuration mode:
Command Purpose
Router(config)# ip finger rfc-compliant Configures the device to wait for “Return” or “/W” input
when processing Finger requests.
The rfc-compliant form of this command should not be configured for devices with more than 20
simultaneous users (see caveat CSCds92731 on Cisco.com for details). The difference between the two
forms of this command is as follows: when the ip finger command is configured, the router will respond
to a telnet a.b.c.d finger command from a remote host by immediately displaying the output of the show
users command and then closing the connection. When the ip finger rfc-compliant command is
configured, the router will wait for input before displaying anything. The remote user can then press the
Return key to display the output of the show users command, or enter /W to display the output of the
show users wide command. After this information is displayed, the connection is closed.
Command Purpose
Router(config)# service hide-telnet-address Hides addresses while establishing a Telnet session.
The hide feature suppresses the display of the address and continues to display all other messages that
normally would be displayed during a connection attempt, such as detailed error messages if the
connection failed.
Use the busy-message line configuration command with the service hide-telnet-address command to
customize the information displayed during Telnet connection attempts. If the connection attempt fails,
the router suppresses the address and displays the message specified with the busy-message command.
• Configuring SNTP
• Configuring VINES Time Service
• Configuring Time and Date Manually
• Using the Hardware Clock
• Monitoring Time and Calendar Services
• Configuring Time Ranges
Note The software clock cannot provide time to the NTP or VINES Time Service if it was set using SNTP.
The software clock keeps track of time internally based on Coordinated Universal Time (UTC), also
known as Greenwich Mean Time (GMT). You can configure information about the local time zone and
summer time (daylight savings time) so that the time is displayed correctly relative to the local time
zone.
The software clock keeps track of whether the time is “authoritative” (that is, whether it has been set by
a time source considered to be authoritative). If it is not authoritative, the time will be available only for
display purposes and will not be redistributed.
SNTP typically provides time within 100 milliseconds of the accurate time, but it does not provide the
complex filtering and statistical mechanisms of NTP. In addition, SNTP does not authenticate traffic,
although you can configure extended access lists to provide some protection. An SNTP client is more
vulnerable to misbehaving servers than an NTP client and should be used only in situations where strong
authentication is not required.
You can configure SNTP to request and accept packets from configured servers or to accept NTP
broadcast packets from any source. When multiple sources are sending NTP packets, the server with the
best stratum is selected. (See the “Network Time Protocol” section for a description of strata.) If multiple
servers are at the same stratum, a configured server is preferred over a broadcast server. If multiple
servers pass both tests, the first one to send a time packet is selected. SNTP will choose a new server
only if it stops receiving packets from the currently selected server, or if a better server (according to the
above criteria) is discovered.
Note Support for Banyan VINES and XNS is removed from Cisco IOS software in Cisco IOS Release
12.2(13)T and later.
Hardware Clock
Some routers contain a battery-powered hardware clock that tracks the date and time across system
restarts and power outages. The hardware clock is always used to initialize the software clock when the
system is restarted.
Note Within the CLI command syntax, the hardware clock is referred to as the “system calendar.”
If no other source is available, the hardware clock can be considered to be an authoritative source of time
and be redistributed via NTP or VINES time service. If NTP is running, the hardware clock can be
updated periodically from NTP, compensating for the inherent drift in the hardware clock.
Configuring NTP
NTP services are disabled on all interfaces by default. The following sections contain optional tasks that
you can perform on your networking device:
• Configuring Poll-Based NTP Associations
• Configuring Broadcast-Based NTP Associations
• Configuring an NTP Access Group
• Configuring NTP Authentication
• Disabling NTP Services on a Specific Interface
Command Purpose
Router(config)# ntp peer ip-address [normal-sync] [version Forms a peer association with another system.
number] [key keyid] [source interface] [prefer]
Router(config)# ntp server ip-address [version number] Forms a server association with another system.
[key keyid] [source interface] [prefer]
Note that only one end of an association needs to be configured; the other system will automatically
establish the association.
Caution The ntp clock-period command is automatically generated to reflect the constantly changing
correction factor when the copy running-configuration startup-configuration command is entered
to save the configuration to NVRAM. Do not attempt to manually use the ntp clock-period
command. Ensure that you remove this command line when copying configuration files to other
devices.
For an example of configuring an NTP server-peer relationship, see the “Clock, Calendar, and NTP
Configuration Examples” section at the end of this chapter.
Command Purpose
Router(config-if)# ntp broadcast [version number] Configures the specified interface to send NTP
broadcast packets.
To configure an interface to receive NTP broadcasts, use the following command in interface
configuration mode:
Command Purpose
Router(config-if)# ntp broadcast client Configures the specified interface to receive NTP
broadcast packets.
To manually set the estimated round-trip delay between the device and the NTP broadcast server, use the
following command in global configuration mode:
Command Purpose
Router(config)# ntp broadcastdelay microseconds Adjusts the estimated round-trip delay for NTP
broadcasts.
Caution The ntp clock-period command is automatically generated to reflect the constantly changing
correction factor when the copy running-configuration startup-configuration command is entered
to save the configuration to NVRAM. Do not attempt to manually use the ntp clock-period
command. Ensure that you remove this command line when copying configuration files to other
devices.
For an example of configuring broadcast-based NTP associations, see the “Clock, Calendar, and NTP
Configuration Examples” section at the end of this chapter.
Command Purpose
Router(config)# ntp access-group {query-only | serve-only Creates an access group and applies a basic IP access
| serve | peer} access-list-number list to it.
The access group options are scanned in the following order, from least restrictive to most restrictive:
1. peer—Allows time requests and NTP control queries and allows the system to synchronize itself to
a system whose address passes the access list criteria.
2. serve—Allows time requests and NTP control queries, but does not allow the system to synchronize
itself to a system whose address passes the access list criteria.
3. serve-only—Allows only time requests from a system whose address passes the access list criteria.
4. query-only—Allows only NTP control queries from a system whose address passes the access list
criteria.
If the source IP address matches the access lists for more than one access type, the first type is granted.
If no access groups are specified, all access types are granted to all systems. If any access groups are
specified, only the specified access types will be granted.
For details on NTP control queries, see RFC 1305 (NTP version 3).
Command Purpose
Step 1 Router(config)# ntp authenticate Enables the NTP authentication feature.
Step 2 Router(config)# ntp authentication-key number md5 Defines the authentication keys.
value
Each key has a key number, a type, and a value.
Currently the only key type supported is md5.
Step 3 Router(config)# ntp trusted-key key-number Defines trusted authentication keys.
If a key is trusted, this system will be ready to
synchronize to a system that uses this key in its NTP
packets.
Note In Cisco IOS software versions previous to release 12.0, the cryptotype value is displayed along with
the ntp authentication key md5 value when the show running-configuration command is entered.
Avoid copying and pasting the string cryptotype value that is displayed with the authentication-key
as it will result in authentication failure.
Command Purpose
Router(config-if)# ntp disable Disables NTP services on a specific interface.
Command Purpose
Router(config)# ntp source interface Configures an interface from which the IP source
address will be taken.
This interface will be used for the source address for all packets sent to all destinations. If a source
address is to be used for a specific association, use the source parameter on the ntp peer or ntp server
command shown earlier in this chapter.
Command Purpose
Router(config)# ntp master [stratum] Makes the system an authoritative NTP server.
Note Use the ntp master command with caution. It is very easy to override valid time sources using this
command, especially if a low stratum number is configured. Configuring multiple machines in the
same network with the ntp master command can cause instability in timekeeping if the machines do
not agree on the time.
For an example of configuring an authoritative NTP server, see the “Clock, Calendar, and NTP
Configuration Examples” section at the end of this chapter.
Use the following command in global configuration mode if a routing device is synchronized to an
outside time source via NTP and you want the hardware clock to be synchronized to NTP time:
Command Purpose
Router(config)# ntp update-calendar Configures the system to update its hardware clock
from the software clock at periodic intervals.
For an example of configuring NTP to update the calendar, see the section “Clock, Calendar, and NTP
Configuration Examples” at the end of this chapter.
Command Purpose
Step 1 Router(config)# line aux 0 Enters line configuration mode for the auxiliary port 0.
Step 2 Router(config-line)# ntp refclock trimble pps none Enables the driver that allows the Trimble Palisade NTP
stratum 1 Synchronization Kit to be used as the NTP reference
clock source (Cisco 7200 series routers only).
To configure a Symmetricom GPS product connected to the auxiliary port of a supported router or switch
as the NTP reference clock, use the following commands beginning in global configuration mode:
Command Purpose
Step 1 Router(config)# line aux 0 Enters line configuration mode for the auxiliary port
zero.
Step 2 Router(config-line)# ntp refclock Enables the driver that allows the Symmetricom GPS
telecom-solutions pps cts stratum 1 product to be used as the NTP reference clock source.
To configure a PPS signal as the source for NTP synchronization, use the following form of the ntp
refclock command in line configuration mode:
Command Purpose
Router(config-line)# ntp refclock pps {cts | ri} Configures a PPS signal as the source for NTP
[inverted] [pps-offset number] [stratum number] synchronization.
[timestamp-offset number]
To verify the status of NTP components, use the following commands in privileged EXEC mode:
Command Purpose
Router# show ntp associations Displays the status of NTP associations, including the
status of the GPS reference clock.
Router# show ntp status Displays the status of NTP.
Router# debug ntp refclock Allows advanced monitoring of reference clock
activities for the purposes of debugging.
Configuring SNTP
SNTP generally is supported on those platforms that do not provide support for NTP, such as the Cisco
1000 series, 1600 series, and 1700 series platforms. SNTP is disabled by default. In order to enable
SNTP, use one or both of the following commands in global configuration mode:
Command Purpose
Router(config)# sntp server {address | hostname} [version Configures SNTP to request NTP packets from an NTP
number] server.
Router(config)# sntp broadcast client Configures SNTP to accept NTP packets from any NTP
broadcast server.
Enter the sntp server command once for each NTP server. The NTP servers must be configured to
respond to the SNTP messages from the router.
If you enter both the sntp server command and the sntp broadcast client command, the router will
accept time from a broadcast server but prefer time from a configured server, assuming that the strata are
equal. To display information about SNTP, use the show sntp EXEC command.
Note Support for Banyan VINES and XNS has been removed from Cisco IOS software, beginning in
Cisco IOS Release 12.2(13)T. The following VINES commands are not available in releases derived
from 12.2(13)T, such as the 12.3 mainline release.
To distribute the system time and date to other devices on the network using VINES time services, use
the following command in global configuration mode:
Command Purpose
Router(config)# vines time use-system Distributes the system software clock time to other
VINES systems.
To set the system time and date from received VINES time services, use the following command in
global configuration mode:
Command Purpose
Router(config)# vines time set-system Sets the software clock system time from received
VINES time services.
Command Purpose
Router(config)# clock timezone zone hours-offset Sets the time zone. The zone argument is the name of
[minutes-offset] the time zone (typically a standard acronym). The
hours-offset argument is the number of hours the time
zone is different from UTC. The minutes-offset
argument is the number of minutes the time zone is
different from UTC.
Tips The minutes-offset argument of the clock timezone command is available for those cases where a
local time zone is a percentage of an hour different from UTC/GMT. For example, the time zone for
some sections of Atlantic Canada (AST) is UTC -3.5. In this case, the necessary command would be
clock timezone AST -3 30.
For an example of configuring the time zone, see the section “Clock, Calendar, and NTP Configuration
Examples” at the end of this chapter.
Command Purpose
Router(config)# clock summer-time zone recurring [week day Configures a recurring summer time start and end date.
month hh:mm week day month hh:mm [offset]] The offset argument is used to indicate the number of
minutes to add to the clock during summer time.
If summer time in your area does not follow this pattern, you can configure the exact date and time of
the next summer time event by using one of the following commands in global configuration mode:
Command Purpose
Router(config)# clock summer-time zone date month date Configures a specific summer time start and end date.
year hh:mm month date year hh:mm [offset] The offset argument is used to indicate the number of
minutes to add to the clock during summer time.
or
Router(config)# clock summer-time zone date date month
year hh:mm date month year hh:mm [offset]
For an example of configuring summer time, see the section “Clock, Calendar, and NTP Configuration
Examples” at the end of this chapter.
Command Purpose
Router# clock set hh:mm:ss date month year Sets the software clock.
or
Router# clock set hh:mm:ss month date year
Command Purpose
Router> calendar set hh:mm:ss day month year Sets the hardware clock manually.
or
Router> calendar set hh:mm:ss month day year
Command Purpose
Router(config)# clock calendar-valid Enables the router to act as a valid time source to which
network peers can synchronize.
For an example of making the hardware clock authoritative, see the “Clock, Calendar, and NTP
Configuration Examples” section at the end of this chapter.
Command Purpose
Router# clock read-calendar Sets the software clock from the hardware clock.
Command Purpose
Router# clock update-calendar Sets the hardware clock from the software clock.
Command Purpose
Router# show calendar Displays the current hardware clock time.
Router# show clock [detail] Displays the current software clock time.
Router# show ntp associations [detail] Displays the status of NTP associations.
Router# show ntp status Displays the status of NTP.
Router# show sntp Displays information about SNTP (Cisco 1003,
Cisco 1004, Cisco 1005, Cisco 1600, Cisco 1720, or
Cisco 1750 routers only).
Note The time range relies on the system’s software clock. For the time range feature to work the way you
intend, you need a reliable clock source. We recommend that you use NTP to synchronize the
system’s software clock.
To define a time range, use the following commands beginning in global configuration mode.
Command Purpose
Step 1 Router(config)# time-range time-range-name Assigns a name to the time range to be configured and
enters time-range configuration mode.
Step 2 Router(config-time-range)# absolute [start time Specifies when the time range will be in effect. Use
date] [end time date] some combination of these commands; multiple
periodic statements are allowed; only one absolute
or
statement is allowed.
Router(config-time-range)# periodic
days-of-the-week hh:mm to [days-of-the-week] hh:mm
Repeat these tasks if you have multiple items you want in effect at different times. For example, repeat
the steps to include multiple permit or deny statements in an access list in effect at different times. For
more information about these commands, refer to the “Basic System Management Commands” chapter
in the “Cisco IOS System Management Commands” part of the Release 12.2 Cisco IOS Configuration
Fundamentals Command Reference.
Command Purpose
Router(config)# service exec-wait Delays startup of the EXEC.
This command is useful on noisy modem lines or when a modem attached to the line is configured to
ignore MNP or V.42 negotiations, and MNP or V.42 modems may be dialing in. In these cases, noise or
MNP/V.42 packets might be interpreted as usernames and passwords, causing authentication failure
before the user can type a username or password. The command is not useful on nonmodem lines or lines
without some kind of login configured.
Command Purpose
Router(config)# service telnet-zero-idle Sets the TCP window to zero when the Telnet
connection is idle.
Normally, data sent to noncurrent Telnet connections is accepted and discarded. When service
telnet-zero-idle is enabled, if a session is suspended (that is, some other connection is made active), the
TCP window is set to zero. This action prevents the remote host from sending any more data until the
connection is resumed. Use this command when it is important that all messages sent by the host be seen
by the users and the users are likely to use multiple sessions. Do not use this command if your host will
eventually time out and log out a TCP user whose window is zero.
Command Purpose
Router(config-if)# load-interval seconds Sets the length of time for which data is used for load
calculations.
additional typed characters are saved until the acknowledgment comes back. The effect is to accumulate
characters into larger chunks, and pace their transmission to the network at a rate matching the round-trip
time of the given connection. This method is usually preferable for all TCP-based traffic.
By default, the Nagle algorithm is not enabled. To enable the Nagle algorithm and thereby reduce the
number of TCP transactions, use the following command in global configuration mode:
Command Purpose
Router(config)# service nagle Enables the Nagle slow packet avoidance algorithm.
Command Purpose
Router(config)# scheduler interval milliseconds Defines the maximum amount of time that can elapse
without running the lowest-priority system processes.
To change the amount of time that the CPU spends on fast-switching and process-level operations on the
Cisco 7200 series and Cisco 7500 series routers, use the following command in global configuration
mode:
Command Purpose
Router(config)# scheduler allocate network-microseconds For the Cisco 7200 series and Cisco 7500 series routers,
process-microseconds changes the default time the CPU spends on process
tasks and fast switching.
Caution We recommend that you do not change the default values of the scheduler allocate command.
To configure the characteristics for a looping process, use the following command in global
configuration mode:
Command Purpose
Router(config)# scheduler process-watchdog {hang | normal Configures an action for a looping process.
| reload | terminate}
Command Purpose
Router(config)# buffers {small | middle | big | verybig | Adjusts the system buffer sizes.
large | huge | type number} {permanent | max-free |
min-free | initial} number
Router(config)# buffers huge size number Dynamically resizes all huge buffers to the value that
you supply.
Caution Normally you need not adjust these parameters; do so only after consulting with technical support
personnel. Improper settings can adversely impact system performance.
During normal system operation, there are two sets of buffer pools: public and interface. They behave as
follows:
• The buffers in the public pools grow and shrink based upon demand. Some public pools are
temporary and are created and destroyed as needed. Other public pools are permanently allocated
and cannot be destroyed. Public buffer pools are labeled as small, middle, big, large, very big, and
huge.
• Interface pools are static—that is, they are all permanent. One interface pool exists for each
interface. For example, a Cisco 4000 1E 4T configuration has one Ethernet buffer pool and four
serial buffer pools. In the buffers EXEC command, the type and number arguments allow the user
to tune the interface pools.
See the section “Buffer Modification Examples” at the end of this chapter for more information.
The server has one pool of queueing elements and six public pools of packet buffers of different sizes.
For each pool, the server keeps count of the number of buffers outstanding, the number of buffers in the
free list, and the maximum number of buffers allowed in the free list. To display statistics about the
buffer pool on the system, use the following commands in EXEC mode, as needed:
Command Purpose
Router> show buffers Displays all public pool information.
Router> show buffers address hex-addr Displays buffer information for an address.
Router> show buffers all [dump | header | packet] Displays all public and interface pool information.
Router> show buffers assigned [dump | header | packet] Displays a listing of all buffers in use.
Router> show buffers failures [dump | header | packet] Displays buffer allocation failures.
Router> show buffers free [dump | header | packet] Displays buffers available for use.
Router> show buffers old [dump | header | packet] Displays buffers older than one minute.
Router> show buffers input-interface interface-type Displays buffer information for an input interface.
identifier
Router> show buffers pool pool name Displays all interface pool information.
In the following example, a router with a hardware clock has no outside time source, so it uses the
hardware clock as an authoritative time source and distributes the time via NTP broadcast packets:
clock timezone MET 2
clock calendar-valid
ntp master
interface fddi 0/0
ntp broadcast
The following example instructs the system to keep no more than 200 middle buffers free:
Router> buffers middle max-free 200
The following example instructs the system to create one large temporary extra buffer, just after a reload:
Router> buffers large initial 1
The following example instructs the system to create one permanent huge buffer:
Router> buffers huge permanent 1
This chapter describes basic tasks that you can perform to troubleshoot your system and the network.
For detailed troubleshooting procedures and scenarios, refer to the Internetwork Troubleshooting Guide.
For complete details on all debug commands, refer to the Cisco IOS Debug Command Reference.
For a complete description of the troubleshooting commands in this chapter, refer to the
“Troubleshooting and Fault Management Commands” chapter in “Cisco IOS System Management
Commands” part of the Release 12.2 Cisco IOS Configuration Fundamentals Command Reference. To
locate documentation of other commands that appear in this chapter, use the Cisco IOS Command
Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
In addition to the material presented in this chapter, many chapters in the Cisco IOS software
configuration guides include fault management tasks specific to certain technologies and features. You
can find these tasks in the “Monitoring and Maintaining” sections.
Command Purpose
Router# show c2600 Displays information about the Cisco 2600 platform,
including interrupts, IOS Priority Masks, and IDMA status,
for troubleshooting.
Router# show c7200 Displays information about the CPU and midplane for the
Cisco 7200 series routers.
Router# show context Displays information stored in NVRAM when the router
crashes. This command is only useful to your technical
support representative. This command is supported on the
Cisco 2600 and 7000 series routers.
Router# show controllers Displays information specific to the hardware on a line card.
Router# show controllers logging Displays logging information about a line card.
Router# show controllers tech-support Displays general information about a line for use when
reporting a problem.
Router# show controllers vip slot-number tech-support Displays information about the Versatile Interface Processor
(VIP) card for use when reporting a problem
Router# show diag Displays hardware information (including DRAM and static
RAM details) for line cards.
Router# show environment [all | last | table] Displays a message indicating whether an environmental
warning condition currently exists, the temperature and
voltage information, the last measured value from each of
the six test points stored in nonvolatile memory, or
environmental specifications. Examples of systems that
support this command include the Cisco 7000 and the Cisco
12000 series routers.
Router# show gsr Displays hardware information on the Cisco 12000 series
Gigabit Switch Router (GSR).
Router# show gt64010 Displays all GT64010 internal registers and interrupt status
on the Cisco 7200 series routers.
Router# show memory [memory-type] [free] [summary] Displays memory pool statistics including summary
information about the activities of the system memory
allocator and a block-by-block listing of memory use.
Command Purpose
Router# show pci {hardware | bridge [register]} Displays information about the peripheral component
interconnect (PCI) hardware registers or bridge registers for
the Cisco 2600 and 7000 series routers.
Router# show processes [cpu] Displays information about all active processes.
Router# show processes memory Displays information about memory usage.
Router# show protocols Displays the configured protocols.
Router# show stacks Displays stack usage of processes and interrupt routines,
including the reason for the last system reboot. This
command is only useful to your technical support
representative.
Router# show subsys [class class | name name] Displays subsystem information.
Router# show tcp [line-number] Displays the status of TCP connections.
Router# show tcp brief [all] Displays a concise description of TCP connection endpoints.
Router# show tdm connections [motherboard | slot Displays a snapshot of the time-division multiplexing
number] (TDM) bus connection or data memory in a Cisco AS5200
access server.
Router# show tech-support [page] [password] Displays information about the system for use when
reporting a problem.
Refer to specific show commands in the tables of configuration commands found throughout the
chapters in Cisco IOS software configuration guides. Refer to the Cisco IOS software command
reference publications for detailed descriptions of the commands.
To generate the TCP keepalive packet service, use the following command in global configuration mode:
Command Purposes
Router(config)# service {tcp-keepalives-in | Generates TCP keepalive packets on idle network
tcp-keepalives-out} connections, either incoming connections initiated by a
remote host, or outgoing connections initiated by a user.
Command Purposes
Router# ping [protocol] {host | address} Invokes a diagnostic tool for testing connectivity.
Refer to specific ping commands in the tables of configuration commands found throughout the chapters
in Cisco IOS software configuration guides. Refer to the Cisco IOS software command reference
publications for detailed descriptions of the command.
Command Purposes
Router# trace [protocol] [destination] Traces packet routes through the network (privileged
level).
You can set the severity level of the messages to control the type of messages displayed for the console
and each destination. You can time-stamp log messages or set the syslog source address to enhance
real-time debugging and management.
System logging messages are traditionally referred to as System Error Messages. Refer to the Cisco IOS
Software System Error Messages publication for detailed information on specific system logging
messages.
Command Purposes
Router(config)# logging on Enables message logging.
