ASR920 Router Configuration Guide
ASR920 Router Configuration Guide
ASR920 Router Configuration Guide
Cisco IOS XE 17
First Published: 2019-11-14
Last Modified: 2022-04-29
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2022 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 2 Getting Started With the Cisco ASR 920 Series Router 3
Overview 3
Restrictions 5
Interface Naming 6
Interface Speed Based on Port Type 8
VCoP Optics Support 9
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
iii
Contents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
iv
Contents
SYSLOG Server 49
SNMP-related services 49
Domain Name Assignment 49
DNS service 49
RADIUS or TACACS+ Server 49
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
v
Contents
Configuration Tasks 69
Limitations 70
Required Configuration Tasks 71
Activating the IMs 71
Deactivating the IMs 71
Setting the Card Type 71
Configuring the Controller 72
Verifying Controller Configuration 73
Optional Configurations 74
Configuring Framing 74
Setting an IP Address 75
Configuring Encapsulation 76
Configuring the CRC Size for T1 Interfaces 77
Saving the Configuration 78
Troubleshooting E1 and T1 Controllers 78
Setting a Loopback on the E1 Controller 79
Setting a Loopback on the T1 Controller 79
Running Bit Error Rate Testing 80
Monitoring and Maintaining the T1/E1 Interface Module 81
Verifying the Interface Configuration 82
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
vi
Contents
Overview 95
Prerequisites for Activating an IM 96
Restrictions for Activating an IM 96
Activating an IM 97
Prerequisites for Deactivating an IM 97
Restrictions for Deactivating an IM 98
Deactivating an IM 98
Sample Configuration and Verification Examples for Activation or Deactivation of IMs 99
Sample Configuration and Verification of Activating an 8-port 1G Cu IM (A900-IMA8T) 99
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
vii
Contents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
viii
Contents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
ix
Contents
CHAPTER 16 Dying Gasp Support for Loss of Power Supply Through SNMP, Syslog and Ethernet OAM 169
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
x
Contents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
xi
Contents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
xii
Contents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
xiii
Contents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
xiv
CHAPTER 1
Feature History
The following table lists the new and modified features supported in the Cisco ASR 920 Series Aggregation
Services Router Configuration Guide in Cisco IOS XE 17 releases.
Feature Description
Cisco IOS XE Cupertino 17.9.1
Custom Idle Pattern You can configure idle pattern manually on CEM circuits and verify if it's stable and
transmitted to the other end in alarm conditions. You can configure on all CEM PWs
in a T1/E1 circuit.
Supported on the following IMs on CESoPSN circuits with both partial and full time
slots.
• 48 port T1/E1 Interface Module
• 48 port DS3/E3 Interface Module
Increase Maximum Maximum Transmission Unit (MTU) is increased to a maximum of 9670 bytes on the
MTU Size Cisco RSP2 module. You can configure the MTU bytes using the mtu bytes command.
SNMP Dying Gasp This feature enables FPGA based effective space utilization between Ethernet OAM
Enhancement and SNMP. Use the platform-oam-snmp-dg-enable command on Cisco router
to configure this feature.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
1
Feature History
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
2
CHAPTER 2
Getting Started With the Cisco ASR 920 Series
Router
This chapter covers the following topics:
• Overview, on page 3
• Restrictions, on page 5
• Interface Naming, on page 6
• Interface Speed Based on Port Type, on page 8
• VCoP Optics Support, on page 9
Overview
Cisco ASR 920 families of routers include :
• ASR 920-I (Indoor) [ASR-920-12CZ-A/ASR-920-12CZ-D]—This sub-family has fixed ENET interfaces
(12 x 1 GE + 2 x 10GE) and dual power supplies (AC or DC).
• ASR 920-C (Compact) [ASR-920-4SZ-A/ASR-920-4SZ-D]—This sub-family of routers have a compact
form factor and configurable ports: 4 x 1 GE or 4 x 10 GE or any combinations of 1 GE and 10 GE
among the four ports available. In addition, there are 2 x 1 GE copper ports available.
• ASR 920-O (Outdoor) [ASR-920-10SZ-PD and ASR-920-8S4Z-PD]—This sub-family is designed for
deployment outdoors in an environment that is protected from rain and direct sunlight and provides cost
optimized, and extended temperature range for business, residential, and mobile access services.
• ASR 920-F (Fixed) [ASR-920-24SZ-M/ASR-920-24TZ-M]—This sub-family with 1 RU form factor
has fixed ENET interfaces (four 10GE and twenty-four 1GE Copper or SFP) and redundant modular
power supplies (AC or DC).