Command Purposes
Router(config)# service slave-log Enables slave message logging.
Command Purposes
Router(config)# logging buffered [size] Logs messages to an internal buffer.
Router(config)# terminal monitor Logs messages to a nonconsole terminal.
Router(config)# logging host Logs messages to a syslog server host.
The logging buffered command copies logging messages to an internal buffer. The buffer is circular, so
newer messages overwrite older messages after the buffer is full. To display the messages that are logged
in the buffer, use the show logging EXEC command. The first message displayed is the oldest message
in the buffer. To clear the current contents of the buffer, use the clear logging privileged EXEC
command.
The terminal monitor EXEC command locally accomplishes the task of displaying the system logging
messages to a terminal.
The logging command identifies a syslog server host to receive logging messages. The host argument is
the name or IP address of the host. By issuing this command more than once, you build a list of syslog
servers that receive logging messages. The no logging command deletes the syslog server with the
specified address from the list of syslogs.
Command Purposes
Step 1 Router(config)# line [aux | console | vty] Specifies the line to be configured for synchronous logging
beginning-line-number [ending-line-number] of messages.
Step 2 Router(config-line)# logging synchronous Enables synchronous logging of messages.
[level severity-level | all]
[limit number-of-buffers]
Command Purposes
Router(config)# service timestamps log uptime Enables log time stamps.
or
Router(config)# service timestamps log datetime [msec]
[localtime] [show-timezone]
Command Purposes
Router(config)# logging console level Limits the number of messages logged to the console.
Router(config)# logging monitor level Limits the number of messages logged to the terminal lines.
Router(config)# logging trap level Limits the number of messages logged to the syslog servers.
If you have enabled syslog messages traps to be sent to a Simple Network Management Protocol (SNMP)
network management station with the snmp-server enable trap command, you can change the level of
messages sent and stored in a history table on the router. You can also change the number of messages
that get stored in the history table.
Messages are stored in the history table because SNMP traps are not guaranteed to reach their
destination. By default, one message of the level warning and above (see Table 18) is stored in the history
table even if syslog traps are not enabled.
To change level and table size defaults, use the following commands in global configuration mode:
Command Purposes
Step 1 Router(config)# logging history level Changes the default level of syslog messages stored in the
history file and sent to the SNMP server.
Step 2 Router(config)# logging history size number Changes the number of syslog messages that can be stored
in the history table.
Note Table 18 lists the level keywords and severity level. For SNMP usage, the severity level values use +1.
For example, emergency equals 1 not 0 and critical equals 3 not 2.
The logging console command limits the logging messages displayed on the console terminal to
messages with a level number at or below the specified severity level, which is specified by the level
argument. Table 18 lists the error message level keywords and corresponding UNIX syslog definitions
in order from the most severe level to the least severe level.
The default is to log messages to the console at the debugging level and those level numbers that are
lower, which means all levels. The logging monitor command defaults to debugging also. The logging
trap command defaults to the informational level.
To display logging messages on a terminal, use the terminal monitor EXEC command.
Current software generates the following four categories of error messages:
• Error messages about software or hardware malfunctions, displayed at levels warnings through
emergencies
• Output from the debug commands, displayed at the debugging level
• Interface up/down transitions and system restart messages, displayed at the notifications level
• Reload requests and low-process stack messages, displayed at the informational level
Command Purposes
Router(config)# logging facility facility-type Configures system log facilities.
Command Purposes
Router# show logging Displays the state of syslog error and event logging,
including host addresses, whether console logging is
enabled, and other logging statistics.
Router# show controllers vip slot-number logging Displays the state of syslog error and event logging of a VIP
card, including host addresses, whether console logging is
enabled, and other logging statistics.
Router# show logging history Displays information in the syslog history table such as the
table size, the status of messages, and the text of the
messages stored in the table.
The debugging keyword specifies the syslog level; see Table 18 for a general description of other
keywords. The local7 keyword specifies the logging facility to be used; see Table 19 for a general
description of other keywords.
The syslog daemon sends messages at this level or at a more severe level to the file specified in the next
field. The file must already exist, and the syslog daemon must have permission to write to it.
Command Purposes
Router(config)# logging source-interface type number Sets the syslog source address.
Note The field diagnostic diag command must be executed from the Gigabit Route Processor (GRP) main
console port.
To perform field diagnostic testing on a line card, use the following command in privileged EXEC mode:
Command Purposes
Router# diag slot-number [previous | post | verbose | Specifies the line card on which you want to perform
wait] diagnostic testing.
Optionally, specifies that previous test results are displayed,
that only extended power-on self-tests (POST) be
performed, that the maximum messages are displayed, or
that the Cisco IOS software not be reloaded on the line card
after successful completion of the tests. The following
prompt is displayed:
Running Diags will halt ALL activity on the
requested slot. [confirm]
To stop field diagnostic testing on a line card, use either of the following commands in privileged EXEC
mode:
Command Purpose
Router# diag slot-number halt Specifies the line card on which you want to stop diagnostic
testing.
or
Router# no diag slot-number
Note When you stop the field diagnostic test, the line card remains down (that is, in an unbooted state). In
most cases, you stopped the testing because you need to remove the line card or replace the line card. If
that is not the case and you want to bring the line card back up (that is, online), you must use the
microcode reload global configuration command or power cycle the line card.
Caution Use the exception linecard global configuration command only when directed by a technical support
representative, and only enable options that the technical support representative requests you to enable.
To enable and configure the crash information options for a line card, use the following command in
global configuration mode:
Command Purpose
Router(config)# exception linecard {all | slot Specifies the line card for which you want crash
slot-number} [corefile filename | main-memory size [k | m] information when a line card resets. Optionally, specify
| queue-ram size [k | m] | rx-buffer size [k | m] |
sqe-register-rx | sqe-register-tx | tx-buffer size
the type and amount of memory to be stored.
[k | m]]
Caution Use the exception commands only under the direction of a technical support representative. Creating a
core dump while the router is functioning in a network can disrupt network operation.
For example, the following command configures a router to send a core file to the server at the IP address
172.17.92.2. As the exception protocol is not specified, the default protocol of TFTP will be used.
Router(config)# exception dump 172.17.92.2
The core dump is written to a file named "hostname-core" on the TFTP server, where hostname is the
name of the route (in the example above, the file would be named Router-core ). You can change the
name of the core file by adding the exception core-file filename configuration command.
Depending on the TFTP server application used, it may be necessary to create, on the TFTP server, the
empty target file to which the router can write the core. Also, make sure there is enough memory on your
TFTP server to hold the complete core dump.
Command Purposes
Step 1 Router(config)# ip ftp username username (Optional) Configures the user name for FTP connections.
Step 2 Router(config)# ip ftp password [type] (Optional) Specifies the password to be used for FTP
password connections.
Step 3 Router(config)# exception protocol ftp Specifies that FTP should be used for core dump file
transfers.
Step 4 Router(config)# exception dump ip-address Configures the router to dump a core file to a particular
server if the router crashes.
Step 5 Router(config)# exception core-file filename (Optional) Specifies the name to be used for the core dump
file.
The following example configures a router to use FTP to dump a core file named “dumpfile” to the FTP
server at 172.17.92.2 when it crashes.
ip ftp username red
ip ftp password blue
exception protocol ftp
exception dump 172.17.92.2
exception core-file dumpfile
When an rcp username is not configured through the ip rcmd remote-username command, the rcp
username defaults to the username associated with the current terminal (tty) connection. For example, if
the user is connected to the router through Telnet and was authenticated through the username command,
the router software sends the Telnet username as the rcp username. If the terminal username is not
available, the router hostname will be used as the rcp username.
Command Purpose
Router(config)# exception flash [procmem |iomem | all] Configures the router for a core dump using a flash disk.
device-name[:partition-number] [erase | no_erase]
Router(config)# exception core-file filename (Optional) Specifies the name to be used for the core dump
file.
The show flash all EXEC command will list the devices you can use for the exception flash command.
Command Purpose
Router(config)# exception memory minimum bytes Triggers a core dump and system reload when the amount of free
memory falls below the specified number of bytes.
• Do not specify too low a memory value, as the router needs some
amout of free memory to provide the core dump.
• If you enter a size that is greater than the free memory (and the
exception dump command has been configured), a core dump
and router reload is generated after 60 seconds.
Router(config)# memory check-interval seconds (Optional) Increases the interval at which memory will be checked.
The default is 60 seconds, but much can happen in 60 seconds to
mask the cause of corruption. Reducing the interval will increase
CPU utilization (by around 12 %) which will be acceptable in most
cases, but will also increase the chance of getting a usable core. To
make sure CPU utilization doesn't hit 100%, you should gradually
decrease the interval on busy routers. The ideal interval is as low as
possible without causing other system problems.
Router(config)# exception memory fragment bytes Triggers a core dump and system reload when the amount of
contiguous (non-fragmented) free memory falls below the specified
number of bytes.
Router(config)# exception core-file filename (Optional) Specifies the name to be used for the core dump file. The
file usually must exist on the TFTP server, and be writable. Note that
the file will be the same size as the amount of processor memory on
the router.
Note that the exception memory minimum command is primarily useful if you anticipate running out
of memory before a core dump can be triggered or other debugging can be performed (rapid memory
leak); if the memory leak is gradual (slow drift), you have generally have time to perform debugging
before the system runs out of memory and must be reloaded.
By default, the number of free memory bytes is checked every 60 seconds when these commands are
configured. The frequency of this checking can be increased using the memory check-interval seconds
command.
The exception dump ip-address command must be configured with these commands. If the exception
dump command is not configured, the router reloads without triggering a core dump.
The following example configures the router to monitor the free memory. If the memory falls below
250000 bytes, the core dump is created and the router reloads.
exception dump 172.18.92.2
exception core-file memory.overrun
exception memory minimum 250000
Caution Use the exception spurious-interrupt global configuration command only when directed by a technical
support representative and only enable options requested by the technical support representative.
To enable and configure the crash information for spurious interrupts, use the following commands in
global configuration mode:
Command Purpose
Router(config)# exception spurious-interrupt Sets the maximum number of spurious interrupts to include in
number the core dump before reloading.
Router(config)# exception dump ip-address Specifies the destination for the core dump file.
or
Router(config)# exception flash
The following example configures a router to create a core dump with a limit of two spurious interrupts:
exception spurious-interrupt 2
exception dump 209.165.200.225
Command Purposes
Router# show debugging Displays the state of each debugging option.
Router# debug ? Displays a list and brief description of all the debug
command options.
Router# debug command Begins message logging for the specified debug command.
Router# no debug command Turns message logging off for the specified debug
command.
Caution The system gives high priority to debugging output. For this reason, debugging commands should be
turned on only for troubleshooting specific problems or during troubleshooting sessions with technical
support personnel. Excessive debugging output can render the system inoperable.
You can configure time-stamping of system debug messages. Time-stamping enhances real-time
debugging by providing the relative timing of logged events. This information is especially useful when
customers send debugging output to your technical support personnel for assistance. To enable
time-stamping of system debug messages, use either of the following commands in global configuration
mode:
Command Purposes
Router(config)# service timestamps debug uptime Enables time-stamping of system debug messages.
or
Router(config)# service timestamps debug datetime
[msec] [localtime] [show-timezone]
Normally, the messages are displayed only on the console terminal. Refer to the section “Setting the
Syslog Destination” earlier in this chapter to change the output device.
Conditionally Triggered Debugging controls the output from the following protocol-specific debug
commands:
• debug aaa {accounting | authorization | authentication}
• debug dialer {events | packets}
• debug isdn {q921 | q931}
• debug modem {oob | trace}
• debug ppp {all | authentication | chap | error | negotiation | multilink events | packet}
Although this feature limits the output of the commands listed, it does not automatically enable the
generation of debugging output from these commands. Debugging messages are generated only when
the protocol-specific debug command is enabled. The debug command output is controlled through two
processes:
• The protocol-specific debug commands specify which protocols are being debugged. For example,
the debug dialer events command generates debugging output related to dialer events.
• The debug condition commands limit these debugging messages to those related to a particular
interface. For example, the debug condition username bob command generates debugging output
only for interfaces with packets that specify a username of bob.
To configure Conditionally Triggered Debugging, perform the tasks described in the following sections:
• Enabling Protocol-Specific debug Commands
• Enabling Conditional Debugging Commands
• Specifying Multiple Debugging Conditions
Command Purpose
Router# show debugging Determines which types of debugging are enabled.
Router# show debug condition [condition-id] Displays the current debug conditions.
Router# debug protocol Enables the desired debugging commands.
Router# no debug protocol Disables the debugging commands that are not desired.
If you do not want output, disable all the protocol-specific debug commands.
Command Purpose
Router# debug condition interface interface Enables debugging output for only the specified interface.
To reenable debugging output for all interfaces, use the no debug interface command.
Command Purposes
Step 1 Router# debug condition interface interface Enables debugging output for only the specified interface
Step 2 Router# debug condition interface interface Enable debugging messages for additional interfaces.
Repeat this task until debugging messages are enabled for
all desired interfaces.
If you specify more than one interface by entering this command multiple times, debugging output will
be displayed for all of the specified interfaces. To turn off debugging on a particular interface, use the
no debug interface command. If you use the no debug interface all command or remove the last debug
interface command, debugging output will be reenabled for all interfaces.
Command Purpose
Router# debug condition {username username | called Enables conditional debugging. The router will display only
dial-string | caller dial-string} messages for interfaces that meet this condition.
To reenable the debugging output for all interfaces, enter the no debug condition all command.
Command Purposes
Step 1 Router# debug condition {username username | Enables conditional debugging, and specifies the first
called dial-string | caller dial-string} condition.
Step 2 Router# debug condition {username username | Specifies the second condition. Repeat this task until all
called dial-string | caller dial-string} conditions are specified.
If you enter multiple debug condition commands, debugging output will be generated if an interface
meets at least one of the conditions. If you remove one of the conditions using the no debug condition
command, interfaces that meet only that condition no longer will produce debugging output. However,
interfaces that meet a condition other than the removed condition will continue to generate output. Only
if no active conditions are met for an interface will the output for that interface be disabled.
When any debug condition command is entered, debugging messages for conditional debugging are
enabled. The following debugging messages show conditions being met on different interfaces as the
serial 0 and serial 1 interfaces come up. For example, the second line of output indicates that serial
interface 0 meets the username fred condition.
*Mar 1 00:04:41.647: %LINK-3-UPDOWN: Interface Serial0, changed state to up
*Mar 1 00:04:41.715: Se0 Debug: Condition 4, username fred triggered, count 2
*Mar 1 00:04:42.963: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0, changed
state to up
*Mar 1 00:04:43.271: Vi1 Debug: Condition 3, interface Vt1 triggered, count 1
*Mar 1 00:04:43.271: %LINK-3-UPDOWN: Interface Virtual-Access1, changed state to up
*Mar 1 00:04:43.279: Vi1 Debug: Condition 4, username fred triggered, count 2
*Mar 1 00:04:43.283: Vi1 Debug: Condition 1, interface Se0 triggered, count 3
*Mar 1 00:04:44.039: %IP-4-DUPADDR: Duplicate address 172.27.32.114 on Ethernet 0,
sourced by 00e0.1e3e.2d41
*Mar 1 00:04:44.283: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access1,
changed state to up
*Mar 1 00:04:54.667: %LINK-3-UPDOWN: Interface Serial1, changed state to up
*Mar 1 00:04:54.731: Se1 Debug: Condition 4, username fred triggered, count 2
*Mar 1 00:04:54.735: Vi1 Debug: Condition 2, interface Se1 triggered, count 4
*Mar 1 00:04:55.735: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed
state to up
After a period of time, the show debug condition command displays the revised list of conditions:
Router# show debug condition
Next, the serial 1 and serial 0 interfaces go down. When an interface goes down, conditions for that
interface are cleared.
*Mar 1 00:05:51.443: %LINK-3-UPDOWN: Interface Serial1, changed state to down
*Mar 1 00:05:51.471: Se1 Debug: Condition 4, username fred cleared, count 1
*Mar 1 00:05:51.479: Vi1 Debug: Condition 2, interface Se1 cleared, count 3
*Mar 1 00:05:52.443: %LINEPROTO-5-UPDOWN: Line protocol on Interface Serial1, changed
state to down
*Mar 1 00:05:56.859: %LINK-3-UPDOWN: Interface Serial0, changed state to down
*Mar 1 00:05:56.887: Se0 Debug: Condition 4, username fred cleared, count 1
*Mar 1 00:05:56.895: Vi1 Debug: Condition 1, interface Se0 cleared, count 2
The final show debug condition output is the same as the output before the interfaces came up:
Router# show debug condition
Refer to the hardware installation and maintenance publication for your router for more information
about environmental specifications.
This document first published April 2001. Last updated April 2004 (revision 13).
This chapter describes the Simple Network Management Protocol (SNMP), SNMP MIBs, and how to
configure SNMP on Cisco devices.
For a complete description of the router monitoring commands mentioned in this chapter, see the “SNMP
Commands” chapter in the Release 12.2 Cisco IOS Configuration Fundamentals Command Reference.
To locate documentation of other commands that appear in this chapter, use the Cisco IOS Command
Reference Master Index or search online. For further information about using SNMP, see the SNMP
Technical Tips area on Cisco.com at http://www.cisco.com/warp/public/477/SNMP/snmp-indx.html.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
This chapter contains the following sections:
• Understanding SNMP
• SNMP Configuration Task List
• SNMP Configuration Examples
• New MIB Features in Cisco IOS Release 12.2
Understanding SNMP
SNMP is an application-layer protocol that provides a message format for communication between
SNMP managers and agents. SNMP provides a standardized framework and a common language used
for the monitoring and management of devices in a network.
The SNMP framework has three parts:
• An SNMP manager
• An SNMP agent
• A MIB
The SNMP manager is the system used to control and monitor the activities of network hosts using
SNMP. The most common managing system is called a Network Management System (NMS). The term
NMS can be applied to either a dedicated device used for network management, or the applications used
on such a device. A variety of network management applications are available for use with SNMP. These
features range from simple command-line applications to feature-rich graphical user interfaces (such as
the CiscoWorks2000 line of products).
The SNMP agent is the software component within the managed device that maintains the data for the
device and reports these data, as needed, to managing systems. The agent and MIB reside on the routing
device (router, access server, or switch). To enable the SNMP agent on a Cisco routing device, you must
define the relationship between the manager and the agent.
The Management Information Base (MIB) is a virtual information storage area for network management
information, which consists of collections of managed objects. Within the MIB there are collections of
related objects, defined in MIB modules. MIB modules are written in the SNMP MIB module language,
as defined in STD 58, RFC 2578, RFC 2579, and RFC 2580 (see the “MIBs and RFCs” section for an
explanation of RFC and STD documents). Note that individual MIB modules are also referred to as
MIBs; for example, the Interfaces Group MIB (IF-MIB) is a MIB module within the MIB on your
system.
The SNMP agent contains MIB variables whose values the SNMP manager can request or change
through Get or Set operations. A manager can get a value from an agent or store a value into that agent.
The agent gathers data from the MIB, the repository for information about device parameters and
network data. The agent can also respond to manager requests to Get or Set data.
Figure 14 illustrates the communications relationship between the SNMP manager and agent. A manager
can send the agent requests to get and set MIB values. The agent can respond to these requests.
Independent of this interaction, the agent can send unsolicited notifications (traps or informs) to the
manager to notify the manager of network conditions.
Note This chapter discusses how to enable the SNMP agent on your Cisco device, and how to control the
sending of SNMP notifications from the agent. For information on using SNMP management
systems, see the appropriate documentation for your NMS application.
SNMP Notifications
A key feature of SNMP is the ability to generate notifications from an SNMP agent. These notifications
do not require that requests be sent from the SNMP manager. Unsolicited (asynchronous) notifications
can be generated as traps or inform requests. Traps are messages alerting the SNMP manager to a
condition on the network. Inform requests (informs) are traps that include a request for confirmation of
receipt from the SNMP manager. Notifications can indicate improper user authentication, restarts, the
closing of a connection, loss of connection to a neighbor router, or other significant events.
Traps are less reliable than informs because the receiver does not send any acknowledgment when it
receives a trap. The sender cannot determine if the trap was received. An SNMP manager that receives
an inform request acknowledges the message with an SNMP response protocol data unit (PDU). If the
manager does not receive an inform request, it does not send a response. If the sender never receives a
response, the inform request can be sent again. Thus, informs are more likely to reach their intended
destination.
However, traps are often preferred because informs consume more resources in the router and in the
network. Unlike a trap, which is discarded as soon as it is sent, an inform request must be held in memory
until a response is received or the request times out. Also, traps are sent only once, while an inform may
be retried several times. The retries increase traffic and contribute to a higher overhead on the network.
Thus, traps and inform requests provide a trade-off between reliability and resources. If it is important
that the SNMP manager receives every notification, use inform requests. However, if you are concerned
about traffic on your network or memory in the router and you need not receive every notification, use
traps.
Figure 15 through Figure 18 illustrate the differences between traps and inform requests.
In Figure 15, the agent router successfully sends a trap to the SNMP manager. Although the manager
receives the trap, it does not send any acknowledgment to the agent. The agent has no way of knowing
that the trap reached its destination.
Trap
In Figure 16, the agent router successfully sends an inform request to the manager. When the manager
receives the inform request, it sends a response to the agent. Thus, the agent knows that the inform
request reached its destination. Notice that, in this example, twice as much traffic is generated as in
Figure 15; however, the agent knows that the manager received the notification.
Inform request
Response
S6893
In Figure 17, the agent sends a trap to the manager, but the trap does not reach the manager. Because the
agent has no way of knowing that the trap did not reach its destination, the trap is not sent again. The
manager never receives the trap.
Trap
S6894
SNMP agent SNMP manager
In Figure 18, the agent sends an inform request to the manager, but the inform request does not reach the
manager. Because the manager did not receive the inform request, it does not send a response. After a
period of time, the agent will resend the inform request. The second time, the manager receives the
inform request and replies with a response. In this example, there is more traffic than in Figure 17;
however, the notification reaches the SNMP manager.
Inform request
Inform request
Response
S6895
The Cisco implementation of SNMP uses the definitions of MIB II variables described in RFC 1213 and
definitions of SNMP traps described in RFC 1215.
Cisco provides its own private MIB extensions with every system. Cisco enterprise MIBs comply with
the guidelines described in the relevant RFCs unless otherwise noted in the documentation. You can find
the MIB module definition files and list of which MIBs are supported on each Cisco platform on the
Cisco MIB website on Cisco.com.
For a list of new MIB-related functionality, see the “New MIB Features in Cisco IOS Release 12.2”
section.
SNMP Versions
Cisco IOS software supports the following versions of SNMP:
• SNMPv1—The Simple Network Management Protocol: A Full Internet Standard, defined in
RFC 1157. (RFC 1157 replaces the earlier versions that were published as RFC 1067 and
RFC 1098.) Security is based on community strings.
• SNMPv2c—The community-string based Administrative Framework for SNMPv2. SNMPv2c (the
“c” stands for “community”) is an Experimental Internet Protocol defined in RFC 1901, RFC 1905,
and RFC 1906. SNMPv2c is an update of the protocol operations and data types of SNMPv2p
(SNMPv2 Classic), and uses the community-based security model of SNMPv1.