• ASR 920-M (Modular) [ASR-920-24SZ-IM]—This sub-family with 1.5 RU form factor has fixed ENET
interfaces (four 10GE and twenty-four 1GE Fiber), one modular interface, and redundant modular power
supplies (AC or DC). The interface modules from ASR 900 family of routers can be leveraged for use
with this model.
• ASR-920-12SZ-IM—Eight 1G copper ports, four SFP ports, and four 1G/10G Dual Rate ports one IM
slot Power over Ethernet (PoE), and a global navigation satellite system (GNSS) port, with redundant
AC or DC power supplies.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
3
Getting Started With the Cisco ASR 920 Series Router
Overview
In addition to the 1G/10G interfaces, the Cisco ASR 920 Series Routers also have the following hardware
interfaces for management, and timing and synchronization features:
• One Copper 10/100/1000Base-T LAN management port
• One BITS interface with RJ48 Connector
• One 1PPS or Time of Day port with RJ45 interface
• External Alarm interface with 4 Dry Contact Alarm inputs
• One RS-232 Console Port with USB A type connector
Note Due to the USB form factor, the flow control pins are not connected and the terminal server hosting the RS232
session must configure no flow-control or the console access to work correctly.
Caution A short press of the ZTP button starts the provisioning of the router. Pressing this button for 8 seconds or
more leads to Powering off the System Power.
For more information, see the various Cisco ASR920 Series Routers hardware installation guides at
http://www.cisco.com/c/en/us/support/routers/asr-920-series-aggregation-services-router/products-installation-guides-list.html.
All variants of the Cisco ASR 920 Series Router have 8MB of NOR flash, and 4GB of DRAM.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
4
Getting Started With the Cisco ASR 920 Series Router
Restrictions
1G-10G Dual Rate Supported Supported Supported Not Supported Not Supported Not Su
Ports
BITS interface Present Present Not Present Not Present Not Present Presen
Time of Day port Present Present Not Present Not Present Not Present Presen
Auto-Media-Select Supported Not Supported Not Supported Not Supported Not Supported Not Su
Combo Port
Smart SFP Supported Supported Supported Not Supported Not Supported Not Su
XFP Ports Not Supported Not Supported Not Supported Not Supported Not Supported Suppo
ZTP Button Supported Supported Supported Not Supported Not Supported Not Su
PoE Not Supported Not Supported Not Supported Not Supported Not Supported Not Su
GNSS Not Supported Not Supported Not Supported Not Supported Not Supported Not Su
Restrictions
• Cisco ASR-920-12SZ-A, and Cisco ASR-920-12SZ-D routers support Y.1564 only in 1 GE mode. It
does not support when the ports are configured with 10 GE mode.
• The Cisco ASR 920 Series Routers do not support the hw-module slot/subslot reload command.
• Starting with Cisco IOS XE Everest 16.9.1, ASR 920-12SZ-IM, Cisco ASR-920-12SZ-A, and Cisco
ASR-920-12SZ-D routers only load No Payload Encryption (NPE) images. If a non-NPE image is loaded,
the routers stop responding.
• Specific License Reservation (SLR) is not supported on Cisco ASR 920 routers.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
5
Getting Started With the Cisco ASR 920 Series Router
Interface Naming
Interface Naming
The following table shows the interface naming of the Cisco ASR-920-12CZ-A/ASR-920-12CZ-D ports:
1 3 5 7 9 11 5X 7X 9X 11X 13
0 2 4 6 8 10 4X 6X 8X 10X 12
1
Ports 12 and 13 when operating in 1G Mode is operationally up only when the peer connecting interfaces
are in Auto negotiation mode.
• Interfaces 0–3 are Gigabit Ethernet SFP only ports.
• Interfaces 4X–11X-Gigabit Ethernet are combo ports that support dual media—Copper and SFP. For
more information, see the Configuring Auto Media Sense on Cisco ASR 920 Series Routers.
• Interfaces 0 to 11 are referred to as Gigabit Ethernet 0/0/0–GigabitEthernet 0/0/11 respectively.
• Interfaces 12 and 13 are dual rate ports. These ports support 1G or 10G mode depending on the optics
(SFP or SFP+ respectively) installed in these ports.
Note Dual-Rate functionality is supported only with the Supported SFPs, listed in the Cisco ASR 920 Series
Aggregation Services Router Hardware Installation Guide.
The following table shows the interface naming of the Cisco ASR920-4SZ-A/ASR920-4SZ-D ports:
2
1G Cu Port 10G SFP+/1GSFP
1 3 5
0 2 4
2
Ports 2, 3, 4, and 5 when operating in 1G Mode is operationally up only when the peer connecting
interfaces are in Auto negotiation mode.
• Interfaces 0–1 are Copper only ports with RJ45 connector.
• Interfaces 0 and 1are referred to as Gigabit Ethernet 0/0/0–GigabitEthernet 0/0/1 respectively.
• Interfaces 2 to 5 are dual rate ports. These ports support 1G or 10G mode depending on the optics (SFP
or SFP+ respectively) installed in these ports.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
6
Getting Started With the Cisco ASR 920 Series Router
Interface Naming
Note Dual-Rate functionality is supported only with the Supported SFPs, listed in the Cisco ASR 920 Series
Aggregation Services Router Hardware Installation Guide.
The following table shows the interface naming of the Cisco ASR-920-10SZ-PD ports:
1 - - - - - - - - - -
0 2 3 4 5 6 7 8 9 10 11
The following table shows the interface naming of the Cisco ASR-920-8S4Z-PD ports:
1 - - - - - - - - - -
0 2 3 4 5 6 7 8 9 10 11
The following table shows the interface naming of the Cisco ASR-920-24SZ-IM, Cisco ASR-920-24SZ-M,
ASR-920-24TZ-M ports:
1 3 5 7 9 11 13 15 17 19 21 23 25 27
0 2 4 6 8 10 12 14 16 18 20 22 24 26
3
Ports 0 -23 are Copper ports for ASR-920-24TZ-M
• Interfaces 0–23 are Gigabit Ethernet SFP ports for ASR-920-24SZ-IM, ASR-920-24SZ-M, and Copper
port for ASR-920-24TZ-M.
• Interfaces 24-27 are 10-Gigabit Ethernet SFP+ ports that support 10G mode.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
7
Getting Started With the Cisco ASR 920 Series Router
Interface Speed Based on Port Type
The following table shows the interface naming of the Cisco ASR-920-12SZ-IM:
— — 7 5 3 1
15 14 13 12 11 10 9 8 6 4 2 0
The following table shows the interface naming of the Cisco ASR-920-12SZ-A/Cisco ASR-920-12SZ-D
ports:
1 3 5 7 9 11
0 2 4 6 8 10
• Interfaces 0–11 are dual rate ports. These ports support 1G or 10G mode depending on the optics (SFP
or SFP+ respectively) installed in these ports.
The following table shows the interface naming of the Cisco ASR-920-20SZ-M ports:
1 3 5 7 9 11 13 15 17 19 21 23 25 27
0 2 4 6 8 10 12 14 16 18 20 22 24 26
All Interfaces with CU SFP, flap twice during router boot up. This behaviour is applicable to the following
variants that support CU SFP:
• ASR-920-12CZ-A/D
• ASR-920-4SZ-A/D
• ASR-920-10SZ-PD and ASR-920-8S4Z-PD
• ASR-920-24SZ-M
• ASR-920-24SZ-IM
• ASR-920-12SZ-IM
• ASR-920-20SZ-M
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
8
Getting Started With the Cisco ASR 920 Series Router
VCoP Optics Support
Category Cu Ports SFP ports (With Fiber SFP SFP ports (With Copper SFP SFP+
plugged in) plugged in)
The following table shows the interface speed of the Cisco ASR-920-20SZ-M:
Category Cu Ports SFP ports (With Fiber SFP SFP ports (With Copper SFP SFP+
plugged in) plugged in)
1G Yes Yes Not Not Not Not Not Not Not Yes
Copper Supported Supported Supported Supported Supported Supported Supported
/SFP
ports
ASR-920-10SZ-PD 3, 5, 7, and 9 NA
ASR-920-12SZ-IM5 0 to 11 12 to 15
4
The Cisco ASR-920-24SZ-IM, ASR-920-24SZ-M routers support a maximum of 12 VCoP smart SFPs
and only on GE ports of the top row.