• SNMPv3—Version 3 of SNMP. SNMPv3 is an interoperable standards-based protocol defined in
RFCs 2273 to 2275. SNMPv3 provides secure access to devices by a combination of authenticating
and encrypting packets over the network.
The security features provided in SNMPv3 are as follows:
– Message integrity—Ensuring that a packet has not been tampered with in transit.
– Authentication—Determining that the message is from a valid source.
– Encryption—Scrambling the contents of a packet prevent it from being learned by an
unauthorized source.
Both SNMPv1 and SNMPv2c use a community-based form of security. The community of managers
able to access the agent MIB is defined by an IP address Access Control List and password.
SNMPv2c support includes a bulk retrieval mechanism and more detailed error message reporting to
management stations. The bulk retrieval mechanism supports the retrieval of tables and large quantities
of information, minimizing the number of round-trips required. The SNMPv2C improved error handling
support includes expanded error codes that distinguish different kinds of error conditions; these
conditions are reported through a single error code in SNMPv1. Error return codes now report the error
type. Three kinds of exceptions are also reported: no such object exceptions, no such instance
exceptions, and end of MIB view exceptions.
SNMPv3 is a security model.A security model is an authentication strategy that is set up for a user and
the group in which the user resides. A security level is the permitted level of security within a security
model. A combination of a security model and a security level will determine which security mechanism
is employed when handling an SNMP packet. See Table 20 for a list of security levels available in
SNMPv3.
Three security models are available: SNMPv1, SNMPv2c, and SNMPv3. Table 20 identifies what the
combinations of security models and levels mean.
Note SNMPv2p (SNMPv2 Classic) is not supported in any Cisco IOS releases after 11.2.
SNMPv2c replaces the Party-based Administrative and Security Framework of SNMPv2p with a
Community-based Administrative Framework. SNMPv2c retained the bulk retrieval and error
handling capabilities of SNMPv2p.
You must configure the SNMP agent to use the version of SNMP supported by the management station.
An agent can communicate with multiple managers; for this reason, you can configure the Cisco IOS
software to support communications with one management station using the SNMPv1 protocol, one
using the SNMPv2c protocol, and another using SMNPv3.
The SNMPv3 feature supports RFCs 1901 to 1908, 2104, 2206, 2213, 2214, and 2271 to 2275. For
additional information on SNMPv3, refer to RFC 2570, Introduction to Version 3 of the
Internet-standard Network Management Framework (note that this is not a standards document).
Command Purpose
Router(config)# snmp-server view view-name oid-tree Creates or modifies a view record.
{included | excluded}
Command Purpose
Router(config)# snmp-server community string [view Defines the community access string.
view-name] [ro | rw] [number]
You can configure one or more community strings. To remove a specific community string, use the no
snmp-server community command.
For an example of configuring a community string, see the “SNMP Configuration Examples” section.
Command Purpose
Router(config)# snmp-server engineID local engineid-string Specifies the name of the local SNMP engine (or copy
of SNMP).
To specify an ID for a remote SNMP engine, use the following command in global configuration mode:
Command Purpose
Router(config)# snmp-server engineID remote ip-address Specifies the name of the remote SNMP engine (or copy
[udp-port port-number] engineid-string of SNMP).
Command Purpose
Router(config)# snmp-server group [groupname {v1 | v2c | Configures a new SNMP group, or a table that maps
v3 [auth | noauth | priv]}][read readview] SNMP users to SNMP views.
[write writeview] [notify notifyview] [access access-list]
Command Purpose
Router(config)# snmp-server host host-id Specifies whether you want the SNMP notifications
[traps | informs][version {1 | 2c | 3 sent as traps or informs, the version of SNMP to use, the
[auth | noauth | priv]} ] community-string
[udp-port port-number] [notification-type]
security level of the notifications (for SNMPv3), and
the recipient (host) of the notifications.
Command Purpose
Router(config)# snmp-server user username groupname [remote Configures a new user to an SNMP group.
ip-address [udp-port port]] {v1 | v2c | v3
[encrypted] [auth {md5 | sha} auth-password ]}
[access access-list]
Command Purpose
Router(config)# snmp-server system-shutdown Enables system shutdown using the SNMP message
reload feature.
Setting the Contact, Location, and Serial Number of the SNMP Agent
You can set the system contact, location, and serial number of the SNMP agent so that these descriptions
can be accessed through the configuration file. To do so, use the following commands in global
configuration mode, as needed:
Command Purpose
Router(config)# snmp-server contact text Sets the system contact string.
Router(config)# snmp-server location text Sets the system location string.
Router(config)# snmp-server chassis-id number Sets the system serial number.
Command Purpose
Router(config)# snmp-server packetsize byte-count Establishes the maximum packet size.
Command Purpose
Router(config)# snmp-server tftp-server-list number Limits the number of TFTP servers used for
configuration file copies via SNMP to the servers in an
access list.
Command Purpose
Router> show snmp Monitors SNMP status.
Router> show snmp engineID [local | remote] Displays information about the local SNMP engine and all
remote engines that have been configured on the device.
Router> show snmp groups Displays information about each SNMP group on the network.
Router> show snmp user Displays information about each SNMP username in the SNMP
users table.
To monitor SNMP trap activity in real time for the purposes of troubleshooting, use the SNMP debug
commands, including the debug snmp packet EXEC command. For documentation of SNMP debug
commands, see the Cisco IOS Debug Command Reference.
Command Purpose
Router(config)# no snmp-server Disables SNMP agent operation.
Note Most Cisco IOS commands use the word “traps” in their command syntax. Unless there is an option
within the command to specify either traps or informs, the keyword traps should be taken to mean
either traps or informs, or both. Use the snmp-server host command to specify whether you want
SNMP notifications to be sent as traps or informs.
The SNMP Proxy manager must be available and enabled on the device for informs to be used. The
SNMP Proxy manager is shipped with PLUS software images only.
Command Purpose
Step 1 Router(config)# snmp-server engineID remote Specifies the engine ID for the remote host.
remote-ip-addr remote-engineID
Step 2 Router(config)# snmp-server user username groupname Configures an SNMP user to be associated with
[remote host [udp-port port] {v1 | v2c | v3 the host created in Step 1.
[encrypted] [auth {md5 | sha} auth-password]} [access
access-list] Note You cannot configure a remote user for an
address without first configuring the
engine ID for that remote host . This is a
restriction imposed in the design of these
commands; if you try to configure the
user before the host, you will receive a
warning message and the command will
not be executed
Step 3 Router(config)# snmp group groupname {v1 | v2 | v3 {auth Configures an SNMP group.
| noauth | priv}} [read readview] [write writeview]
[notify notifyview] [access access-list]
Step 4 Router(config)# snmp-server host host [traps | informs] Specifies whether you want the SNMP
[version {1 | 2c | 3 [auth | noauth | priv]}] notifications sent as traps or informs, the version
community-string [notification-type]
of SNMP to use, the security level of the
notifications (for SNMPv3), and the recipient
(host) of the notifications.
Step 5 Router(config)# snmp-server enable traps Enables sending of traps or informs, and specifies
[notification-type [notification-options]] the type of notifications to be sent. If a
notification-type is not specified, all supported
notification will be enabled on the router. To
discover which notifications are available on
your router, enter the snmp-server enable
traps ? command.
The snmp-server host command specifies which hosts will receive SNMP notifications, and whether
you want the notifications sent as traps or inform requests. The snmp-server enable traps command
globally enables the production mechanism for the specified notification types (such as Border Gateway
Protocol [BGP] traps, config traps, entity traps, Hot Standby Router Protocol [HSRP] traps, and so on).
Command Purpose
Router(config)# snmp-server trap-source interface Specifies a source interface for trap or inform notifications.
Router(config)# snmp-server queue-length length Establishes the message queue length for each notification.
Router(config)# snmp-server trap-timeout seconds Defines how often to resend notifications on the
retransmission queue.
For inform requests, you can configure inform-specific operation values in addition to the operation
values mentioned. To change inform operation values, use the following command in global
configuration mode:
Command Purpose
Router(config)# snmp-server informs [retries retries] Sets the maximum number of times to resend an inform
[timeout seconds] [pending pending] request, the number of seconds to wait for an
acknowledgment before resending, and the maximum
number of informs waiting for acknowledgments at any one
time.
Command Purpose
Router(config)# snmp-server enable traps snmp Enables RFC 1157 generic traps. When used without any of
[authentication] [linkup] [linkdown] [warmstart] the optional keywords, enables authenticationFailure,
[coldstart]
linkUp, linkDown, warmStart, and coldStart traps. When
used with keywords, enables only the trap types specified.
For example, to globally enable only linkUp and linkDown SNMP traps or informs for all interfaces, use
the snmp-server enable traps snmp linkup linkdown form of this command.
Note that linkUp and linkDown notifications are enabled by default on specific interfaces, but will not
be sent unless they are enabled globally. To control (disable or reenable) the sending of linkUp/linkDown
notifications for specific interfaces, use the no snmp trap link-status command in interface
configuration mode.
Security Considerations
Most network security policies assume that routers will accept SNMP requests, send SNMP responses,
and send SNMP notifications.
With the SNMP manager functionality enabled, the router may also send SNMP requests, receive SNMP
responses, and receive SNMP notifications. Your security policy implementation may need to be updated
prior to enabling this feature.
SNMP requests typically are sent to User Datagram Protocol (UDP) port 161. SNMP responses are
typically sent from UDP port 161. SNMP notifications are typically sent to UDP port 162.
SNMP Sessions
Sessions are created when the SNMP manager in the router sends SNMP requests, such as inform
requests, to a host, or receives SNMP notifications from a host. One session is created for each
destination host. If there is no further communication between the router and host within the session
timeout period, the session will be deleted.
The router tracks statistics, such as the average round-trip time required to reach the host, for each
session. Using the statistics for a session, the SNMP manager in the router can set reasonable timeout
periods for future requests, such as informs, for that host. If the session is deleted, all statistics are lost.
If another session with the same host is later created, the request timeout value for replies will return to
the default value.
Sessions consume memory. A reasonable session timeout value should be large enough that regularly
used sessions are not prematurely deleted, yet small enough such that irregularly used, or one-time
sessions, are purged expeditiously.
Command Purpose
Step 1 Router(config)# snmp-server manager Enables the SNMP manager.
Step 2 Router(config)# snmp-server manager session-timeout (Optional) Changes the session timeout value.
seconds
Command Purpose
Router> show snmp Displays global SNMP information.
Router> show snmp sessions [brief] Displays information about current sessions.
Router> show snmp pending Displays information about current pending requests.
The following example permits any SNMP to access all objects with read-only permission using the
community string named public. The router also will send ISDN traps to the hosts 172.16.1.111 and
172.16.1.33 using SNMPv1 and to the host 172.16.1.27 using SNMPv2c. The community string named
public is sent with the traps.
snmp-server community public
snmp-server enable traps isdn
snmp-server host 172.16.1.27 version 2c public
snmp-server host 172.16.1.111 version 1 public
snmp-server host 172.16.1.33 public
The following example allows read-only access for all objects to members of access list 4 that specify
the comaccess community string. No other SNMP managers have access to any objects. SNMP
Authentication Failure traps are sent by SNMPv2c to the host cisco.com using the community string
named public.
snmp-server community comaccess ro 4
snmp-server enable traps snmp authentication
snmp-server host cisco.com version 2c public
The following example sends Entity MIB inform notifications to the host cisco.com. The community
string is restricted. The first line enables the router to send Entity MIB notifications in addition to any
traps or informs previously enabled. The second line specifies that the notifications should be sent as
inform requests, specifies the destination of these informs, and overwrites any previous snmp-server
host commands for the host cisco.com.
snmp-server enable traps entity
snmp-server host informs cisco.com restricted entity
The following example sends the SNMP and Cisco environmental monitor enterprise-specific traps to
address 172.30.2.160:
snmp-server enable traps
snmp-server host 172.30.2.160 public snmp envmon
The following example enables the router to send all traps to the host myhost.cisco.com using the
community string public:
snmp-server enable traps
The following example will not send traps to any host. The BGP traps are enabled for all hosts, but only
the ISDN traps are enabled to be sent to a host.
snmp-server enable traps bgp
snmp-server host bob public isdn
The following example enables the router to send all inform requests to the host myhost.cisco.com using
the community string named public:
snmp-server enable traps
snmp-server host myhost.cisco.com informs version 2c public
In the following example, the SNMP manager is enabled and the session timeout is set to a larger value
than the default:
snmp-server manager
snmp-server manager session-timeout 1000
Event MIB
The Event MIB was introduced in Cisco IOS Release 12.0(11)S and 12.1(3)T. No Cisco IOS software
configuration commands are associated with this MIB. Instead, Event MIB configuration is done with
applications external to Cisco IOS software. The Event MIB allows specialized monitoring capabilities
that can be configured through a network management system (NMS) application using SNMP Get and
Set operations. The Event MIB provides an asynchronous notification mechanism supported by SNMP
that can be set to monitor any SNMP MIB object on a Cisco device and perform notification (trap or
inform) operations or Set operations when specific conditions occur. Conditions are defined in event
values. Event values that have been configured on your system can be displayed using the show
management event command in privileged EXEC mode. By allowing SNMP notifications to take place
only when a specified condition is met, Event MIB support reduces the load on affected devices,
substantially improving the scalability of network management solutions.
For further information, see the Event MIB Support feature module document at
http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121newft/121t/121t3/dtevent.htm
CISCO-AAA-SERVER-MIB
The CISCO-AAA-SERVER-MIB provides statistics reflecting the state of authentication, authorization,
and accounting (AAA) server operation within a device and AAA communications with external servers
for the Cisco AS5300 and AS5800 series platforms. The Cisco AAA Server MIB provides the following
information:
• A table for configuring AAA servers
• Identities of external AAA servers
• Statistics for each AAA function (show radius statistics command)
• Status of servers providing AAA functions
ServerStateChange notifications are controlled (enabled or disabled) through use of the snmp-server
enable traps aaa_server command in global configuration mode. ServerStateChange notifications,
when enabled, will be sent when the server moves from an “up” to “dead” state or when a server moves
from a “dead” to “up” state.
Statistics for AAA functions can be displayed through use of the show radius statistics command in
EXEC mode.
The implementation of this MIB is defined in the CISCO-AAA-SERVER-MIB.my and
CISCO-AAA-SERVER-CAPABILITY.my files available from the Cisco.com MIB website.
CISCO-AAA-SESSION-MIB
The CISCO-AAA-SESSION-MIB provides the ability to both monitor and terminate authenticated
client connections using SNMP for the Cisco AS5300 and AS5800 series platforms. Real-time
information can be provided on data such as idle time, allowing configurations that can terminate calls
when there are periods of inactivity on a line. Data provided by this MIB is directly related to the
accounting information reported by AAA to RADIUS or TACACS servers. You can verify SNMP
queried values through use of the show accounting and show caller timeouts commands in EXEC
mode.
To enable the ability to terminate connections, you must configure the device through use of the aaa
session-mib {disconnect} command in global configuration mode. When this command is found in a
system configuration, SNMP managers have the ability to disconnect all lines that have AAA accounting
records associated to them using the Disconnect object. (AAA must already be configured with accounting
enabled for this feature to function.) For more information, see the Release 12.2 Cisco IOS Security
Configuration Guide.
CISCO-ISDN-MIB
The CISCO-ISDN-MIB supplies ISDN PRI channel-not-available traps that can be generated when a
requested DS 0 channel is not available, or when no modem is available to take the incoming call. ISDN
PRI channel-not-available notifications are controlled (enabled or disabled) through use of the no
snmp-server enable traps isdn [chan-not-avail] command in global configuration mode. These
notifications are disabled by default and are available only for ISDN PRI interfaces on the Cisco
AS5300, Cisco AS5400, and Cisco AS5800 universal access servers.
CISCO-MODEM-MGMT-MIB
The CISCO-MODEM-MGMT-MIB supplies modem health traps that can be generated when a modem
port is bad, disabled, reflashed, or shut down, or when there is a request to busyout the modem. Modem
health notifications are controlled (enabled or disabled) through use of the no snmp-server enable traps
modem-health command in global configuration mode. Modem health traps are disabled by default and
are supported on the Cisco AS5300, Cisco AS5400, and Cisco AS5800 universal access servers.
CISCO-POP-MGMT-MIB
The CISCO-POP-MGMT-MIB supplies the DS 0 busyout notification. DS 0 busyout traps or informs
can be generated when there is a request to busyout a DS 0, when there is a request to take a DS 0 out
of busyout mode, or when busyout completes and the DS 0 is out of service. DS 0 busyout traps are
controlled (enabled or disabled) through use of the no snmp-server enable traps pop command in
global configuration mode. Busyout is enabled on a device using the isdn snmp busyout b-channel
command. DS 0 busyout notifications are disabled by default and are supported on Cisco AS5300,
Cisco AS5400, and Cisco AS5800 universal access servers.
DS 1 loopback traps can be generated when a DS 1 line goes into loopback mode. DS 1 loopback traps
are controlled (enabled or disabled) through use of the no snmp-server enable traps ds1-loopback
command in global configuration mode. DS 1 loopback traps are disabled by default and are supported
only on the Cisco AS5300 and Cisco AS5400 universal access servers.
RFC1406-MIB
The RCF1406-MIB supplies dsx1LineStatus and dsx1LineIndex objects.
MSDP MIB
The Multicast Source Discovery Protocol (MSDP) MIB feature adds support in Cisco IOS software for
the MSDP MIB. This MIB describes objects used for managing MSDP operations using SNMP. MSDP
MIB notifications are controlled (enabled or disabled) through use of the no snmp-server enable traps
msdp command in global configuration mode. There are two MSDP MIB notification-types:
msdpEstablished (1) and msdpBackwardTransition (2). The msdpEstablish notifications are sent when
the MSDP finite state machine (FSM) enters the ESTABLISHED state. The msdpBackwardTransition
notifications are sent generated when the MSDP FSM moves from a higher numbered state to a lower
numbered state. For more information on the Cisco implementation of the MSDP MIB, refer to the
MSDP-MIB.my document available from Cisco.com. The Cisco implementation of the MSDP MIB has
the following restrictions in Cisco IOS Release 12.2:
• All MSDP MIB objects are implemented as read-only.
• The Requests table is not supported in the Cisco implementation of the MSDP MIB.
• The msdpEstablished notification is not supported in the Cisco implementation of the MSDP MIB.
NTP MIB
The Network Time Protocol (NTP) is used to synchronize timekeeping among a set of distributed time
servers and clients. The Cisco NTP MIB enables users to remotely monitor an NTP server using SNMP,
provided the MIB itself is implemented on that server. Use of the NTP MIB to monitor the NTP status
of routing devices is accomplished using software on an NMS. No new or modified Cisco IOS software
commands are associated with this feature.
The Cisco implementation of the NTP MIB is based on NTP version 3 (RFC-1305). The MIB objects
are all read-only. SNMP requests are processed by reading the corresponding variables from the NTP
subsystem and returning them in the response. The NTP MIB defines a set of NTP server system objects,
including an NTP server peers table and an NTP server filter register table. For more information on the
Cisco implementation of the NTP MIB, refer to the MIB document itself (CISCO-NTP-MIB.my,
available from Cisco.com).
This chapter describes how the Cisco Discovery Protocol (CDP) works with Simple Network
Management Protocol (SNMP) to identify other devices in your network in Cisco IOS Release 12.2.
For further details on the commands mentioned in this chapter, refer to the Cisco IOS Configuration
Fundamentals Command Reference.
VTP is a discovery technique deployed by switches where each switch advertises its management
domain on its trunk ports, its configuration revision number, and its known VLANs and their specific
parameters. A VTP domain is made up of one or more interconnected devices that share the same VTP
domain name. A switch can be configured to be in only one VTP domain.
Type-Length-Value fields (TLVs) are blocks of information embedded in CDP advertisements. Table 19
summarizes the TLV definitions for CDP advertisements.
TLV Definition
Device-ID TLV Identifies the device name in the form of a character string.
Address TLV Contains a list of network addresses of both receiving and
sending devices.
Port-ID TLV Identifies the port on which the CDP packet is sent.
Capabilities TLV Describes the functional capability for the device in the form of
a device type, for example, a switch.
Version TLV Contains information about the software release version on
which the device is running.
Platform TLV Describes the hardware platform name of the device, for
example, Cisco 4500.
IP Network Prefix TLV Contains a list of network prefixes to which the sending device
can forward IP packets. This information is in the form of the
interface protocol and port number, for example, Eth 1/0.
VTP Management Domain TLV Advertises the system’s configured VTP management domain
name-string. Used by network operators to verify VTP domain
configuration in adjacent network nodes.
Native VLAN TLV Indicates, per interface, the assumed VLAN for untagged packets
on the interface. CDP learns the native VLAN for an interface.
This feature is implemented only for interfaces that support the
IEEE 802.1Q protocol.
Full/Half Duplex TLV Indicates status (duplex configuration) of CDP broadcast
interface. Used by network operators to diagnose connectivity
problems between adjacent network elements.
Note The cdp enable, cdp timer, and cdp run global configuration commands affect the operation of the
IP on-demand routing feature (that is, the router odr global configuration command). For more
information on the router odr command, see the “On-Demand Routing Commands” chapter in the
Release 12.2 Cisco IOS IP Command Reference, Volume 2 of 3: Routing Protocols document.
Command Purpose
Step 1 Router(config)# cdp timer seconds Specifies frequency of transmission of CDP updates.
Step 2 Router(config)# cdp holdtime seconds Specifies the amount of time a receiving device should hold the
information sent by your device before discarding it.
Command Purpose
Router(config)# cdp run Enables CDP on the system.
Command Purpose
Router(config)# cdp advertise-v2 Enables CDPv2 advertising functionality on the system.
To reenable CDP on an interface after disabling it, use any of the following command in interface
configuration mode, as needed:
Command Purpose
Router(config-if)# cdp enable Enables CDP on an interface.
Command Purpose
Router# clear cdp counters Resets the traffic counters to zero.
Router# clear cdp table Deletes the CDP table of information about neighbors.
Router# show cdp Displays the interval between transmissions of CDP
advertisements, the number of seconds the CDP advertisement is
valid for a given port, and the version of the advertisement.
Router# show cdp entry device-name [protocol | Displays information about a specific neighbor. Display can be
version] limited to protocol or version information.
Router# show cdp interface [type number] Displays information about interfaces on which CDP is enabled.
Router# show cdp neighbors [type number] [detail] Displays the type of device that has been discovered, the name
of the device, the number and type of the local interface (port),
the number of seconds the CDP advertisement is valid for the
port, the device type, the device product number, and the port ID.
Issuing the detail keyword displays information on the native
VLAN ID, the duplex mode, and the VTP domain name
associated with neighbor devices.
Router# show cdp traffic Displays CDP counters, including the number of packets sent
and received and checksum errors.
Router# show debugging Displays information about the types of debugging that are
enabled for your router. Refer to the Cisco IOS Debug Command
Reference for more information about CDP debug commands.
In the following example, the user sets the holdtime to be 90 seconds and sets the router to show that the
updates are working correctly:
Router(config)# cdp holdtime 90
Router(config)# exit
Router# show cdp interface
Serial0 is up, line protocol is up
Encapsulation is HDLC
Sending CDP packets every 30 seconds
Holdtime is 90 seconds
Version :
Cisco IOS C2950 Software (C2950-I6Q4L2-M), Version 12.1(9)EA1, RELEASE SOFTWARE
.
.
.
C3660-2> show cdp traffic
CDP counters :
Total packets output: 81684, Input: 81790
Hdr syntax: 0, Chksum error: 0, Encaps failed: 0
Field Definition
Device ID The name of the neighbor device and either the MAC address or
the serial number of this device.
Local Intrfce The protocol being used by the connectivity media.
Holdtme The remaining amount of time (in seconds) the current device
will hold the CDP advertisement from a sending router before
discarding it.
Capability (Capability Codes) Capability (type of routing device) of the listed
neighboring device.
The capability types that can be discovered are:
R—Router
T—Transparent bridge
B—Source-routing bridge
S—Switch
H—Host
I— device is using IGMP
r—Repeater
Platform The product number of the device.
Port ID The protocol and port number of the device.
This chapter describes the Remote Monitoring (RMON) MIB agent specification, and how it can be used
in conjunction with Simple Network Management Protocol (SNMP) to monitor traffic using alarms and
events.
For a complete description of the RMON commands mentioned in this chapter, refer to the “RMON
Commands” chapter in the “System Management” part of the Release 12.2 Cisco IOS Configuration
Fundamentals Command Reference. To locate documentation of other commands that appear in this
chapter, use the command reference master index or search online.
Note Full RMON packet analysis (as described in RFC 1757) is supported only on an Ethernet interface
of Cisco 2500 series routers and Cisco AS5200 series universal access servers. RMON requires that
SNMP be configured (you must be running a version of SNMP on the server that contains the RMON
MIB). A generic RMON console application is recommended in order to take advantage of the
RMON network management capabilities. This feature supports RFCs 1757 and 2021.
RMON can be very data- and processor-intensive. Users should measure usage effects to ensure that
router performance is not degraded by RMON and to minimize excessive management traffic overhead.
Native mode in RMON is less intensive than promiscuous mode.
All Cisco IOS software images ordered without the explicit RMON option include limited RMON
support (RMON alarms and event groups only). Images ordered with the RMON option include support
for all nine management groups (statistics, history, alarms, hosts, hostTopN, matrix, filter, capture, and
event). As a security precaution, support for the capture group allows capture of packet header
information only; data payloads are not captured.
In Cisco IOS 12.1, the RMON agent was rewritten to improve performance and add some new features.
Table 23 highlights some of the improvements implemented.
Object Description
probeCapabilities The RMON software groups implemented.
probeSoftwareRev The current version of Cisco IOS running on the
device.
probeHardwareRev The current version of the Cisco device.
probeDateTime The current date and time.
probeResetControl Initiates a reset.
probeDownloadFile The source of the image running on the device.
probeDownloadTFTPServer The address of the server that contains the Trivial File
Transfer Protocol (TFTP) file that is used by the
device to download new versions of Cisco IOS
software.
probeDownloadAction Specifies the action of the commands that cause the
device to reboot.
probeDownloadStatus The state of a reboot.
netDefaultGateway The router mapped to the device as the default
gateway.
hcRMONCapabilities Specifies the features mapped to this version of
RMON.
Command Purpose
Router(config-if)# rmon {native | promiscuous} Enables RMON.
In native mode, RMON monitors only the packets normally received by the interface. In promiscuous
mode, RMON monitors all packets on the LAN segment.
The default size of the queue that holds packets for analysis by the RMON process is 64 packets. To
change the size of the queue, use the following command in global configuration mode:
Command Purpose
Router(config)# rmon queuesize size Changes the size of the RMON queue.
To set an RMON alarm or event, us the following commands in global configuration mode, as needed:
Command Purpose
Router(config)# rmon alarm number variable interval {delta Sets an alarm on a MIB object.
| absolute} rising-threshold value [event-number]
falling-threshold value [event-number] [owner string]
Router(config)# rmon event number [log] [trap community] Adds or removes an event in the RMON event table.
[description string] [owner string]
You can set an alarm on any MIB object in the access server. To disable an alarm, you must enable the
no form of this command on each alarm you configure. You cannot disable all the alarms you configure
at once. Refer to RFC 1757 to learn more about alarms and events and how they interact with each other.
The RMON MIB defines two traps, the risingAlarm and fallingAlarm traps generated when an RMON
alarmEntry risingThreshold or fallingThreshold event occurs. Thresholds allow you to minimize the number
of notifications sent on the network. Alarms are triggered when a problem exceeds a set rising threshold
value. No more alarm notifications are sent until the agent recovers, as defined by the falling threshold value.
This means that notifications are not sent each time a minor failure or recovery occurs.
To gather RMON statistics for these data types, use the following commands in interface configuration
mode, as needed:
Command Purpose
Router(config-if)# rmon collection history Enables an RMON history group of statistics on an interface.
{controlEntry integer} [owner ownername] [buckets
bucket-number] [interval seconds]
Router(config-if)# rmon collection host Enables an RMON host collection group of statistics on an
{controlEntry integer} [owner ownername] interface.
Router(config-if)# rmon collection matrix Enables an RMON matrix group of statistics on an interface.
{controlEntry integer} [owner ownername]
Router(config-if)# rmon collection rmon1 Enables all possible autoconfigurable RMON statistic
{controlEntry integer} [owner ownername] collections on an interface.
To specifically monitor these commands, use the show rmon capture, show rmon filter, show rmon
hosts, and show rmon matrix EXEC commands listed in the following table.
Command Function
Router> show rmon Displays general RMON statistics.
or
Router> show rmon task
Router> show rmon alarms Displays the RMON alarm table.
Router> show rmon capture Displays the RMON buffer capture table and current
configuration. Available only on Cisco 2500 series routers and
Cisco AS5200 access servers.
Router> show rmon events Displays the RMON event table.
Router> show rmon filter Displays the RMON filter table. Available only on Cisco 2500
series routers and Cisco AS5200 access servers.
Router> show rmon history Displays the RMON history table. Available only on Cisco 2500
series routers and Cisco AS5200 access servers.
Router> show rmon hosts Displays the RMON hosts table. Available only on Cisco 2500
series routers and Cisco AS5200 access serverss.
Router> show rmon matrix Display the RMON matrix table and values associated with
RMON variables. Available only on Cisco 2500 series routers
and Cisco AS5200 access servers.
Router> show rmon statistics Display the RMON statistics table. Available only on Cisco 2500
series routers and Cisco AS5200 access servers.
Router> show rmon topn Display the RMON top-n hosts table. Available only on Cisco
2500 series routers and Cisco AS5200 access servers.
This example creates RMON event number 1, which is defined as “High ifOutErrors”, and generates a
log entry when the event is triggered by an alarm. The user “owner_a” owns the row that is created in
the event table by this command. This example also generates an SNMP trap when the event is triggered.
The following example configures an RMON alarm using the rmon alarm global configuration
command:
Router(config)# rmon alarm 10 ifEntry.20.1 20 delta rising-threshold 15 1
falling-threshold 0 owner owner_a
This example configures RMON alarm number 10. The alarm monitors the MIB variable ifEntry.20.1
once every 20 seconds until the alarm is disabled, and checks the change in the rise or fall of the variable.
If the ifEntry.20.1 value shows a MIB counter increase of 15 or more, such as from 100000 to 100015,
the alarm is triggered. The alarm in turn triggers event number 1, which is configured with the rmon
event command. Possible events include a log entry or an SNMP trap. If the ifEntry.20.1 value changes
by 0, the alarm is reset and can be triggered again.
To view values associated with RMON variables, enter the show rmon matrix EXEC command (Cisco
2500 series routers and Cisco AS5200 access servers only). The following is a sample output:
For an explanation of the fields in the examples, refer to the respective command descriptions in the
“RMON Commands” chapter of the Release 12.2 Cisco IOS Configuration Fundamentals Command
Reference.
This chapter describes how to configure the Cisco Service Assurance Agent (SAA) to provide advanced
network service monitoring information using Cisco IOS Software Release 12.2. This chapter contains
the following sections:
• Understanding the Cisco SAA
• Cisco SAA Configuration Task List
• SAA Configuration Using the CLI Examples
• SAA Configuration Using SNMP Examples
For a complete description of the Cisco SAA configuration commands mentioned in this chapter, see the
“Cisco Service Assurance Agent Commands” chapter of the Release 12.2 Cisco IOS Configuration
Fundamentals Command Reference. To locate documentation of other commands that appear in this
chapter, use the Cisco IOS Command Reference Master Index or search online.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
SNMP notifications based on the data gathered by the SAA allow the router to receive alerts when
performance drops below a specified level and when problems are corrected. The SAA utilizes the Cisco
Round Trip Time Monitor (RTTMON) MIB for interaction between external NMS applications and the
SAA running on the Cisco devices. For a complete description of the object variables referenced by the
SAA feature, refer to the text of the CISCO-RTTMON-MIB.my file, available from the Cisco MIB
website.
Note SAA is an expansion of the Response Time Reporter (RTR) feature introduced in Cisco IOS Release
11.2. SAA retains the use of the RTR acronym in many of the configuration commands, and for the
configuration mode used to configure SAA operations. RTR is also used throughout the command
line interface (CLI) in the output of help and show commands.
To configure a new SAA operation, perform the following steps beginning in global configuration mode:
Step 1 Enter RTR configuration mode using the rtr operation-number global configuration command. The
operation-number argument specifies an identification number for the operation you will be configuring.
Step 2 Use one of the type commands listed in the “Configuring the Operation Type” section to specify which
type of operation you are configuring.
Step 3 (Optional) Configure characteristics for the operation, one characteristic per line, using the commands
found in “Configuring SAA Operation Characteristics” section.
Step 4 Type exit to return to global configuration mode.
Step 5 (Optional) Set reaction conditions for the operation, as described in the “Setting Reaction Thresholds.”
Step 6 Schedule the operation start time, as described in the “Scheduling the Operation” section.
For an example of this process, see the “IP/ICMP Path Echo Example” found in the “SAA Configuration
Using the CLI Examples” section.
Command Purpose
Router(config-rtr)# frequency seconds Sets how often the operation should send a probe out to
gather statistics. This command applies to all operation
types.
Router(config-rtr)# lsr-path {name | ipaddr} Defines a LSR path for an IP/ICMP echo probe. This
[name | ipaddr]... command applies only to IP/ICMP Echo operations.
Note LSR paths can be specified for IP/ICMP Echo
operations, but not for IP/ICMP PathEcho
operations.
Command Purpose
Router(config-rtr)# owner text Configures the SNMP owner of the operation.
This command applies to all operation types.
Router(config-rtr)# request-data-size bytes Sets the protocol data size in the payload of the probe
request packet of the probe. This command applies to
the following operation types: IP/ICMP Echo, UDP
Echo, Jitter, DLSW, and SNA Echo
Router(config-rtr)# response-data-size bytes Sets the protocol data size in the payload of the response
packet of the operation. This command applies only to
SNA Echo operations.
Router(config-rtr)# tag text Logically links operations in a group. This command
applies to all operations.
Router(config-rtr)# timeout milliseconds Sets the amount of time the probe waits for a response
from its request packet. This command applies to all
operations.
Router(config-rtr)# tos number Defines the IP ToS byte for request packets.
This command applies to the following operation types:
IP/ICMP Echo, UDP Echo, and Jitter.
Command Purpose
Router(config)# rtr operation_id Specifies the operation number of the SAA operation you
want to configure.
Router(config-rtr)# verify-data Enables data verification for IP/ICMP Echo, SNA Echo,
UDP Echo, and Jitter operations. Checks each operation
response for corruption. Use the verify-data command
only when corruption may be an issue. Do not enable this
feature during normal operation because it causes
unnecessary overhead.
Router(config-rtr)# data-pattern hex-pattern Allows you to specify an alphanumeric character string to
verify that a udpEcho operation payload is not getting
corrupted. The default data pattern used by the SAA is
ABCD. This command allows you to specify your own
hexadecimal patterns to more precisely monitor different
source-to-destination and destination-to-source packets.
This command works only for UDP Echo operations in this
release.
Command Purpose
Router(config-rtr)# distributions-of-statistics-kept size Sets the number of buckets or statistical distributions
kept during the lifetime of the probe. Size is the number
of buckets that contain data counts for their intervals.
Applies to the following operations: IP/ICMP Echo,
IP/ICMP Path Echo, UDP Echo, TcpConnect, DNS,
DLSw, and SNA Echo.
Router(config-rtr)# hops-of-statistics-kept size Collects pathEcho statistical distributions per hop per
path. Size specifies the number of hops for which
statistics are collected per path for each probe
Applies to IP/ICMP Path Echo operations only.
Router(config-rtr)# hours-of-statistics-kept hours Sets the number of hours for which statistics are
maintained for the probe. Applies to the following
operations: IP/ICMP Echo, IP/ICMP Path Echo, UDP
Echo, TcpConnect, DNS, DLSw, and SNA Echo.
For HTTP and Jitter operations, statistics are kept for
the last 2 hours. This parameter cannot currently be
reconfigured by a user.
Command Purpose
Router(config-rtr)# paths-of-statistics-kept size Collects statistical distributions for multiple paths. Size
specifies the number of paths for which statistical
distribution buckets are maintained per hour for each
probe. Applies to IP/ICMP Path Echo operations only.
Router(config-rtr)# statistics-distribution-interval Sets the time interval for each statistical distribution.
milliseconds Applies to the following operations: IP/ICMP Echo,
IP/ICMP Path Echo, UDP Echo, TcpConnect, DNS,
DLSw, and SNA Echo.
Note When the distribution-of-statistics-kept command is set to the default (1), you need not set the
statistics-distribution-interval command because it has no effect on the statistics kept. For more
information, refer to the command documentation in the “Cisco Service Assurance Agent
Commands” chapter of the Cisco IOS Configuration Fundamentals Command Reference.
Note Collecting history increases the RAM usage. Collect history only when you believe there is a problem
in the network. For general network response time information, use the statistics collected by the
SAA. See the “Setting Statistics Gathering Characteristics” section for more information on statistics
collection.
To control how much and which type of history is collected on the router, use the following commands
in RTR configuration mode, as required:
Command Purpose
Router(config-rtr)# buckets-of-history-kept size For a pathEcho probe, sets the number of paths to store.
For all other probes, sets the number (size) of data
points to be kept. Applies to the following operations:
IP/ICMP Echo, IP/ICMP Path Echo, UDP Echo,
TcpConnect, DNS, DLSw, and SNA Echo.
Router(config-rtr)# filter-for-history {none | all | Defines the type of information kept in the history table
overthreshold | failures} for the probe. This is a required command to enable
history. The all, overthreshold, or failures keywords
must be specified for history to work. Applies to the
following operations: IP/ICMP Echo, IP/ICMP Path
Echo, UDP Echo, TcpConnect, DNS, DLSw, and SNA
Echo.
Router(config-rtr)# lives-of-history-kept lives Enables history collection and sets the number of lives
maintained in the history table for the probe. Applies to
the following operations: IP/ICMP Echo, IP/ICMP Path
Echo, UDP Echo, TcpConnect, DNS, DLSw, and SNA
Echo.
Router(config-rtr)# samples-of-history-kept samples For a pathEcho probe, sets the number of hops in a path.
For all other probes, RTR sets the number of samples
to 1. Applies to the following operations: IP/ICMP
Echo, IP/ICMP Path Echo, UDP Echo, TcpConnect,
DNS, DLSw, and SNA Echo.
To disable history collection, use the default value (0) for the lives-of-history-kept command rather than
the filter-for-history none command. The lives-of-history-kept command disables history collection
before the operation of the probe is attempted, and the filter-for-history command with the none
keyword checks for history inclusion after the operation of the probe attempt is made.
To configure the rising threshold for an event, use the following command in RTR configuration mode
when configuring the operation:
Command Purpose
Router(config-rtr)# threshold milliseconds Configures the rising threshold (hysteresis) that
generates a reaction event and stores history
information for the operation. This command applies to
all operation types.
To configure the reaction conditions for an operation (including the falling threshold), use the following
commands in global configuration mode:
Command Purpose
Step 1 Router(config)# rtr reaction-configuration Configures certain actions (for example, checking for
operation-number [connection-loss-enable] connection losses or timeouts) to occur based on events
[timeout-enable] [threshold-falling milliseconds]
[threshold-type option] [action-type option]
controlled by the SAA.
Step 2 Router(config)# rtr reaction-trigger Defines an action type that will activate the operation.
operation-number target-number
Command Purpose
Router(config)# rtr schedule operation-number Schedules the operation by configuring the time
[life {forever | seconds}] [start-time parameters.
{hh:mm[:ss] [month day | day month] | pending | now |
after hh:mm:ss}] [ageout seconds]
Note After you schedule the operation with the rtr schedule command, you cannot change the
configuration of the operation with the rtr global configuration command. To change the
configuration of a scheduled operation, use the no form of the rtr command. The no form of the
command removes all the configuration information of the operation, including the schedule,
reaction configuration, and reaction triggers. You can now create a new configuration for the
operation.
If the operation is in a pending state (the default), you can define the conditions under which the
operation makes the transition from pending to active with the rtr reaction-trigger global configuration
command. When the operation is in an active state it immediately begins collecting information.
Command Purpose
Router(config)# rtr responder [type {udpEcho | tcpConnect} Enables SAA Responder functionality on a Cisco
[ipaddr ipaddr] {port port}] device. The optional type, ipaddr, and port keywords
enable the SAA Responder to respond to probe packets
without receiving control protocol packets. Note that if
you use these keywords, however, generation of packet
loss statistics will not be possible for the operation.
To configure the SAA RTR authentication, use the following command in global configuration mode:
Command Purpose
Router(config)# rtr key-chain name Specifies the key chain to be used for authentication of
SAA operations.
Command Purpose
Router(config)# rtr reset Stops all operations and clears all SAA RTR
configuration information.
Caution Use the rtr reset command only in extreme situations such as the incorrect configuration of a
number of operations. The rtr reset command removes all SAA RTR configuration from the running
configuration file.
In addition to stopping all operations and clearing the RTR configuration information, the rtr reset
command returns the running configuration information to the startup condition. This command does not
reread the configuration stored in NVRAM (the startup configuration file). To reconfigure the SAA, you
must reenter the appropriate SAA configuration commands, or copy an existing configuration file
containing your desired SAA configuration to the running configuration.
Command Purpose
Router(config)# rtr restart operation-number Restarts an operation
Note that you can only restart operations in the active state; operations in the pending state cannot be
restarted.
Command Purpose
Router> show rtr application [tabular | full] Displays global information about the SAA feature.
Router> show rtr authentication Displays authentication information.
Router> show rtr collection-statistics [number] Displays error totals collected for all operations or a
[tabular | full] specified operation.
Router> show rtr configuration [number] [tabular | full] Displays configuration values including all defaults for
all operations or a specified operation.
Router> show rtr distributions-statistics [number] Displays statistical distribution information (captured
[tabular | full] response times) for all operations or a specified
operation.
Router> show rtr history [number] [tabular | full] Displays history collected for all operations or a
specified operation.
Router> show rtr operational-state [number] Displays the operational state of all operations or a
[tabular | full] specified operation.
Router> show rtr reaction-trigger [number] Displays the reaction trigger information for all
[tabular | full] operations or a specified operation.
Router> show rtr responder Displays SAA Responder information.
Router> show rtr totals-statistics [number] Displays the total statistic values (accumulation of error
[tabular | full] counts and completions) for all operations or a specified
operation.
For examples of the information displayed by these commands, and explanations of the output fields, see
the “Cisco Service Assurance Agent Commands” chapter of the Release 12.2 Cisco IOS Configuration
Fundamentals Command Reference.
Command Purpose
Router(config)# rtr low-memory value Specifies the amount of memory (in bytes) that must be
available to allow SAA configuration.
The rtr low-memory RTR configuration command allows you to specify the amount of memory that
must be available to allow SAA configuration. The default value is 25 percent of the memory available
on the system at startup. If the amount of available free memory falls below the value specified in the
rtr low-memory command, then the SAA will not allow new operations to be configured. (The
low-memory value is also referred to as the lowWaterMark.) If the value is set to 0, then SAA operations
can be created until the system runs out of memory.
The value of the rtr low-memory command should not exceed the amount of free memory available on
the system. To determine the amount of free memory available on the system, use the show memory
EXEC command.
For example, if there is 6 MB of free memory when system starts up, and the default lowWaterMark is
used, then SAA can use up to 4.5 MB memory for creating operations. If the free memory drops below
1.5 MB, then SAA cannot create any more operations.
Before every new operation is created, the SAA checks the lowWaterMark to ensure that it does not
consume more memory than it is configured for.
The SAA also provides a MIB variable (rttMonApplProbeCapacity) to track how many operations
(probes) can be created with the available memory. Each operation takes about 14 KB of memory (when
default options are used). The equation to compute rttMonApplProbeCapacity is:
rttMonApplProbeCapacity =
MIN(((Free_Bytes_on_the_Router–rttMonApplFreeMemLowWaterMark) /
Memory_required_by_each_probe),
(rttMonApplNumCtrlAdminEntry–Num_of_Probes_already_configured))
For example, when the system boots, the rttMonApplProbeCapacity variable might show that 200
operations can be configured. But if other subsystems in the router start using up more memory when
network gets busy, the SAA may only be able to configure 150 probes.
The show rtr application EXEC command will display the number of operations that can be run on the
device in the “System Max Number of Entries” field.
The packets SAA sends out to measure Jitter carry packet sending sequence and receiving sequence
information, and sending and receiving time stamps from source and responder. Based on these, Jitter
operations are capable of measuring the following:
• Per-direction delay variance between packets (jitter)
• One-way delay
• Per-direction packet-loss
• Average round trip time
Jitter
Based on time stamps from consecutive packets, the sender can calculate the jitter value, which is the
difference in the latency (interpacket delay). Note that for the interpacket delay the clocks on the two
devices need not be synchronized.
One-Way Delay
The Jitter probe packet contains four time stamps for its journey from host A to host B and back again:
time sent from A, time received at B, time sent from B, and time received at A. The one-way delay is
computed using the following simple formulae:
one-way delay from A to B = time received at B–time sent from A
one-way delay from B to A = time received at A–time sent from B
Therefore, to accurately measure per-direction delay between two devices, you must synchronize the
clocks on each device. To synchronize the clocks on each device, you must configure the Cisco IOS
Network Time Protocol (NTP) feature on both the source and destination devices.
If the sum of the source to destination (SD) and the destination to source (DS) values is not within
10 percent of the round-trip time, the one-way measurement value is considered faulty and is discarded.
This type of inaccuracy usually is found in devices that are not time-synchronized.
To configure a Jitter operation, use the following commands beginning in global configuration mode:
Command Purpose
Step 1 Router(config)# rtr operation-number Specifies an operation and enters RTR
configuration mode.
Step 2 Router(config-rtr)# type jitter dest-ipaddr {name | Defines a Jitter operation.
ipaddr} dest-port port-number [source-ipaddr {name |
ipaddr}] [source-port port-number] [control {enable |
disable}] [num-packets number-packets]
[interval inter-packet-interval]
Step 3 Router(config-rtr)# frequency seconds (Optional) Sets how often the operation should
send a probe out to gather statistics.
Step 4 Router(config-rtr)# owner text (Optional) Configures the SNMP owner of the
operation.
Step 5 Router(config-rtr)# tag text (Optional) Logically links operations in a group.
Step 6 Router(config-rtr)# timeout milliseconds (Optional) Sets the amount of time the probe waits
for a response from its request packet.
Command Purpose
Step 7 Router(config-rtr)# tos number (Optional) Defines the IP ToS byte for request
packets. (This command applies to the IP/ICMP
Echo, UDP Echo, and Jitter operation types only.)
Step 8 Router(config)# rtr schedule operation-number [life Schedules the operation by configuring the time
seconds] [start-time {pending | now | hh:mm [month day parameters.
| day month]}] [ageout seconds]
You must also enable the SAA Responder on the destination device. To enable the Responder, configure
the following global configuration command on the destination device:
Command Purpose
Router(config)# rtr responder Enables SAA Responder functionality on a device.
Alternatively, you can enable the SAA Responder using SNMP with the rttMonApplResponder.0
-Integer 1 command from a network management application.
To monitor the operational state of the Jitter operation, use the show rtr operational-state EXEC
command. To view the statistics gathered by Jitter operation, use the show rtr collection-statistics
EXEC command.
In some cases, you may wish to disable SAA RTR control protocol traffic while still allowing a Jitter
operation. You can avoid control message traffic by configuring a specific port to be permanently open
for the Responder.
Note If you disable the SAA RTR Control Procotol, only round-trip-time statistics will be gathered for the
Jitter operation.
To disable RTR control protocol traffic, use the control disable option when configuring the Jitter
operation on the origin device:
Command Purpose
Router(config-rtr)# type jitter dest-ipaddr ipaddr dest-port Configures the operation as a Jitter operation.
port-number control disable
• Use of the control disable keywords disable
RTR control protocol messages.
Then enable the SAA Responder on the destination device. With the control protocol disabled, you must
specify the operation type, as shown here:
Command Purpose
Router(config)# rtr responder type udpEcho ipaddr ipaddr port Enables SAA Responder functionality on a device.
port-number
• Note that the udpEcho keyword corresponds to
the Jitter operation type.
The following example shows the configuration for the sending device and the target device. The same
port number is specified on each.
Note that in this configuration, most of the standard Jitter statistics can not be collected.
Command Purpose
Step 1 Router(config)# rtr operation-number Specifies an operation and enters RTR
configuration mode.
Step 2 Router(config-rtr)# type dhcp [source-ipaddr Defines a DHCP operation. DHCP option 82 allows
source-ipaddr] [dest-ipaddr dest-ipaddr] [option 82 you to specify the circuit ID, remote ID, or the
[circuit-id circuit-id] [remote-id remote-id]
[subnet-mask subnet-mask]]
subnet mask for the destination DHCP server.
Step 3 Router(config-rtr)# frequency seconds (Optional) Sets how often the operation should be
performed (for example, frequency 60 indicates
once every 60 seconds).
Step 4 Router(config-rtr)# owner text (Optional) Configures the SNMP owner of the
operation.
Step 5 Router(config-rtr)# tag text (Optional) Logically links operations in a group.
Step 6 Router(config-rtr)# timeout milliseconds (Optional) Sets the amount of time the probe waits
for a response from its request packet.
Step 7 Router(config)# rtr schedule operation-number [life Schedules the operation by configuring the time
seconds] start-time {pending | now | hh:mm [month day parameters.
| day month]} [ageout seconds]
To test how long is taken for the system to obtain an IP address from a specific DHCP server, use the
following global configuration command in addition to the commands above:
Command Purpose
Router(config)# ip dhcp-server ipaddress Specifies a single DHCP server to be used for
DHCP requests from the system.
For examples of configuring the SAA using SNMP, see the“SAA Configuration Using SNMP Examples”
section.
Command Purpose
Step 1 Router(config)# snmp-server enable traps rtr Enables the sending of SAA RTR notifications.
Step 2 Router(config)# snmp-server host host [traps | informs] Specifies whether you want the SNMP
[version {1 | 2c | 3 [auth | noauth | priv]}] notifications sent as traps or informs, the version
community-string [rtr]
of SNMP to use, the security level of the
notifications (for SNMPv3), and the recipient
(host) of the notifications.
The RTR notifications are defined in the CISCO-RTTMON-MIB (enterprise 1.3.6.1.4.1.9.9.42.2) and
are as follows:
• 1 rttMonConnectionChangeNotification
• 2 rttMonTimeoutNotification
• 3 rttMonThresholdNotification
• 4 rttMonVerifyErrorNotification
For further SNMP configuration steps, see the “Configuring SNMP Support” chapter in this document.
must be configured: CWBC0A and CWBC0B. For information on configuring SNA PUs, see the dspu
host or the sna host command in the Cisco IOS Bridging and IBM Networking Command Reference,
Volume 2.
Controlling Host 2
Host 1
Operation 1
Operation 2
Router A Router B
47911
CiscoWorks
Router A Configuration
RouterA(config)# rtr 1
RouterA(config-rtr)# type echo protocol snaLU2EchoAppl CWBC0A
RouterA(config-rtr)# exit
RouterA(config)# rtr schedule 1 start-time now
RouterA(config)#
Router B Configuration
RouterB(config)# rtr 2
RouterB(config-rtr)# type echo protocol snaLU2EchoAppl CWBC0B
RouterB(config-rtr)# exit
RouterB(config)# rtr schedule 1 start-time now
RouterB(config)#
paths-of-statistics-kept 1
hops-of-statistics-kept 1
samples-of-history-kept 1
rtr schedule 2 start-time now
Controlling Host 2
Host 1
Operation 3
Router A Router B
47912
Performance
management application
This example sets up a pathEcho (with history) pending entry from Router B to Router A via IP/ICMP.
It attempts to execute three times in 25 seconds (first attempt starts at 0 seconds) and keeps statistics for
those three attempts in three history buckets. The entry can be started five times before wrapping over
stored history (lives-of-history-kept = 5).
Router B Configuration
RouterB(config)# rtr 3
RouterB(config-rtr)# type pathEcho protocol ipIcmpEcho RouterA
RouterB(config-rtr)# frequency 10
RouterB(config-rtr)# lives-of-history-kept 5
RouterB(config-rtr)# buckets-of-history-kept 3
RouterB(config-rtr)# filter-for-history all
RouterB(config-rtr)# exit
RouterB(config)# rtr schedule 3 life 25
RouterB(config)# exit
Router B Configuration
After you save the configuration (using the copy running-config startup-config EXEC command), the
information is stored in the configuration file. Some necessary default forms of commands are
automatically included if they are not specified in the configuration setting, based on their necessity for
operation execution. In this example, the default response-data-size command is added to the
configuration file automatically.
RouterB# show startup-config
.
.
.
!
rtr 3
type pathEcho protocol ipIcmpEcho 172.28.161.21
frequency 10
response-data-size 1
lives-of-history-kept 5
buckets-of-history-kept 3
filter-for-history all
rtr schedule 3 life 25 start-time pending
!
.
.
.
Note that the SAA Responder need not be enabled on Router A for this operation.
TcpConnect Example
The example in Figure 21 shows a tcpConnect operation configured from Router B to the Telnet port
(TCP port 23) of IP Host 1 (IP address 10.0.0.1).
IP Host 1
Performance Router B
management
Router B Configuration
RouterB(config)# rtr 5
RouterB(config-rtr)# type tcpConn dest-ipaddr 10.0.0.1 dest-port 23 control disable
RouterB(config-rtr)# exit
RouterB(config)# rtr schedule 5 start now
In the example, the Control Protocol for the probe is disabled. RTR Collector uses the RTR control
protocol to notify the RTR Responder on the responder router to enable the target port temporarily. This
action allows the Responder to respond to the probe packet. In this case, because the target is not a router
and a well-known TCP port is used, there is no need to send the control message.
IP Host 1
Router A
UDP Echo operation
47914
Performance Router B
management
Note Configuring the SAA Control Protocol authentication is optional. However, if you configure
authentication for Router B, you must configure the same authentication for Router A.
In the following configuration example, a key chain named csaa-key is configured on both routers. The
rtr key-chain global configuration command enables RTR MD5 authentication on the control messages.
Router A Configuration
RouterA(config)# key chain csaa-key
RouterA(config-keychain)# key 1
RouterA(config-keychain-key)# key-string secret
RouterA(config-keychain-key)# exit
RouterA(config-keychain)# exit
RouterA(config)# rtr key-chain csaa-key
RouterA(config)# rtr responder
Router B Configuration
RouterB(config)# key chain csaa-key
RouterB(config-keychain)# key 1
RouterB(config-keychain-key)# key-string secret
RouterB(config-keychain-key)# exit
RouterB(config-keychain)# exit
RouterB(config)# rtr key-chain csaa-key
RouterB(config)# rtr 6
RouterB(config-rtr)# type udpEcho dest-ipaddr 20.0.0.1 dest-port 888 control enable
RouterB(config-rtr)# exit
RouterB(config)# rtr schedule 6 start now
IP Host 1
Router A
Jitter operation
18172
CiscoWorks Router B
Router A Configuration
RouterA(config)# rtr responder
Router B Configuration
RouterB(config)#rtr 200
RouterB(config-rtr)#type jitter dest-ip 172.24.132.100 dest-port 99 num-packets 20
interval 20
After the Jitter operation has run, you can display the results with the show rtr collection-statistics
EXEC command. The following example shows sample output:
Entry Number: 200
Target Address: 172.24.132.100, Port Number: 31337
Start Time: *14:14:14.000 EST Thu Apr 6 2000
RTT Values:
NumOfRTT: 2800 RTTSum: 4792 RTTSum2: 8830
Packet Loss Values:
PacketLossSD: 0 PacketLossDS: 0
PacketOutOfSequence: 0 PacketMIA: 0 PacketLateArrival: 0
InternalError: 0 Busies: 0
Jitter Values:
MinOfPositivesSD: 1 MaxOfPositivesSD: 1
NumOfPositivesSD: 249 SumOfPositivesSD: 249 Sum2PositivesSD: 249
MinOfNegativesSD: 1 MaxOfNegativesSD: 2
NumOfNegativesSD: 238 SumOfNegativesSD: 239 Sum2NegativesSD: 241
MinOfPositivesDS: 1 MaxOfPositivesDS: 1
The values shown indicate the aggregated values for the current hour. RTT stands for Round-Trip-Time.
Table 25 describes the significant fields shown in the display.
Field Description
NumOfRTT The number of successful round trips.
RTTSum The sum of those round-trip values (in ms).
RTTSum2 The sum of squares of those round-trip values (in ms).
PacketLossSD The number of packets lost from source to destination.
PacketLossDS The number of packets lost from destination to source.
PacketOutOfSequence The number of packets returned out of order.
PacketMIA The number of packets lost where the direction (SD/DS)
cannot be determined.
PacketLateArrival The number of packets that arrived after the timeout.
InternalError The number of times an operation could not be started due to
other internal failures.
Busies The number of times this operation could not be started
because the previously scheduled run was not finished.
MinOfPositivesSD The minimum and maximum positive jitter values from
MaxOfPositivesSD source to destination (in ms). Positive jitter values indicate
delays in receiving time from one packet to another.
NumOfPositivesSD The number of jitter values from source to destination that are
positive (that is, network latency increases for two
consecutive test packets).
SumOfPositivesSD The sum of those positive values (in ms).
Sum2PositivesSD The sum of the squares of the positive values.
MinOfNegativesSD The minimum and maximum negative jitter values from
MaxOfNegativesSD source to destination. The absolute value is given.
NumOfNegativesSD The number of jitter values from source to destination that are
negative (that is, network latency decreases for two
consecutive test packets).
SumOfNegativesSD The sum of the negative values.
Sum2NegativesSD The sum of the squares of the negative values.
The DS values show the same information as above for DS Jitter values.
HTTP server
18170
Performance Router B
management
li ti
Router B Configuration
RouterB(config)#rtr 5
RouterB(config-rtr)#type http operation get url http://www.cisco.com
RouterB(config-rtr)# exit
RouterB(config)# rtr schedule 5 start-time now
FTP server
38175
Performance Router B
management
In this example, SAA operation 20 is configured as an FTP operation; ira is the user, smith is the
password, zxq is the host name or address, and test is the file name.
RouterB(config)# rtr 20
RouterB(config-rtr)# type ftp operation get url ftp://ira:smith@zxq/test
RouterB(config-rtr)# exit
RouterB(config)# rtr schedule 20 start-time now
DNS server
18171
Performance Router B
management application
RouterB(config)#rtr 7
RouterB(config-rtr)#type dns target-addr lethe name-server 172.20.2.132
RouterB(config-rtr)# exit
RouterB(config)# rtr schedule 7 start-time now
DLSw operation
18173
Router A Router B
172.20.26.10 172.21.27.11
Option 82 is is called the Relay Agent Information option and is inserted by the DHCP relay agent when
forwarding client-originated DHCP packets to a DHCP server. Servers recognizing the Relay Agent
Information option may use the information to implement IP address or other parameter assignment
policies. The DHCP server echoes the option back verbatim to the relay agent in server-to-client replies,
and the relay agent strips the option before forwarding the reply to the client.
The Relay Agent Information option is organized as a single DHCP option that contains one or more
suboptions that convey information known by the relay agent. The initial suboptions are defined for a
relay agent that is co-located in a public circuit access unit. These include a circuit-id for the incoming
circuit, a remote-id that provides a trusted identifier for the remote high-speed modem, and the
subnet-mask of the logical IP subnet from which the relay agent received the client DHCP packet.
Controlling Host 2
Host 1
Operation 1
Operation 2
Operation 3
Router A Router B
47915
CiscoWorks
Router B Configuration
RouterB(config)# rtr reaction-configuration 2 connection-loss-enable action-type
trapNmvtAndTrigger
RouterB(config)# rtr reaction-trigger 2 3
Note The operation numbers must be unique within only one router. The examples shown use three
different probe operation numbers for clarity.
rttMonCtrlAdminRttType.<index> -Integer 2 \
rttMonEchoAdminProtocol.<index> -Integer 2 \
rttMonEchoAdminTargetAddress.<index> -OctetString "05 00 00 02" \
rttMonScheduleAdminRttStartTime.<index> -TimeTicks 1 \
rttMonScheduleAdminConceptRowAgeout.<index> -Integer 0
The Web Cache Communication Protocol (WCCP) is a Cisco-developed content-routing technology that
allows you to integrate cache engines (such as the Cisco Cache Engine 550) into your network
infrastructure. Cisco IOS Release 12.1 and later releases allow the use of either Version 1 (WCCPv1) or
Version 2 (WCCPv2) of the WCCP. This chapter describes how to configure your router to redirect
traffic to cache engines (web caches), describes how to manage cache engine clusters (cache farms), and
outlines the benefits of using WCCPv2.
For a complete description of the WCCP configuration commands in this chapter, refer to the “WCCP
Commands” chapter in the Release 12.2 Cisco IOS Configuration Fundamentals Command Reference.
To locate documentation of other commands that appear in this chapter, use the command reference
master index or search online.
The tasks in this chapter assume that you have already configured cache engines on your network. For
specific information on hardware and network planning associated with Cisco Cache Engines and
WCCP, see the Product Literature and Documentation links available on the Cisco.com Web Scaling site
at http://www.cisco.com/warp/public/cc/pd/cxsr/ces/index.shtml.
Note Cisco Systems replaced the Cache Engine 500 Series platforms with Content Engine Platforms in
July 2001. Cache Engine Products were the Cache Engine 505, 550, 570, and 550-DS3. Content
Engine Products are the Content Engine 507, 560, 590, and 7320.
To identify hardware or software image support for a specific feature, use Feature Navigator on
Cisco.com to search for information about the feature or refer to the software release notes for a specific
release. For more information, see the “Identifying Platform Support for Cisco IOS Software Features”
section in the “About Cisco IOS Software Documentation” chapter.
Understanding WCCP
The Cisco IOS WCCP feature allows utilization of Cisco Cache Engines (or other caches running
WCCP) to localize web traffic patterns in the network, enabling content requests to be fulfilled locally.
Traffic localization reduces transmission costs and download time.
WCCP enables Cisco IOS routing platforms to transparently redirect content requests. The main benefit
of transparent redirection is that users need not configure their browsers to use a web proxy. Instead, they
can use the target URL to request content, and have their requests automatically redirected to a cache
engine. The word “transparent” is this case means that the end user does not know that a requested file
(such as a web page) came from the cache engine instead of from the originally specified server.
When a cache engine receives a request, it attempts to service it from its own local cache. If the requested
information is not present, the cache engine issues its own request to the originally targeted server to get
the required information. When the cache engine retrieves the requested information, it forwards it to
the requesting client and caches it to fulfill future requests, thus maximizing download performance and
substantially reducing transmission costs.
WCCP enables a series of cache engines, called a cache engine cluster, to provide content to a router or
multiple routers. Network administrators can easily scale their cache engines to handle heavy traffic
loads through these clustering capabilities. Cisco clustering technology enables each cache member to
work in parallel, resulting in linear scalability. Clustering cache engines greatly improves the scalability,
redundancy, and availability of your caching solution. You can cluster up to 32 cache engines to scale to
your desired capacity.
Internet
Router
100BASE-T
Cache 1
Clients
Cache 2
Cache 3
S6529
Clients
Content is not duplicated on the cache engines. The benefit of using multiple caches is that you can scale
a caching solution by clustering multiple physical caches to appear as one logical cache.
The following sequence of events details how WCCPv1 configuration works:
1. Each cache engine is configured by the system administrator with the IP address of the control
router. Up to 32 cache engines can connect to a single control router.
2. The cache engines send their IP addresses to the control router using WCCP, indicating their
presence. Routers and cache engines communicate to each other via a control channel; this channel
is based on UDP port 2048.
3. This information is used by the control router to create a cluster view (a list of caches in the cluster).
This view is sent to each cache in the cluster, essentially making all the cache engines aware of each
other. A stable view is established after the membership of the cluster remains the same for a certain
amount of time.
4. Once a stable view has been established, one cache engine is elected as the lead cache engine. (The
lead is defined as the cache engine seen by all the cache engines in the cluster with the lowest IP
address). This lead cache engine uses WCCP to indicate to the control router how IP packet
redirection should be performed. Specifically, the lead cache engine designates how redirected
traffic should be distributed across the cache engines in the cluster.
Internet
Service group
100BASE-T
Cache 1
Clients 100BASE-T
Clients 100BASE-T
Cache 2
Clients 100BASE-T
Clients 100BASE-T
Cache 3
Clients 100BASE-T 23810
Clients
The subset of cache engines within a cluster and routers connected to the cluster that are running the
same service is known as a service group. Available services include TCP and User Datagram Protocol
(UDP) redirection.
Using WCCPv1, the cache engines were configured with the address of the single router. WCCPv2
requires that each cache engine be aware of all the routers in the service group. To specify the addresses
of all the routers in a service group, you must choose one of the following methods:
• Unicast—A list of router addresses for each of the routers in the group is configured on each cache
engine. In this case the address of each router in the group must be explicitly specified for each cache
engine during configuration.
• Multicast—A single multicast address is configured on each cache engine. In the multicast address
method, the cache engine sends a single-address notification that provides coverage for all routers
in the service group. For example, a cache engine could indicate that packets should be sent to a
multicast address of 224.0.0.100, which would send a multicast packet to all routers in the service
group configured for group listening using WCCP (see the ip wccp group-listen interface
configuration command for details).
The multicast option is easier to configure because you need only specify a single address on each cache
engine. This option also allows you to add and remove routers from a service group dynamically, without
needing to reconfigure the cache engines with a different list of addresses each time.
The following sequence of events details how WCCPv2 configuration works:
1. Each cache engine is configured with a list of routers.
2. Each cache engine announces its presence and a list of all routers with which it has established
communications. The routers reply with their view (list) of cache engines in the group.
3. Once the view is consistent across all cache engines in the cluster, one cache engine is designated
as the lead and sets the policy that the routers need to deploy in redirecting packets.
The following sections describe how to configure WCCPv2 on routers so they may participate in a
service group.
WCCPv2 Features
WCCPv2 provides the features described in the following sections:
• Support for Services Other than HTTP
• Support for Multiple Routers
• MD5 Security
• Web Cache Packet Return
• Load Distribution
MD5 Security
WCCPv2 provides optional authentication that enables you to control which routers and cache engines
become part of the service group using passwords and the HMAC MD5 standard. Shared-secret MD5
one-time authentication (set using the ip wccp [password [0-7] password] global configuration
command) enables messages to be protected against interception, inspection, and replay.
Load Distribution
WCCPv2 can be used to adjust the load being offered to individual cache engines to provide an effective
use of the available resources while helping to ensure high quality of service (QoS) to the clients.
WCCPv2 allows the designated cache to adjust the load on a particular cache and balance the load across
the caches in a cluster. WCCPv2 uses three techniques to perform load distribution:
• Hot Spot Handling—Allows an individual hash bucket to be distributed across all the cache engines.
Prior to WCCPv2, information from one hash bucket could only go to one cache engine.
• Load Balancing—Allows the set of hash buckets assigned to a cache engine to be adjusted so that
the load can be shifted from an overwhelmed cache engine to other members that have available
capacity.
• Load Shedding—Enables the router to selectively redirect the load to avoid exceeding the capacity
of a cache engine.
The use of these hashing parameters prevents one cache from being overloaded and reduces the potential
for bottlenecking.
Configuring WCCP
The following configuration tasks assume that you have already installed and configured the cache
engines you want to include in your network. You must configure the cache engines in the cluster before
configuring WCCP functionality on your routers. Refer to the Cisco Cache Engine User Guide for cache
engine configuration and setup tasks.
IP must be configured on the router interface connected to the cache engines and on the router interface
connected to the Internet. Note that Cisco Cache Engines require use of a Fast Ethernet interface for a
direct connection. Examples of router configuration tasks follow this section. For complete descriptions
of the command syntax, refer to the Release 12.2 Cisco IOS Configuration Fundamentals Command
Reference.
Perform the tasks found in the following sections to configure WCCP on a router:
• Specifying a Version of WCCP (Optional)
• Configuring a Service Group Using WCCPv2 (Required)
• Excluding Traffic on a Specific Interface from Redirection (Optional)
• Registering a Router to a Multicast Address (Optional)
• Using Access Lists for a WCCP Service Group (Optional)
• Setting a Password for a Router and Cache Engines (Optional)
Command Purpose
Router# ip wccp version {1 | 2} Specifies which version of WCCP to configure on a router. WCCPv2 is the
default running version.
WCCPv1 does not use the WCCP commands from earlier Cisco IOS versions. Instead, use the WCCP
commands documented in this chapter. If a function is not allowed in WCCPv1, an error prompt will be
printed to the screen. For example, if WCCPv1 is running on the router and you try to configure a
dynamic service, the following message will be displayed: “WCCP V1 only supports the web-cache
service.” The show ip wccp EXEC command will display the WCCP protocol version number that is
currently running on your router.
Note More than one service can run on a router at the same time, and routers and cache devices can be part
of multiple service groups at the same time.
The dynamic services are defined by the cache engines; the cache instructs the router which protocol or
ports to intercept, and how to distribute the traffic. The router itself does not have information on the
characteristics of the dynamic service group’s traffic, because this information is provided by the first
web cache to join the group. In a dynamic service, up to eight ports can be specified within a single
protocol.
Cisco Cache Engines, for example, use dynamic service 99 to specify a reverse-proxy service. However,
other cache devices may use this service number for some other service. The following configuration
information deals with enabling general services on Cisco routers. Refer to the cache server
documentation for information on configuring services on cache devices.
To enable a service on a router, use the following commands, beginning in global configuration mode:
Command Purpose
Step 1 Router(config)# ip wccp {web-cache | service-number} Specifies a web-cache or dynamic service to enable
[group-address groupaddress] [redirect-list on the router, specifies the IP multicast address used
access-list] [group-list access-list] [password
password]
by the service group, specifies any access lists to
use, specifies whether to use MD5 authentication,
and enables the WCCP service.
Step 2 Router(config)# interface type number Specifies an interface to configure and enters
interface configuration mode.
Step 3 Router(config-if)# ip wccp {web-cache | service-number} Enables WCCP redirection on the specified
redirect {out | in} interface.
As indicated by the out and in keyword options in the ip wccp service redirect command, redirection
can be specified for outbound interfaces or inbound interfaces. Inbound traffic can be configured to use
Cisco Express Forwarding (CEF), Fast Forwarding, or Process Forwarding.
Configuring WCCP for redirection for inbound traffic on interfaces allows you to avoid the overhead
associated with CEF forwarding for outbound traffic. Setting an output feature on any interface results
in the slower switching path of the feature being taken by all packets arriving at all interfaces. Setting
an input feature on an interface results in only those packets arriving at that interface taking the
configured feature path; packets arriving at other interfaces will use the faster default path. Configuring
WCCP for inbound traffic also allows packets to be classified before the routing table lookup, which
translates into faster redirection of packets.
Command Purpose
Step 1 Router(config)# ip wccp web-cache Enables the web cache service on the router.
Step 2 Router(config)# interface type number Targets an interface number for which the web cache
service will run, and enters interface configuration
mode.
Step 3 Router(config-if)# ip wccp web-cache redirect Enables the check on packets to determine if they
{out | in} qualify to be redirected to a web cache, using the
interface specified in Step 2.
Command Purpose
Step 1 Router(config)# interface type number Specifies an interface to configure, and enters
interface configuration mode.
Step 2 Router(config-if)# ip wccp redirect exclude in Allows inbound packets on this interface to be
excluded from redirection.
Command Purpose
Step 1 Router(config)# ip wccp {web-cache | service-number} Specifies the multicast address for the service
group-address groupaddress group.
Command Purpose
Step 2 Router(config)# interface type number Specifies the interface to be configured for
multicast reception.
Step 3 Router(config-if)# ip wccp {web-cache | service-number} Enables the reception of IP multicast packets
group-listen (content originating from the cache engines) on the
interface specified in Step 2.
For network configurations where redirected traffic needs to traverse an intervening router, the router
being traversed must be configured to perform IP multicast routing. You must configure the following
two components to enable traversal over an intervening router:
• Enable IP multicast routing using the ip multicast-routing global configuration mode command.
• Enable the interfaces to which the cache engines will connect to receive multicast transmissions
using the ip wccp group-listen interface configuration mode command (note that earlier Cisco IOS
versions required the use of the ip pim interface configuration command).
Command Purpose
Step 1 Router(config)# access-list access-list permit ip host Creates an access list that enables or disables traffic
host-address [destination-address | destination-host | redirection to the cache engine.
any]
Step 2 Router(config)# ip wccp web-cache group-list Indicates to the router from which IP addresses of
access-list cache engines to accept packets.
To disable caching for certain clients, use the following commands, beginning in global configuration
mode:
Command Purpose
Step 1 Router(config)# access-list access-list permit ip host Creates an access list that enables or disables traffic
host-address [destination-address | destination-host | redirection to the cache engine.
any]
Step 2 Router(config)# ip wccp web-cache redirect-list Sets the access list used to enable redirection.
access-list
Command Purpose
Router(config)# ip wccp web-cache password password Sets an MD5 password on the router.
Command Purpose
Router# show ip wccp [web-cache | service-number] Displays global information related to WCCP, including
the protocol version currently running, the number of
cache engines in the routers service group, which cache
engine group is allowed to connect to the router, and
which access list is being used.
Router# show ip wccp {web-cache | service-number} detail Queries the router for information on which cache
engines of a specific service group the router has
detected. The information can be displayed for either
the web cache service or the specified dynamic service.
Router# show ip interface Displays status about whether any ip wccp redirection
commands are configured on an interface. For example,
“Web Cache Redirect is enabled / disabled.”
Router# show ip wccp {web-cache | service-number} view Displays which devices in a particular service group
have been detected and which cache engines are having
trouble becoming visible to all other routers to which
the current router is connected. The view keyword
indicates a list of addresses of the service group. The
information can be displayed for either the web cache
service or the specified dynamic service. For further
troubleshooting information, use the show ip wccp
{web-cache | service number} service command.
The following example shows a configuration session in which redirection of HTTP traffic arriving on
interface 0/1 is enabled:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface ethernet 0/1
Router(config-if)# ip wccp web-cache redirect in
Router(config-if)# ^Z
Router# show ip interface ethernet 0/1
.
.
.
WCCP Redirect inbound is enabled
WCCP Redirect exclude is disabled
.
.
.
The following example shows a router configured to run a reverse proxy service, using the multicast
address of 224.1.1.1. Redirection applies to packets outgoing via interface ethernet 0:
To disable caching for certain clients, servers, or client/server pairs, you can use WCCP access lists. The
following example shows that any requests coming from 10.1.1.1 to 12.1.1.1 will bypass the cache, and
that all other requests will be serviced normally:
Router(config)# ip wccp web-cache redirect-list 120
Router(config)# access-list 120 deny tcp host 10.1.1.1 any
Router(config)# access-list 120 deny tcp any host 12.1.1.1
Router(config)# access-list 120 permit ip any any
The following example configures a router to redirect web-related packets received via interface ethernet
0/1, destined to any host except 209.165.196.51:
Building configuration...
Current configuration:
!
version 12.0
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
service udp-small-servers
service tcp-small-servers
!
hostname router4
!
enable secret 5 $1$nSVy$faliJsVQXVPW.KuCxZNTh1
enable password alabama1
!
ip subnet-zero
ip wccp web-cache
ip wccp 99
ip domain-name cisco.com
ip name-server 10.1.1.1
ip name-server 10.1.1.2
ip name-server 10.1.1.3
!
!
!
interface Ethernet0
ip address 10.3.1.2 255.255.255.0
no ip directed-broadcast
ip wccp web-cache redirect out
ip wccp 99 redirect out
no ip route-cache
no ip mroute-cache
!
interface Ethernet1
ip address 10.4.1.1 255.255.255.0
no ip directed-broadcast
This appendix contains summaries of the command and configuration modes used in the Cisco IOS
Command-Line Interface (CLI) in Cisco IOS Release 12.2. The availability of configuration modes will
depend on the feature set found in your system image and on which router platform you are using. For
specific information on any particular configuration mode, see the documentation references given in the
mode summaries.
This appendix lists command modes in the following categories:
• Base Command Modes
• Configuration Modes and Submodes
These lists include short summaries of the modes.
Following the configuration mode summary list, Table 26 presents the configuration mode summaries
organized by router prompt, and includes examples of entering each mode.
Setup Mode
Setup mode is not, strictly speaking, a command mode. Setup mode is rather an interactive facility that
allows you to perform first-time configuration and other basic configuration procedures on all routers.
The facility prompts you to enter basic information needed to start a router functioning. Setup mode uses
the System Configuration Dialog, which guides you through the configuration process. It prompts you
first for global parameters and then for interface parameters. The values shown in brackets next to each
prompt are the default values. For more information on setup mode, see the “Using AutoInstall and
Setup” chapter of this book.
To enter setup mode after the router has been configured for the first time, use the setup command in
privileged EXEC mode. The router prompt for setup mode is indicated by a configuration question,
followed by the default answer in brackets and a colon (:), as shown in the following example:
Continue with configuration dialog? [yes]:
Enter host name [Router]:
The following configuration mode short summaries list the basic characteristics of each mode and where
you can find details on the configuration tasks associated with each mode. Configuration modes and
configuration submodes are listed here alphabetically.
All prompts listed are shown as they appear after the host name prompt on the system (for example, if
the host name is “Router”, the prompt for CA Identity configuration mode would be
Router(ca-identity)#).
On most systems, a field of 30 characters is used for the host name and the prompt. Note that the length
of your host name may cause longer configuration mode prompts to be truncated. For example, the full
prompt for service profile configuration mode is:
(config-service-profile)#
However, if you are using the host-name of “Router”, you will only see the following prompt (on most
systems):
Router(config-service-profil)#
If the hostname is longer, you will see even less of the prompt:
Basement-rtr2(config-service)#
Keep this behavior in mind when assigning a name to your system (using the hostname global
configuration command). If you expect that users will be relying on mode prompts as a CLI navigation
aid, you should assign host names of no more than nine characters.
For details, refer to the “Configuring IP to ATM Class of Service” chapter in the “Quality of Service
Solutions” part of the Release 12.2 Cisco IOS Quality of Service Solutions Configuration Guide.
For details, refer to the “Configuring DHCP” chapter in the Release 12.2 Cisco IOS IP Configuration
Guide.
To enter extended named access list configuration mode from global configuration mode, use the
ip access-list or ipx access list command. Use access-list configuration mode to create a named IP or
IPX access list.
For information on creating a named IP access list, refer to the “Configuring IP Services” chapter in the
“IP Addressing and Services” part of the Release 12.2 Cisco IOS IP Configuration Guide. For
information on creating a named IPX access list, refer to the “Configuring Novell IPX” chapter in the
Release 12.2 Cisco IOS AppleTalk and Novell IPX Configuration Guide .
For details, refer to the “Configuring Gatekeepers (Multimedia Conference Manager)” chapter in the
“Voice” part of the Release 12.2 Cisco IOS Voice, Video, and Fax Configuration Guide. For additional
details, refer to the 12.0(3)T “Multimedia Conference Manager” feature module.
To enter IBM channel internal adapter configuration mode from IBM channel internal LAN interface
configuration mode, use the adapter command. Use internal adapter configuration mode to configure
the link characteristics for the internal LAN adapter and name the internal LAN adapter. To configure
an internal adapter interface, you must first use the bridge-group internal LAN configuration command
or the source-bridge internal LAN configuration command to configure bridging type.
For details, refer to the adapter command documentation in the “Cisco Mainframe Channel Connection
(CMCC) Commands” chapter in the “IBM Networking” part of the Release 12.2 Cisco IOS Bridging and
IBM Networking Command Reference, Volume 2.
Note Many configuration modes available through interface configuration mode are also available in
subinterface configuration mode.
The following example configures an IPv6 access list named outbound that defines HTTP access to be
restricted to certain hours during the day, and to log any activity outside of the permitted hours.
The ipv6 access-list command changed its syntax in Cisco IOS Release 12.2(13)T as the IPv6 access list
configuration mode was added. Previous T train releases contained the permit and deny keywords, and
associated arguments, within the ipv6 access-list command syntax. Examples of the syntax in the
previous releases are documented in the Implementing Security for IPv6 module. If an IPv6 access list
configuration from a previous release is used in Cisco IOS Release 12.2(13)T, the configuration is
translated to use the new IPv6 access list configuration mode.
For details, refer to the “Managing Modems” chapter in the Release 12.2 Cisco IOS Dial Technologies
Configuration Guide.
To enter public key chain configuration mode from global configuration mode, use the crypto key
pubkey-chain rsa command. Use public key chain configuration mode to manually specify other IPSec
peers’ RSA or DSS public keys.
From public-key chain configuration mode, you can enter the following submodes:
• Public-Key Key Configuration Mode
– Public-Key Hex Input Configuration Mode
For details, refer to the “Configuring Internet Key Exchange Security Protocol” chapter in the “IP
Security and Encryption” part of the Release 12.2 Cisco IOS Security Configuration Guide.
To enter Redundant Link Manager (RLM) group configuration mode from interface configuration mode,
use the rlm group command. Use RLM group configuration mode to configure the RLM group (network
access server).
The following configuration submode is accessible through RLM group configuration mode:
– RLM Device Configuration Mode
For details, refer to the “Configuring the Cisco SS7/C7 Dial Access Solution System” chapter in the
“Dial Access Specialized Features” part of the Release 12.2 Cisco IOS Dial Technologies Configuration
Guide.
Router configuration commands configure an IP routing protocol and always follow a router command.
The following submodes are accessible from router configuration mode:
• Address Family Configuration Mode
For details, refer to the relevant protocol chapter in the “IP Routing Protocols” part of the Release 12.2
Cisco IOS IP Configuration Guide.
For details on the aaa group server tacacs+ command, refer to the “TACACS+ Commands” chapter in
the “Security Server Protocols” part of the Release 12.2 Cisco IOS Security Command Reference. For
additional information, refer to the corresponding chapter in the Release 12.2 Cisco IOS Security
Configuration Guide.
To enter server load balancing (SLB) virtual server configuration mode from global configuration mode,
use the ip slb vserver command. Use virtual server configuration mode to specify a virtual server that
represents a group of real servers.
For details, refer to the “Configuring Server Load Balancing” chapter in the Release 12.2 Cisco IOS IP
Configuration Guide.
Note DLUR PU configuration mode is a legacy configuration mode whose function to define DLUR PUs can
be replaced by using theTN3760 listen-point configuration modes in Cisco IOS Release 12.0(5)T and
later. When you define listen-point configurations, you can create DLUR PUs within listen-point PU
configuration mode using the pu dlur command instead.
For details, refer to the “Configuring the TN3270 Server” chapter in the “IBM Networking” part of the
Release 12.2 Cisco IOS Bridging and IBM Networking Configuration Guide.
Note PU configuration mode is a legacy configuration mode whose function to define direct PUs can be
replaced by using the listen-point configuration modes in Cisco IOS Release 12.0(5)T and later. When
you define listen-point configurations, you can create direct PUs within listen-point PU configuration
mode using the pu (listen-point) command instead.
For details, refer to the “Configuring the TN3270 Server” chapter in the “IBM Networking” part of the
Release 12.2 Cisco IOS Bridging and IBM Networking Configuration Guide.
To enter voice-service session configuration mode from voice-service configuration mode, use the
session protocol aal2 command. Use voice-service session configuration mode to configure call
admission control (CAC) and subcell multiplexing.
For details, refer to the “Configuring Voice over ATM” chapter in the Release 12.2 Cisco IOS Voice,
Video, and Fax Configuration Guide.
Note This mode appears as the ip-vrf option in the show parser dump ? command.
Configuration Mode
Prompt Name Access Method Example
(ca-identity) CA Identity From global Router(config)# crypto ca identity
Configuration Mode configuration mode, Router(ca-identity)#
use the crypto ca
identity command.
(ca-root)# CA Trusted-Root From global Router(config)# crypto ca trusted-root
Configuration Mode configuration mode, Router(ca-root)#
use the crypto ca
trusted-root
command.
(cfg-adap-type n-m) IBM Channel From IBM channel Router(config)# lan ethernet 10
Internal Adapter internal LAN Router(cfg-lan-Ether 10)# adapter 1 4.5.6
Router(cfg-adap-Ether 10-1)#
Configuration Mode configuration mode,
enter the adapter
command.
In the router prompt
syntax, type is the
specified internal
LAN type, n is the
specified lan-id, and
m is the adapter
number.
(cfg-atm-range-p)# ATM PVC-in-range From PVC range Router(config-if-atm-range)# pvc-in-range
Configuration Mode configuration mode, [pvc-name] [vpi][/vci]
Router(cfg-if-atm-range-pvc)#
use the
pvc-in-range
command.
(cfg-lan-type n)# IBM Channel From interface Router(config-if)# lan ethernet 10
Internal LAN configuration mode, Router(cfg-lan-Ether 10)#
Interface use the lan
Configuration Mode command.
In the router prompt
syntax, type is the
specified internal
LAN type and n is
the specified LAN
ID.
(cfg-tn3270)# TN3270 Server From interface Router(config)# interface type slot/port
Configuration Mode configuration mode, Router(config-if)# tn3270-server
Router(cfg-tn3270)#
use the
tn3270-server
command.
Configuration Mode
Prompt Name Access Method Example
(config-access-point) Access-point From access-point Router(config-ap-list)# access-point
Configuration Mode list configuration Router(config-access-point)#
mode, use the
access-point
command.
(config-alps-ascu) ALPS ASCU From interface Router(config)# interface type slot/port
Configuration Mode configuration mode, Router(config-if)# alps ascu 4B
Router(config-alps-ascu)#
use the alps ascu
command.
(config-alps-circuit) ALPS Circuit From global Router(config)# alps circuit CKT_NAME
Configuration Mode configuration mode, Router(config-alps-circuit)#
use the alps circuit
command.
(config-annexg) Annex G From global Router(config)# call-router h323-annexg be20
Configuration Mode configuration mode, Router(config-annexg)# advertise all
use the call-router
h323-annexg
command.
(config-ap-list) Access-point List From global Router(config)# gprs access-point-list
Configuration Mode configuration mode, Router(config-ap-list)#
use the
gprs access-point-li
st command.
(config-atm-bundle) ATM VC Bundle From interface or Router(config-subif)# bundle newyork
Configuration Mode subinterface Router(config-atm-bundle)#
or configuration mode,
(atm-bundle-config) use the bundle
command.
(config-call-discriminator) (Resource-Pool) From global Router(config)# resource-pool profile
Call Discriminator configuration mode, discriminator profile1
Router(config-call-discrimin)# ?
Profile use the Call Discriminator Profile Commands:
Configuration Mode resource-pool call-type Call-type to be rejected
profile clid CLID entity to be rejected
discriminator dnis DNIS entity to be rejected
command.
(config-casa)# CASA From global Router(config)# ip casa 10.10.4.1 224.0.1.2
Configuration Mode configuration mode, Router(config-casa)#
use the ip casa
command.
(config-cert-chain)# Certificate Chain From global Router(config)# crypto ca certificate
Configuration Mode configuration mode, Router(config-cert-chain)#
use the crypto ca
certificate chain
command.
Configuration Mode
Prompt Name Access Method Example
(config-ces)# CES Configuration From global Router(config)# ces 1/0
Mode configuration mode, Router(config-ces)#
use the ces
command.
(config-class)# Voice Class From global Router(config)# voice class busyout bsyout1
Configuration Mode configuration mode, Router(config-class)# ?
voiceclass configuration commands:
use the voice class busyout Configure busyout trigger
command. event & procedure
(config-cmap)# QoS Class-Map From global Router(config)# class-map
Configuration Mode configuration mode, Router(config-cmap)#
use the class-map
command.
(config-controller)# Controller From global Router(config)# controller t1 0/0
Configuration Mode configuration mode, Router(config-controll)#
use the controller
command.
(config-cor)# Dial Peer COR List From global Router(config)# dial-peer cor list corlist1
Configuration Mode configuration mode, Router(config-cor)#
use the dial-peer
cor list list-name
command.
(config-crypto-map)# Crypto Map From global Router(config)# crypto map Research 10
Configuration Mode configuration mode, Router(config-crypto-map)#
use the crypto map
command.
(config-crypto-trans)# Crypto Transform From global Router(config)#crypto ipsec transform-set
Configuration Mode configuration mode, Router(config-crypto-trans)#
use the crypto ipsec
transform-set
command.
(config-ctrl-cas)# CAS Custom From controller Router(config-controller)# cas-custom 1
Configuration Mode configuration mode, Router(config-ctrl-cas)#
use the cas-custom
command.
(config-customer-profile)# (Resource-Pool) From global Router(config)# resource-pool profile customer
Customer Profile configuration mode, name1
Router(config-customer-profi)#?
Configuration Mode use the Customer Profile Configuration Commands:
resource-pool dnis Assign DNIS group with this
profile customer profile
command. limit Configure limits for the
profile
resource Assign resource and supported
call-type
source Assign Template with this
profile
vpdn Assign VPDN group/profile
with this profile
Configuration Mode
Prompt Name Access Method Example
(config-dhcp)# DHCP Pool From global Router(config)# ip dhcp pool pname1
Configuration Mode configuration mode, Router(config-dhcp)#
use the ip dhcp pool
command.
(config-dialpeer)# Dial Peer Voice From global Router(config)# dial peer voice 1 pots
Configuration Mode configuration mode, Router(config-dialpeer)#
use the dial peer
voice command.
(config-dnis-group)# Dialer DNIS Group From global Router(config)# dialer dnis group dnis_isp_1
Configuration Mode configuration mode, Router(config-dnis-group)# ?
Dialer DNIS Configuration Commands:
use the dialer dnis call-type set call-type override
group command. number Enter number in DNIS group
range Enter a range of numbers in
.............DNIS group
(config-ext-nacl)# Extended Named From global Router(config)# ip access-list extended flag
Access List (NACL) configuration mode, Router(config-ext-nacl)#
Configuration Mode use the ip access-list
or ipx access-list
command.
(config-fr-congest)# Frame Relay From interface Router(config-if)# frame-relay
Congestion configuration mode, congestion-management
Router(config-fr-congest)#
Management use the frame-relay
Configuration Mode congestion-
management
command.
(config-fr-dlci)# Frame Relay DLCI From interface Router(config)# interface serial 1/1
Configuration Mode configuration mode, Router(config-if)# frame-relay interface-dlci
100
use the frame-relay Router(config-fr-dlci)# vofr
interface-dlci Router(config-fr-dlci)#
[switched]
command.
(config-frf5)# FRF.5 / FRF.8 From global router(config)# connect serial0 100 atm3/0
or Configuration Mode configuration mode, 0/32 network-interworking
router(config-frf5)# clp-bit 1
(config-frf8)# use the connect or
command. router(config)# connect serial0 100 atm1/0
0/32 service-interworking
router(config-frf8)# efci-bit map-fecn
(config-gateway)# Gateway From global Router(config )# gateway
Configuration Mode configuration mode, Router(config-gateway)#
use the gateway
command.
(config-gk)# Gatekeeper From global Router(config)# gatekeeper
Configuration Mode configuration mode, Router(config-gk)#
use the gatekeeper
command.
Configuration Mode
Prompt Name Access Method Example
(config-hub)# Hub Configuration From global Router(config)#hub ethernet 0 1 3
Mode configuration mode, Router(config-hub)#
use hub command.
(config-if)# Interface From global Router(config)# interface serial 2
Configuration Mode configuration mode, Router(config-if)#
enter by specifying
an interface with an
interface command.
(config-if-atm-member)# ATM VC From ATM bundle Router(config-if)# bundle chicago
Bundle-Member configuration mode, Router(config-if-atm-bundle)# pvc-bundle
chicago-control 207
Configuration Mode use the pvc-bundle Router(config-if-atm-member)# class
command. control-class
Router(config-if-atm-bundle)# pvc-bundle
chicago-premium 206
(config-if-atm-range-pvc)# ATM PVC Range From subinterface Router(config-subif)# range [range-name] pvc
Configuration Mode configuration mode, start-vpi/start-vci end-vpi/end-vci
Router(config-if-atm-range-p)#
use the range
[name] pvc
command.
(config-if-atm-vc)# ATM VC From interface Router(config-if)# pvc 0/33
Configuration Mode configuration mode, Router(config-if-atm-vc)#
use the pvc or svc or
nsap command. Router(config-if)# svc nsap
AB.CDEF.01.234567.890A.BCDE.F012.3456.7890.123
4.12
Router(config-if-atm-vc)#
(config-if-ces-vc)# ATM VC CES From interface Router(config-if)# svc [name] ces
Configuration Mode configuration mode, Router(config-if-ces-vc)#
use the pvc or svc
command with the
ces keyword, or the
ces pvc command.
(config-if-path)# IP Host Backup From interface Router(config)# interface channel 3/1
Configuration Mode configuration mode, Router(config-if)# ip address 198.92.5.1
255.255.255.128
use the path Router(config-if)# path c010 c110 c210
command. Router(config-if-path)# claw 30 198.92.5.2
lpar1 cip1 tcpip tcpip
. . .
Configuration Mode
Prompt Name Access Method Example
(config-ipv6-acl)# IPv6 Access List From global Router(config)# time-range lunchtime
Configuration Mode configuration mode, Router(config)# periodic weekdays 12:00 to
13:00
use the ipv6 Router(config)# ipv6 access-list OUTBOUND
access-list Router(config-ipv6-acl)# permit tcp any any eq
command. www time-range lunchtime
Router(config-ipv6-acl)# deny tcp any any eq
www log-input
Router(config-ipv6-acl)# permit tcp
2000:1::/64 any
Router(config-ipv6-acl)# permit udp
2000:1::/64 any
(config-ipx-router)# IPX Router From global Router(config)# ipx routing
Configuration Mode configuration mode, Router(config)# ipx router rip
Router(config-ipx-router)#
use the ipx router
command.
(IPX must first be
enabled using the
ipx routing
command.)
(config-isakmp)# ISAKMP Policy From global Router(config)# crypto isakmp policy
Configuration Mode configuration mode, Router(config-isakmp)#
use the crypto
isakmp policy
command.
(config-keychain)# Key-Chain From global Router(config)# keychain blue
Configuration Mode configuration mode, Router(config-keychain)#
use the keychain
command.
(config-keychain-key)# Key-Chain Key From keychain Router(config-keychain)# key 10
Configuration Mode configuration mode, Router(config-keychain-key)#
use the key
command.
(config-line)# Line Configuration From global Router(config)# line vty 0 4
Mode configuration mode, Router(config-line)#
enter by specifying a
line with a line {aux
| con | tty | vty}
line-number
[ending-line-numbe
r] command.
(config-map-class)# Static Maps Class From global Router(config)# map-class frame-relay map1
Configuration Mode configuration mode, Router(config-map-class)# ?
Static maps class configuration commands:
use the map-class frame-relay Configure Map parameters
encapsulation service-policy class-based service
class-name policy
command.
Configuration Mode
Prompt Name Access Method Example
(config-map-list)# Static Maps List From global Router(config)# map-list map2
Configuration Mode configuration mode, Router(config-map-list)# ?
Static maps list configuration commands:
use the map-list A.B.C.D Protocol specific
name command. address
aarp AppleTalk ARP
apollo Apollo Domain
appletalk AppleTalk
. . .
(config-modem-pool)# Modem Pool From global Router(config)# modem-pool pool1
Configuration Mode configuration mode, Router(config-modem-pool)# ?
Modem pool configuration commands:
use the called-number Map a called number to
modem-pool name ..................modem pool
command. pool-range Configure a group range
.................for the modem pool
(config-mpoa-client) See MPOA Client
configuration mode
See
(mpoa-client-config)#
(below)
(config-mpoa-server) See MPOA Server
configuration mode
See
(mpoa-server-config)#
(below)
(config-mrm-manager)# MRM Manager From global Router(config)# ip mrm manager test1
Configuration Mode configuration mode, Router(config-mrm-manager)#
use the ip mrm
manager command.
(config-pmap)# QoS Policy-Map From global Router(config)# policy-map policyA
Configuration Mode configuration mode, Router(config-pmap)#
use the policy-map
command.
(config-pmap-c)# QoS Policy-Map From policy-map Router(config)# policy-map policyA
Class Configuration configuration mode, Router(config-pmap)# class first
Router(config-pmap-c)#
Mode use the class
command.
(config-poll-group)# System Controller From global Router(config)# syscon poll-group cmlineinfo
Poll-Group configuration mode, Router(config-poll-gr)#
Configuration Mode enter poll-group
configuration mode
with the syscon
poll-group
command.
(config-preauth)# AAA From global Router(config)# aaa preauth
Preauthentication configuration mode, Router(config-preauth)#
Configuration Mode use the aaa preauth
command.
Configuration Mode
Prompt Name Access Method Example
(config-pubkey-chain)# Public-Key Chain From global Router(config)# crypto key pubkey-chain rsa
Configuration Mode configuration mode, Router(config-pubkey-c)#
use the crypto key
pubkey-chain {dss |
rsa} command.
(config-pubkey-hex)# Public-Key Hex From public-key key Router(config-pubkey-key)# address 10.5.5.1
Input Configuration configuration mode, Router(config-pubkey-key)# key-string 005C300D
06092A86
Mode use the key-string Router(config-pubkey-hex)# 4886F70D 01010105
command. . . .
(config-pubkey-key)# Public-Key Key From public-key Router(config-pubkey-c)# named-key
Configuration Mode chain configuration otherpeer.domain.com
Router(config-pubkey-k)#
mode, use the
addressed-key
command or
named-key
command.
(config-red-group)# RED Group From global Router(config)# random-detect-group sanjose
Configuration Mode configuration mode, Router(config-red-group)#
use the
random-detect-gro
up command.
(config-resource-group)# (Resource-Pool) From global Router(config)# resource-pool group resource
Resource Group configuration mode, groupname1
Router(config-resource-group)# range limit 48
Configuration Mode use the
resource-pool
group resource
command.
(config-rlm-group)# RLM Group From interface Router(config-if)# rlm group 1
Configuration Mode configuration mode, Router(config-rlm-group)#
use the rlm group
command.
(config-rlm-group-sc)# RLM Device From RLM group Router(config-rlm-group)# server r1-server
Configuration Mode configuration mode, Router(config-rlm-group-sc)#
use the server
command.
(config-route-map)# Route-Map From global Router(config)# route-map arizona
Configuration Mode configuration mode, Router(config-route-map)# ?
Route Map configuration commands:
use the route-map match Match values from routing table
command. set Set values in destination
routing protocol
Configuration Mode
Prompt Name Access Method Example
(config-router)# Router From global Router(config)# router rip
Configuration Mode configuration mode, Router(config-router)#
enter by issuing the
router protocol
command (such as
router igrp).
(config-router-af)# Address Family From router Router(config)# router bgp 100
Configuration Mode configuration mode, Router(config-router)# address-family vpnv4
Router(config-router-af)#
use the
address-family
command.
To exit, use the
exit-address-family
command.
(config-rtr)# RTR Entry From global Router(config)# rtr 1
Configuration Mode configuration mode, Router(config-rtr)# ?
RTR Entry Commands:
use the rtr . . .
command.
(config-rtr-http)# SAA HTTP Raw From RTR Router(config-rtr)# type http operation raw
Request configuration mode, url http://www.cisco.com
Router(config-rtr)# http-raw-request
Configuration Mode use the Router(config-rtr-http)# ?
http-raw-request HTTP Raw Request Configuration:
command. LINE http raw request; enter 'exit' to end
the request
Router(config-rtr-http)# GET /index.html
HTTP/1.0\r\n
Router(config-rtr-http)# \r\n
Router(config-rtr-http)# exit
Router(config-rtr)#
(config-service-profile)# Service Profile From global Router(config)# resource-pool profile service
Configuration Mode configuration mode, user1
Router(config-service-profil)# ?
use the Service Profile Configuration Commands:
resource-pool ..modem...Configure modem service
profile service ...........parameters
command.
(config-sg)# Server Group From global Router(config-if)# aaa group server radius sg1
RADIUS configuration mode Router(config-sg-radius)#
or
(config-sg-radius)#
Configuration Mode or interface
configuration mode,
use the aaa group
server radius
command.
Configuration Mode
Prompt Name Access Method Example
(config-sg)# Server Group From global Router(config-if)# aaa group server tacacs+
or TACACS+ configuration mode sg1
Router(config-sg-tacacs)#
(config-sg-tacacs)# Configuration Mode or interface
configuration mode,
use the aaa group
server tacacs+
command.
(config-slb-dfp)# SLB DFP From global Router(config)# ip slb dfp
Configuration Mode configuration mode, Router(config-slb-dfp)#
use the ip slb dfp
command.
(config-slb-real)# SLB Real Server From server farm Router(config)# ip slb serverfarm sfarm1
Configuration Mode configuration mode, Router(config-slb-sfarm)# real ip-address
Router(config-slb-real)#
use the real
command.
(config-slb-sfarm)# SLB Server-Farm From global Router(config)# ip slb serverfarm sfarm1
Configuration Mode configuration mode, Router(config-slb-sfarm)#
use the ip slb
serverfarm
command.
(config-slb-vserver)# SLB Virtual Server From global Router(config)# ip slb vserver vserver1
Configuration Mode configuration mode, Router(config-slb-vserver)#
use the ip slb
vserver command.
(config-spe) SPE Configuration From global Router(config)# spe 1/0 1/23
Mode configuration mode, Router(config-spe)# firmware location
flash:mcom-modem-code.5.2.30.bin
use the spe Router(config-spe)#
command.
(config-std-nacl)# Standard Named From global Router(config)# ip access-list standard
Access List (NACL) configuration mode, Internetfilter
Router(config-std-nacl)# permit 192.5.34.0
Configuration Mode use the ip access-list 0.0.0.255
or ipx access-list Router(config-std-nacl)# deny 128.88.0.0
command. 0.0.255.255
Router(config-std-nacl)# exit
Router(config)#
(config-subif)# Subinterface From interface Router(config-if)# interface serial 2.1
Configuration Mode configuration mode, Router(config-subif)#
specify a
subinterface with an
interface command.
(config-time-range)# Time Range From global Router(config)# time-range no-http
Configuration Mode configuration mode, Router(config-time-range)#
use the
time-range time-ra
nge-name
command.
Configuration Mode
Prompt Name Access Method Example
(config-translate)# Translation-Rule From global Router(config)# translation-rule 10
Configuration Mode configuration mode, Router(config-translate)#
use the
translation-rule
command.
(config-vc-class)# ATM VC Class From interface Router(config-if)# vc-class atm pvc1
Configuration Mode configuration mode Router(config-vc-class)#
or subinterface
configuration mode,
use the vc-class atm
command.
(config-vc-group)# ATM-FR VC Group From global router(config)# vc-group friends
Configuration Mode configuration mode, router(config-vc-group)# serial0 16 16
router(config-vc-group)# serial0 17 17
use the vc-group
command.
(config-voiceport)# Voice-Port From global Router(config)# voice port 1/1/2
Configuration Mode configuration mode, Router(config-voiceport)#
use the voice port
slot/[sub-unit/]port
command.
(config-vpdn)# VPDN Group From global Router(config)# vpdn-group 1
Configuration Mode configuration mode, Router(config-vpdn)#
use the vpdn-group
number command.
(config-vpdn-acc-in)# VPDN From VPDN group Router(config-vpdn)# accept-dialin
Accept-dialin mode, use the Router(config-vpdn-acc-in)#
Configuration Mode accept-dialin
command.
(config-vpdn-acc-out)# VPDN From VPDN group Router(config-vpdn)# accept-dialout
Accept-dialout mode, use the Router(config-vpdn-acc-ou)#
Configuration Mode accept-dialout
command.
(config-vpdn-profile)# (Resource-Pool) From global Router(config)# resource-pool profile vpdn
VPDN Profile configuration mode, profile2
Router(config-vpdn-pro)#
Configuration Mode use the
resource-pool
profile vpdn
command.
(config-vpdn-req-in)# VPDN From VPDN group Router(config-vpdn)# request-dialin
Request-dialin mode, use the Router(config-vpdn-req-in)#
Configuration Mode request-dialin
command.
Configuration Mode
Prompt Name Access Method Example
(config-vpdn-req-ou)# VPDN From VPDN group Router(config-vpdn)# request-dialout
Request-dialout mode, use the Router(config-vpdn-req-ou)#
Configuration Mode request-dialout
command.
(config-vpdn-templ) VPDN Template From global R(config)# vpdn-template
Configuration configuration mode, R(config-vpdn-templ)#?
Modee use the
vpdn-template
command.
(config-vrf)# IP VPN From global Router(config)#ip vrf name
Routing/Forwarding configuration mode Rotuer(config-vrf)#?
IP VPN Routing/Forwarding instance
(VRF) Instance or router configuration commands:
Configuration Mode configuration mode, bgp Commands pertaining to BGP
use the ip vrf . . .
(a.k.a. VRF
command. export VRF export
Configuration import VRF import
Mode) maximum Set a limit
. . .
rd Specify Route Distinguisher
. . .
(config-x25)# X.25 Profile From global Router(config)# x25 profile NetworkNodeA dce
Configuration Mode configuration mode, Router(config-x25)# x25 htc 128
use the x25 profile
command.
(conf-voi-serv)# Voice Service From global mode, Router(config)# voice service voatm
Configuration Mode use the voice Router(conf-voi-serv)# ?
voice service configuration commands:
service command. ..h323 Global H.323 commands
..modem Global modem commands
..session Voice session Protocol
(conf-voi-serv-s)# Voice Service From voice service Router(config)# voice service voatm
Session configuration mode, Router(conf-voi-serv)# session protocol aal2
Router(conf-voi-serv-s)#
Configuration Mode use the session
protocol aal2
command.
(lane-config-datab)# LANE Database From global Router(config)# lane database red
Configuration Mode configuration mode, Router(lane-config-datab)#
use the lane
database command.
(mpoa-client-config)# MPOA Client From global Router(config)# mpoa client config name ip_mpc
(MPC) configuration mode, Router(mpoa-client-config)#
configuration mode use the mpoa client
config name
command.
Configuration Mode
Prompt Name Access Method Example
(mpoa-server-config)# MPOA Server From global Router(config)# mpoa server config name ip_mps
(MPS) configuration configuration mode, Router(mpoa-server-config)#
use the mpoa server
config name
command.
(tn3270-dlur)# TN3270 DLUR From TN3270 Router(config)# interface Channel3/2
Configuration Mode server configuration Router(config-if)# tn3270-server
Router(cfg-tn3270)# dlur fq-cpname fq-dlusname
mode, use the dlur Router(tn3270-dlur)#
command.
(tn3270-dlur-lsap)# TN3270 DLUR From TN32370 Router(config)# interface Channel3/2
Linked SAP DLUR Router(config-if)# tn3270-server
Router(cfg-tn3270)# dlur NETA.SHEK NETA.MVSD
Configuration Mode configuration mode, Router(tn3270-dlur)# lsap token-adapter 15 04
use the lsap Router(tn3270-dlur-lsap)#
command.
(tn3270-dlur-pu)# TN3270 DLUR PU From DLUR Router(config)# interface Channel3/2
Configuration Mode configuration mode, Router(config-if)# tn3270-server
Router(cfg-tn3270)# dlur NETA.SHEK NETA.MVSD
use the pu (DLUR) Router(tn3270-dlur)# pu P0 05D99001
command. 192.195.80.40
Router(tn3270-dlur-pu)#
(tn3270-lpoint)# TN3270 From TN3270 Router(config)# interface Channel3/2
Listen-Point server configuration Router(config-if)# tn3270-server
Router(cfg-tn3270)# listen-point 172.18.4.19
Configuration Mode mode, use the tcp-port 2023
listen-point Router(tn3270-lpoint)#
command.
(tn3270-lpoint-pu)# TN3270 From TN3270 Router(tn3270-lpoint)# pu PU1 94223456 tok 1
Listen-Point PU listen-point 08
Router(tn3270-lpoint-pu)#
Configuration Mode configuration mode,
use the pu or
(listen-point)
Router(tn3270-lpoint)# pu P0 05D99001 dlur
command.
Router(tn3270-lpoint-pu)#
(tn3270-pu)# TN3270 PU From TN3270 Router(config)# interface Channel3/2
Configuration Mode server configuration Router(config-if)# tn3270-server
Router(cfg-tn3270)# pu PU1 05d00001 10.0.0.1
mode, use the pu token-adapter 1 8 rmac 4000.0000.0001 rsap 4
(tn3270) command. Router(tn3270-pu)#
(tn3270-resp-time)# TN3270 From TN3270 Router(config)# interface Channel3/2
Response-Time server configuration Router(config-if)# tn3270-server
Router(cfg-tn3270)# response-time group
Configuration Mode mode, use the MYSUBNET bucket boundaries 15 25 60 120
response-time multiplier 35
group command. Router(tn3270-resp-time)#
Configuration Mode
Prompt Name Access Method Example
(tn3270-sec-profile)# TN3270 Security From TN3270 Router(config)# interface Channel3/2
Profile security Router(config-if)# tn3270-server
Router(cfg-tn3270)# security
Configuration Mode configuration mode, Router(tn3270-security)# profile CERT40 SSL
use the profile Router(tn3270-sec-profile)# servercert
command. slot0:verisign187.pem
This appendix describes software configuration commands needed to configure line cards with certain
Cisco IOS software features for Cisco 7500 series routers.
Note On the Cisco 7507 and Cisco 7513 routers, you can install two Route Switch Processor (RSP) cards
in a single router to improve system availability. This feature was introduced in Cisco IOS Release
11.1(4) as the “High System Availability (HSA)” feature. Because High Availability (HA) has since
come to apply to a variety of Cisco IOS hardware and software features that allow for 99.9999%
uptime for Cisco devices, this feature is now referred to as the “Dual RSP” feature.
Note Boot ROM revision 11.1(2) or higher is required for HSA to work with an RSP2 line card.
The boot ROM is on a SIMM on the RSP2 and cannot be upgraded. You can identify the boot ROM
version on your RSP2 by issuing the show version | begin ROM command in privileged EXEC
mode.
Note The Single Line Card Reload feature is disabled by default. Enabling this feature is highly
recommended.
Note Having Dual RSPs does not impact performance in terms of packets per second or overall bandwidth.
The Dual RSP feature does not provide fault-tolerance or redundancy.
• Both hardware and software failures can cause the master RSP to enter a nonfunctional state, but the
system does not indicate the type of failure.
• The console is always connected to master. A Y cable is shipped with your Cisco 7507 or Cisco 7513
router. The “top” of the Y cable plugs into the console port on each RSP card, and the “bottom” of
the Y cable plugs into a terminal or terminal server. The master RSP card has ownership of the Y
cable in that the slave Universal Asynchronous Receiver Transmitter (UART) drivers are disabled.
Thus, no matter which RSP card is configured as the master, your view of the internetwork
environment is always from the master’s perspective. Refer to your product’s hardware installation
and maintenance publication for information on properly installing the Y cable.
Note Although other uses are possible, the configuration information in this guide describes commands
for only the two common methods—simple hardware backup and software error protection.
Command Purpose
Router(config)# slave default-slot processor-slot-number Specifies the slave RSP card.
After specifying the default slave card, save the running configuration to the startup configuration using
the copy running-config startup-config or copy system:running-config nvram:startup-config EXEC
command. When the system is rebooted, the RSP specification will take effect (if both RSP cards are
operational): The specified default slave becomes the slave RSP card and the other RSP card takes over
as the master RSP card.
The router uses the default slave information when booting as follows:
• If a system boot is due to powering up the router or using the reload EXEC command, then the
specified default slave will be the slave RSP.
• If a system boot is due to a system crash or hardware failure, then the system ignores the default
slave designation and makes the crashed or faulty RSP the slave RSP.
If you do not specifically define the default slave RSP, the RSP card located in the higher number
processor slot is the default slave. On the Cisco 7507 router, processor slot 3 contains the default slave
RSP. On the Cisco 7513 router, processor slot 7 contains the default slave RSP.
The following example sets the default slave RSP to processor slot 2 on a Cisco 7507 router:
Router# configure terminal
Router (config)# slave default-slot 2
Router (config)# end
Router# copy system:running-config nvram:startup-config
Ensuring That Both RSP Cards Contain the Same Configuration File
With both the simple hardware backup and software error protection implementation methods, you
always want your master and slave configuration files to match. To ensure that they match, turn on
automatic synchronization. In automatic synchronization mode, the master copies its startup
configuration to the slave’s startup configuration when you issue a copy EXEC command that specifies
the master’s startup configuration (nvram:startup-config) as the target.
Automatic synchronization mode is on by default; in the event that you need to reenable the automatic
synchronization, use the following commands in privileged EXEC mode:
Command Purpose
Step 1 Router# configure terminal Enters global configuration mode.
Step 2 Router# slave auto-sync config Reenables automatic synchronization mode.
Step 3 Router# end Exits configuration mode.
Step 4 Router(config)# copy system:running-config Saves this information to the system startup
nvram:startup-config configuration and copies the configuration to the
or slave’s startup configuration.
Router(config)# copy running-config startup-config
Ensuring That Both RSP Cards Contain the Same System Image
For simple hardware backup, ensure that both RSP cards have the same system image.
To ensure that both RSP cards have the same system image, use the following commands in EXEC mode:
Command Purpose
Step 1 Router# show bootvar Displays the contents of the BOOT environment
variable to learn the current booting parameters for
the master and slave RSP.
Step 2 Router# dir {bootflash: | slot0: | slot1:} Verifies the location and version of the master RSP
software image.
Step 3 Router# dir {slavebootflash: | slaveslot0: | Determines if the slave RSP contains the same
slaveslot1:} software image in the same location.
Step 4 Router# copy {bootflash:[filename] | If the slave RSP does not contain the same system
slot0:[filename] | image in the same location, copies the master’s
slot1:[filename]}{slavebootflash:[filename] |
slaveslot0:[filename] | slaveslot1:[filename]}
system image to the appropriate slave location.
Note that you may also need to use the delete or
squeeze EXEC command in conjunction with the
copy command to accomplish this step.
The following example shows the process of ensuring that both RSP cards have the same system image.
Note that because no environment variables are set, the default environment variables are in effect for
both the master and slave RSP. Therefore, the router will boot the image in slot 0.
Router# show bootvar
BOOT variable =
CONFIG_FILE variable =
Current CONFIG_FILE variable =
BOOTLDR variable does not exist
Ensuring That Both RSP Cards Contain the Same Microcode Image
To ensure that interface processors will load the same microcode, regardless of which RSP is used, use
the following commands in privileged EXEC mode:
Command Purpose
Step 1 Router# show controller cbus Determines the microcode images used on the
interface processors. If all interface processors are
running from the bundled system microcode, no
further action is required.
Step 2 Router# dir {bootflash: | slot0: | slot1:} If any interface processors are running from the
Flash file system, verifies the location and version
of the master RSP’s supplementary microcode.
Step 3 Router# dir {slavebootflash: | slaveslot0: | Determines if the slave RSP contains the same
slaveslot1:} microcode image in the same location.
Step 4 Router# copy {bootflash:[filename] | slot0:[filename] If the slave RSP does not contain the same
| slot1:[filename]} {slavebootflash:[filename] | microcode image in the same location, copies the
slaveslot0:[filename] | slaveslot1:[filename]}
master’s microcode image to the appropriate slave
location.
Note that you also may need to use the delete or
squeeze command in conjunction with the copy
command to accomplish this step.
The following example ensures that both RSP cards have the same microcode image. Notice that slots
0, 1, 4, 9, and 10 load microcode from the bundled software, as noted by the statement “software loaded
from system.” Slot 11, the Fast Serial Interface Processor (FSIP), does not use the microcode bundled
with the system. Instead, it loads the microcode from slot0:pond/bath/rsp_fsip20-1. Thus, you must
ensure that the slave RSP has a copy of the same FSIP microcode in the same location.
Router# show controller cbus
slot10: TRIP, hw 1.1, sw 20.00, ccb 5800FFD0, cmdq 480000D0, vps 4096
software loaded from system
TokenRing10/0, addr 0000.0ca3.cd40 (bia 0000.0ca3.cd40)
gfreeq 48000150, lfreeq 48000200 (4544 bytes), throttled 0
rxlo 4, rxhi 165, rxcurr 1, maxrxcurr 1
txq 48000208, txacc 480000D2 (value 95), txlimit 95
.........
slot11: FSIP, hw 1.1, sw 20.01, ccb 5800FFE0, cmdq 480000D8, vps 8192
software loaded from flash slot0:pond/bath/rsp_fsip20-1
Serial11/0, applique is Universal (cable unattached)
gfreeq 48000138, lfreeq 48000240 (1536 bytes), throttled 0
rxlo 4, rxhi 42, rxcurr 0, maxrxcurr 0
txq 48000248, txacc 480000F2 (value 5), txlimit 27
...........
Specifying Different Startup Images for the Master and Slave RSPs
For software error protection, the RSP cards should have different system images.
When the factory sends you a new Cisco 7507 or Cisco 7513 router with two RSPs, you receive the same
system image on both RSP cards. For the software error protection method, you need two different
software images on the RSP cards. Thus, you copy a desired image to the master RSP card and modify
the boot system global configuration commands to reflect booting two different system images. Each
RSP card uses its own image to boot the router when it becomes the master.
To specify different startup images for the master and slave RSP, use the following commands beginning
in EXEC mode:
Command Purpose
Step 1 Router# dir {bootflash: | slot0: | slot1:} Verifies the location and version of the master RSP
software image.
Step 2 Router# dir {slavebootflash: | slaveslot0: | Determines if the slave RSP contains the same
slaveslot1:} software image in the same location.
Step 3 Router# copy source-url {bootflash: | slot0: | Copies a different system image to the master RSP.
slot1:}
Step 4 Router# configure terminal Enters configuration mode from the terminal.
Step 5 Router(config)# boot system flash From global configuration mode, configures the
bootflash:[filename] master RSP to boot the new image from the
Router(config)# boot system flash slot0:[filename]
Router(config)# boot system flash slot1:[filename]
appropriate location.
Step 6 Router(config)# boot system flash Also, add a boot system command that specifies the
Router(config)# bootflash:[filename] slave’s boot image and location. This is the boot
Router(config)# boot system flash slot0:[filename]
Router(config)# boot system flash slot1:[filename]
image that the slave uses when it becomes the master
RSP and boots the system. Note that because the slave
will boot this image when the slave is actually the
new master RSP, the command syntax does not use a
“slave” prefix.
Step 7 Router(config)# boot system {rcp | tftp | ftp} (Optional) Configures the master RSP to boot from a
[filename] [ip-address] network server.
Step 8 Router(config)# config-register value1 Sets the configuration register to enable the system to
load the system image from a network server or from
Flash.
Step 9 Router(config)# end Exits configuration mode.
Step 10 Router# copy system:running-config Saves the configuration file to the master’s startup
nvram:startup-config configuration. Because automatic synchronization is
OR turned on, this step saves the boot system commands
Router# copy running-config startup-config to the master and slave startup configuration.
Step 11 Router# reload Resets the router with the new configuration
information.
1. Refer to the “Modifying the Configuration Register Boot Field” section on page 225 for more information on systems that can use this
command to modify the software configuration register.
NO NO
RM RM
AL AL
EN
AB
LE
slot0:rsp-k-mz11.1 EJ
EC EJ
EC slot0:rsp-k-mz11.1
slot0:rsp-k-mz11.2 SL SLO
OT T
T
SL SLO
OT T
T
0 1 0 1
SL MA SL MA
AV ST AV ST
E ER E ER
Flash memory
R R
CP CP
U U
HA HA
LT LT
RE RE
SE SE EN
T T AB
LE
AU AU
X. X.
S4210
config.file
boot system flash slot0:rsp-k-mz11.2
boot system flash slot0:rsp-k-mz11.1
..
.
Because you always view the environment from the master RSP perspective, in the following command
you view the master’s slot 0 to verify the location and version of the master’s software image:
Router# dir slot0:
-#- -length- -----date/time------ name
1 3482496 May 4 1993 21:38:04 rsp-k-mz11.1
Because you want to run the Release 12.0 system image on one RSP card and the Release 11.1 system
image on the other RSP card, copy the Release 12.0 system image to the master’s slot 0:
Router# copy tftp: slot0:rsp-k-mz12.0
Enter global configuration mode and configure the system to boot first from a Release 12.0 system image
and then from a Release 11.1 system image:
Router# configure terminal
Router (config)# boot system flash slot0:rsp-k-mz12.0
Router (config)# boot system flash slot0:rsp-k-mz11.1
With this configuration, when the slot 6 RSP card is master, it looks first in its PCMCIA slot 0 for the
system image file rsp-k-mz11.2 to boot. Finding this file, the router boots from that system image. When
the slot 7 RSP card is master, it also looks first in its slot 0 for the system image file rsp-k-mz12.0 to
boot. Because that image does not exist in that location, the slot 7 RSP card looks for the system image
file rsp-k-mz11.1 in slot 0 to boot. Finding this file in its PCMCIA slot 0, the router boots from that
system image. In this way, each RSP card can reboot the system using its own system image when it
becomes the master RSP card.
Configure the system further with a fault-tolerant booting strategy:
Router (config)# boot system tftp rsp-k-mz11.1 192.168.1.25
Set the configuration register to enable loading of the system image from a network server or from Flash
and save the changes to the master and slave startup configuration file:
Router (config)# config-register 0x010F
Router (config)# end
Router# copy system:running-config nvram:startup-config
Reload the system so that the master RSP uses the new Release 12.0 system image:
Router# reload
Figure 32 Software Error Protection: Backing Up with an Older Software Version, Part I
NO NO
RM RM
AL AL
EN
AB
LE
slot0:rsp-k-mz11.2 EJ
EC
T
EJ
EC
T
slot0:rsp-k-mz11.2
SL SLO SL SLO
OT T OT T
0 1 0 1
SL MA SL MA
AV ST AV ST
E ER E ER
Flash memory
R R
CP CP
U U
HA HA
LT LT
RE RE
SE SE EN
T T AB
LE
AU AU
X. X.
ROUTE SWITCH PROCESSOR 2
CO CO
NS NS
OL OL
E E
S4211
First, copy the rsp-k-mz11.1 image to the master and slave RSP card, as shown in Figure 33.
Figure 33 Software Error Protection: Backing Up with an Older Software Version, Part 2
NO NO
RM RM
AL AL
EN
AB
LE
slot0:rsp-k-mz11.2 EJ
EC EJ
EC slot0:rsp-k-mz11.2
slot0:rsp-k-mz11.1 T T
SL SLO
OT T
0 1
SL SLO
OT T
0 1 slot0:rsp-k-mz11.1
SL MA SL MA
AV ST AV ST
E ER E ER
Flash memory
R R
CP CP
U U
HA HA
LT LT
RE RE
SE S EN
T ET
AB
LE
AU AU
X. X.
S4212
Next, you delete the rsp-k-mz11.2 image from the slave RSP card. The final configuration is shown in
Figure 34.
Figure 34 Software Error Protection: Backing Up with an Older Software Version, Part 3
NO NO
RM RM
AL AL
EN
AB
LE
slot0:rsp-k-mz11.2 EJ
EC EJ
EC slot0:rsp-k-mz11.1
slot0:rsp-k-mz11.1 SL SLO
OT T
T
SL SLO
OT T
T
0 1 0 1
SL MA SL MA
AV ST AV ST
E ER E ER
Flash memory
R R
CP CP
U U
HA HA
LT LT
RE RE
SE SE EN
T T AB
LE
AU AU
X. X.
ROUTE SWITCH PROCESSOR 2
CO CO
NS NS
OL OL
E E
S4213
The following commands configure software error protection for this example scenario.
View the master and slave slot 0 to verify the location and version of their software images:
Router# dir slot0:
-#- -length- -----date/time------ name
1 3482498 May 4 1993 21:38:04 rsp-k-mz11.2
Copy the Release 11.1 system image to the master and slave slot 0:
Router# copy tftp: slot0:rsp-k-mz11.1
Router# copy tftp: slaveslot0:rsp-k-mz11.1
Configure the system to boot first from a Release 11.2 system image and then from a Release 11.1 system
image:
Router# configure terminal
Router (config)# boot system flash slot0:rsp-k-mz11.2
Router (config)# boot system flash slot0:rsp-k-mz11.1
Set the configuration register to enable loading of the system image from a network server or from Flash
and save the changes to the master and slave startup configuration file:
Router (config)# config-register 0x010F
Router (config)# end
Router# copy system:running-config nvram:startup-config
Note You do not need to reload the router in this example, because the router is currently running the
Release 11.2 image.
Note When you configure Dual RSP operation, we recommend that you use the default environment
variables. If you change the variables, we recommend setting the same device for equivalent
environment variables on each RSP card. For example, if you set one RSP card’s CONFIG_FILE
environment variable device to NVRAM, set the other RSP card’s CONFIG_FILE environment
variable device to NVRAM as well.
You set environment variables on the master RSP just as you would if it were the only RSP card in the
system. Refer to the following sections for more information on these steps:
• “Specifying the Startup System Image in the Configuration File” section on page 193 (in the
“Loading and Maintaining System Images and Microcode” chapter).
• “Controlling Environment Variables” section on page 229.
• “Specifying the CONFIG_FILE Environment Variable on Class A Flash File Systems” section on
page 167 (in the “Modifying, Downloading, and Maintaining Configuration Files” chapter).
You can set the same environment variables on the slave RSP card, manually or automatically. The
following sections describe these two methods:
• Automatically Setting Environment Variables on the Slave RSP
• Manually Setting Environment Variables on the Slave RSP
Note Automatic synchronization mode is on by default. To turn off automatic synchronization, use the no
slave auto-sync config global configuration command.
To set environment variables on the slave RSP when automatic synchronization is on, set the
environment variables as described in the “Rebooting” chapter of this book. You can verify the boot
variable using the show bootvar EXEC mode command.
Step 1 Set the environment variables for the master RSP card as described in the “Rebooting” chapter of this
book.
Step 2 Save the configuration using the copy system:running-config nvram:startup-config EXEC command.
Step 3 Save the same environment variable configuration to the slave RSP using the slave sync config
privileged EXEC command. Issuing this command will synchronize the configuration files.
Step 4 Verify the environment variable settings using the show bootvar EXEC command.
Command Purpose
Router(config)# slave image {system | file-url} Specifies which image the slave runs.
Command Purpose
Router(config)# slave sync config Manually synchronizes the master and slave
configuration files.
Caution When you install a second RSP card for the first time, you must immediately configure it using the
slave sync config command. This ensures that the new slave is configured consistently with the
master. Failure to do so can result in an unconfigured slave RSP card taking over mastership of the
router when the master fails, potentially rendering the network inoperable.
The slave sync config command is also a useful tool for more advanced implementation methods not
discussed in this chapter.
Command Purpose
Router(config)# slave reload Reloads the inactive slave RSP card.
Command Purpose
Router# show bootvar Displays the environment variable settings and
configuration register settings for both the master
and slave RSP cards.
Router# show file systems Displays a list of Flash devices currently supported
on the router.
Router# show version Displays the software version running on the
master and slave RSP card.
Router# show stacks Displays the stack trace and version information of
the master and slave RSP cards.
XC Cisco IOS Switching Services Configuration Guide accept-dialin group configuration mode FC-414
accept-dialout group configuration mode FC-414
access control lists
See access lists
Symbols access lists
named
! character
extended, configuration mode FC-394
comments FC-147
standard, configuration mode FC-408
in copy output FC-174
using time-ranges with FC-271
in ping output FC-238
using with WCCP FC-377
# character
access-point configuration mode, summary FC-387
in copy output FC-174
access-point list configuration mode, summary FC-388
privileged EXEC prompt FC-12
ACL (access control lists)
. character
See access lists
in copy output FC-174
activation-character command FC-73
in ping output FC-238
address family configuration mode, summary FC-388
in TFTP session output FC-239
alias command FC-254
<cr> xxxiii
aliases
> prompt FC-11
URL Prefixes FC-130
? command xxxii, FC-19
use in IOS File System (URL Prefixes) FC-130
^ character, in command output FC-20
use in ROM monitor mode FC-17
^Z FC-13
See also command aliases
| character
Cisco IOS Configuration Fundamentals Configuration Guide
IN-449
Index
ALPS ASCU configuration mode, summary FC-388 banner login command FC-96
ALPS circuit configuration mode, summary FC-388 banner motd command FC-95
APPN (Advanced Peer-to-Peer Networking) banner tokens
configuration modes FC-389 description FC-95
ASCII (example) FC-111
character widths, changing FC-78 banners
dispatch character FC-82 avoiding SLIP-PPP connectivity problems with FC-97
escape character FC-74 disabling or enabling on a line FC-97
hold character FC-74 (example) FC-111
padding FC-79 incoming message FC-96
start character FC-82 line-activation FC-96
stop character FC-82 LOGIN FC-95
async-bootp command FC-243 message-of-the-day FC-95
ATM PVC-in-range configuration mode, on a line, disabling or enabling FC-97
summary FC-391
token variables FC-95
ATM VC bundle configuration mode, summary FC-389
See also messages
ATM VC class configuration mode, summary FC-390
Banyan VINES
ATM VC configuration mode, summary FC-389
ATM VC group configuration mode, summary FC-390
baud rates
authentication
automatic detection, configuring FC-83
key-chain
setting for a line FC-83
using for SA Agent operations FC-344
boot bootldr command FC-229, FC-230
authentication database
boot buffersize command FC-159, FC-160
rsh FC-245
boot command FC-234, FC-235
authoritative time source
boot config command FC-168, FC-229
hardware clock FC-260
BOOT environment variable
NTP FC-265
configuring FC-435
autobaud command FC-83
description FC-228
use with autoselect command FC-83
displaying FC-147, FC-175, FC-225
autocommand menu command FC-107
boot field
AutoInstall FC-39
See configuration register boot field
requirements FC-50
boot flash command FC-234
autoselect command
boot host command FC-171
use with autobaud command FC-83
boot images
description FC-174
B helper FC-230
See also system images
banner exec command FC-96 boot mop command FC-236
banner incoming command FC-96 boot network command FC-160
ROM monitor FC-233 Call Tracker Plus ISDN and AAA Enhancements for the
Cisco AS5300 and Cisco AS5800
process FC-221
MIB support FC-318
(figure) FC-224
carriage return (<cr>) xxxiii
ROM FC-197
CASA (Cisco Appliance Services architecture)
startup configuration file FC-221
configuration mode, summary FC-392
system image, selecting FC-222
cautions, usage in text xxviii
BOOTLDR environment variable
cd command FC-134
configuring FC-230
CDP (Cisco Discovery Protocol)
description FC-228
configuration task list FC-322
(example) FC-230
disabling for routing device FC-323
setting FC-230
enabling on an interface FC-323
BOOTP
monitoring and maintaining FC-324
server FC-42, FC-243
TLVs FC-322
using for AutoInstall FC-40
transmission timer and holdtime, setting FC-323
services, accessing FC-255
Version-2 (CDPv2) FC-321
Break key
cdp enable command FC-323, FC-324
using to enter ROM monitor mode FC-16
summary list FC-386 to FC-415 config-register command FC-194, FC-197, FC-198, FC-226,
FC-438
summary table FC-415 to FC-429
configuration commands
global configuration FC-13 to FC-14, FC-147
interface configuration FC-14 to FC-15, FC-397
clearing FC-166
loading from the network FC-160
privileged EXEC FC-12 to FC-13
ROM monitor FC-16, FC-232 to FC-233
configuration files
clearing FC-166
router configuration FC-405
subinterface configuration FC-15, FC-409
compressing FC-158
CONFIG_FILE environment variable FC-167
summary table FC-17
copying
understanding xxxi to xxxii
between Flash memory devices FC-163
user EXEC FC-10 to FC-12
(example) FC-164
command syntax
from a network server FC-153, FC-165
conventions xxvii
from a TFTP server FC-154
displaying (example) xxxiii
from an rcp server FC-154
command syntax help
from Flash memory FC-163
See context-sensitive help
to a network server FC-149
command-line interface
to a TFTP server FC-149
See Cisco IOS, CLI
to an rcp server FC-149
commands
copying to an rcp server FC-188
abbreviating FC-19
displaying
aliases, creating FC-254
active FC-147
completion help FC-25
CONFIG_FILE environment variable FC-147, FC-225
context-sensitive help for abbreviating xxxii
information FC-147
default form, using xxxv
NVRAM FC-147, FC-225
execution FC-13
downloading FC-169
no form, using xxxv
(example) FC-172
comments
host configuration files FC-171
adding to configuration files FC-147
network configuration files FC-170
communication parameters
(example) FC-276
terminal FC-83
failing to load FC-170
community string
host
defining FC-307
See host configuration file
Conditionally Triggered Debugging
improving load time FC-161
description FC-294
larger than NVRAM FC-158
protocol specific FC-295
loading from the network FC-160
CONFIG_FILE environment variable FC-229
location FC-146
description FC-167, FC-229
modifying FC-147
specifying FC-167
network
ConfigMaker FC-67
crypto map configuration mode delete command FC-137, FC-140, FC-141, FC-167
summary FC-393 DHCP (Dynamic Host Configuration Protocol)
crypto transform configuration mode use in AutoInstall FC-40
description FC-393 DHCP pool configuration mode
Ctrl-] command FC-92 summary FC-393
Ctrl-C command FC-91 DHCP server
Ctrl-Z command FC-91 configuring a Cisco device as FC-53
current configuration diag command FC-288
viewing FC-143 diagnostic testing FC-288
cursor, moving at the command line FC-25 dial peer configuration mode
customer profile configuration mode, summary FC-404 description FC-394
dial peer voice command FC-419
dial shelf cards
D
executing commands directly on FC-289
data bits dialer DNIS group configuration mode, summary FC-394
changing character FC-83 dial-up software
data flow control connectivity problems
setting FC-82 SLIP-PPP FC-97
databits command FC-78 dir command FC-230, FC-435, FC-436, FC-438
data-character-bits command FC-78 Flash files FC-135
daylight savings time disable command FC-12
configuring FC-268 disconnect command FC-92, FC-93
debug aaa command FC-295 disconnect-character command FC-73
debug command output dispatch character
displaying on terminal FC-84 setting FC-82
debug commands dispatch-character command FC-82
description FC-293 dispatch-machine command FC-82
listing FC-294 dispatch-timeout command FC-82
debug condition command FC-296 distributions-of-statistics-kept command FC-340
debug dialer command FC-295 DLUR SAP configuration mode, summary FC-411
debug isdn command FC-295 documentation
debug modem command FC-295 conventions xxvii
debug ppp command FC-295 feedback, providing xxix
debugging modules xxi to xxiii
system FC-293 online, accessing xxviii
default form of a command ordering xxix
using FC-22 Documentation CD-ROM xxviii
default-value exec-character-bits command FC-77 documents and resources, supporting xxiv
default-value special-character-bits command FC-77 DRAM (dynamic random-access memory)
configuration files, downloading FC-171 copying from an rcp server to startup configuration
(example) FC-156, FC-158
description FC-169
G loading from a server FC-171
host names
global configuration mode
setting FC-254
description FC-13
host-failed message
entering FC-13, FC-147
displaying FC-94
exiting FC-13
hostname command FC-254
summary FC-18
hours-of-statistics-kept command FC-340
global configuration mode, summary of xxxii
HTTP Security
accessing Web page FC-117
H enabling FC-114
hub configuration mode
hardware break signal
summary FC-396
generating FC-74
hardware clock FC-269
network time source, configuring as FC-270 I
setting manually FC-270
ICMP (Internet Control Message Protocol)
setting system clock FC-270
(definition) FC-336
updating from NTP FC-265
response time measuring FC-336
hardware flow control
idle terminal message
configuring FC-82
configuring FC-93
hardware platforms
IF-MIB FC-316
See platforms, supported
IFS (Cisco IOS File System)
help
commands FC-128
See context-sensitive help
description FC-128
help command xxxii, FC-19
file copy FC-129
hex input mode
file viewing FC-128
See public key hex input configuration mode
URLs FC-129
High System Availability FC-431
prefixes (aliases) FC-130
history size command FC-23
images
hold character
boot image FC-174
changing for session FC-74
compressed FC-195
setting for line FC-72
reloads, scheduling FC-230
hold-character command FC-73
servers
hops-of-statistics-kept command FC-340
storing FC-4
host configuration files
servers, loading from FC-4
comparison with network configuration files FC-169
TFTP server
Flash memory
T
space considerations FC-182
loading FC-225 Tab key
loading on line cards FC-205 command completion FC-19, FC-25
MOP server Tab key, command completion xxxii
copying from TACACS
(examples) FC-189 logging in to system FC-90
naming conventions FC-174 specifying a host FC-90
network servers, loading from FC-193 (example) FC-90
rcp server tag command FC-339, FC-348, FC-350
copying from TCP
(examples) FC-178 connections
copying to FC-177 clearing FC-92
rcp server, copying from FC-186 clearing (examples) FC-110
recovering keepalive packets FC-281
using Xmodem FC-198 TCP/IP
using Ymodem FC-198 services,accessing FC-255
startup image Telcom-Solutions FC-266
loading from Flash FC-193 Telnet
loading from network server FC-195 addresses, suppressing FC-257
loading from ROM FC-197 changing end-of-line characters FC-76
TFTP server connections
copying from FC-181 idle, handling FC-273
(examples) FC-184 idle connections FC-273
copying to Remote Echo option FC-75
(examples) FC-176 Suppress Go Ahead option FC-75
types of FC-173 terminal
verifying activation character, setting FC-72
(example) FC-190 character and packet dispatch sequences,
creating FC-81
system information
character padding, setting FC-78
displaying FC-280
communication parameters, setting FC-83
system messages
device location, recording FC-84
warnings FC-299
disconnect character, setting FC-72
system processes
displaying
priorities, changing FC-274
commands FC-70
system software
debug messages FC-84
showing the current running version FC-225
file download mode FC-76
hold character FC-72
W Y
warning messages Ymodem
for the environmental monitor FC-299 description FC-198
WCCP (Web Cache Communication Protocol)
configuring on a router FC-369 to FC-381