5
The Cisco ASR-920-12SZ-IM router supports a maximum of 8 VCoP smart SFPs and on all GE and
10 GE ports.
6
The Cisco ASR-920-12CZ-A/D supports a maximum of 4 VCoP smart SFPs on GE ports (0, 1, 10, and
11) with maximum ambient temperature of 65°C or it supports a maximum of 14 VCoP smart SFPs on
all 12 GE + two 10 GE dual rate ports with maximum temperature of 55°C.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
9
Getting Started With the Cisco ASR 920 Series Router
VCoP Optics Support
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
10
CHAPTER 3
Using Cisco IOS XE Software
This chapter provides information to prepare you to configure the Cisco ASR 920 Series Router:
• Understanding Command Modes, on page 11
• Recommended Methods for CLI Configuration on Router, on page 13
• Accessing the CLI Using a Router Console, on page 13
• Using Keyboard Shortcuts, on page 13
• Using the History Buffer to Recall Commands, on page 14
• Getting Help, on page 14
• Using the no and default Forms of Commands, on page 17
• Saving Configuration Changes, on page 18
• Managing Configuration Files, on page 18
• Filtering Output from the show and more Commands, on page 19
• Powering Off the Router, on page 20
• Password Recovery, on page 20
• Finding Support Information for Platforms and Cisco Software Images, on page 21
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
11
Using Cisco IOS XE Software
Understanding Command Modes
mode, you can enter interface configuration mode and a variety of other modes, such as protocol-specific
modes.
ROM monitor mode is a separate mode used when the Cisco IOS XE software cannot load properly. If a valid
software image is not found when the software boots or if the configuration file is corrupted at startup, the
software might enter ROM monitor mode.
The table below describes how to access and exit various common command modes of the Cisco IOS XE
software. It also shows examples of the prompts displayed for each mode.
Privileged From user EXEC mode, use the enable EXEC To return to user EXEC mode, use the
Router#
EXEC command. disable command.
Global From privileged EXEC mode, use the configure To return to privileged EXEC mode from
Router(config)#
configuration terminal privileged EXEC command. global configuration mode, use the exit or
end command.
Interface From global configuration mode, specify an To return to global configuration mode, use
Router(config-if)#
configuration interface using an interface command. the exit command.
To return to privileged EXEC mode, use the
end command.
Diagnostic The router boots up or accesses diagnostic mode If the IOS process failing is the reason for
Router(diag)#
in the following scenarios: entering diagnostic mode, the IOS problem
must be resolved and the router rebooted to
• In some cases, diagnostic mode will be
get out of diagnostic mode.
reached when the IOS process or processes
fail. In most scenarios, however, the router If the router is in diagnostic mode because
will reload. of a transport-map configuration, access the
• A user-configured access policy was router through another port or using a
configured using the transport-map method that is configured to connect to the
command that directed the user into Cisco IOS CLI.
diagnostic mode. See the Console Port, If the router is accessed through the Route
Telnet, and SSH Handling chapter of this Switch Processor auxiliary port, access the
book for information on configuring access router through another port. Accessing the
policies. router through the auxiliary port is not useful
• The router was accessed using a Route for customer purposes anyway.
Switch Processor auxiliary port.
• A break signal (Ctrl-C, Ctrl-Shift-6, or
the send break command ) was entered
and the router was configured to go into
diagnostic mode when the break signal was
received.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
12
Using Cisco IOS XE Software
Recommended Methods for CLI Configuration on Router
ROM monitor From privileged EXEC mode, use the reload To exit ROM monitor mode, use the
>
EXEC command. Press the Break key during continue command.
the first 60 seconds while the system is booting.
Attention Don’t copy and paste the CLI configuration directly on to router console.
We recommend that you perform one of the following methods:
• Line-by-Line CLI manual configuration
• For scale configuration, use the TCL SH utility available on the router for creating configurations with
appropriate delay. For more information on scripting with TCL, see Cisco IOS Scripting with TCL
Configuration Guide.
• You can use the configuration file, copied to startup configuration and bring-up the router.
Note For more information about connecting cables to the router, see the Connecting a Cisco ASR 920 Series Router
to the Network section in the Cisco ASR 920 Series Aggregation Services Router Hardware Installation Guide.
Note For information about installing USB devices drivers in order to use the USB console port, see the Cisco ASR
920 Series Aggregation Services Router Hardware Installation Guide.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
13
Using Cisco IOS XE Software
Using the History Buffer to Recall Commands
Keystrokes Purpose
Ctrl-B or the Left Arrow key7 Move the cursor back one character
Ctrl-F orthe Right Arrow key1 Move the cursor forward one character
Command Purpose
Ctrl-P or the Up Arrow key8 Recall commands in the history buffer, beginning with the most recent
command. Repeat the key sequence to recall successively older commands.
Ctrl-N or the Down Arrow key1 Return to more recent commands in the history buffer after recalling
commands with Ctrl-P or the Up Arrow key.
While in EXEC mode, list the last several commands you have just entered.
Router# show history
8
The arrow keys function only on ANSI-compatible terminals such as VT100s.
Getting Help
Entering a question mark (?) at the CLI prompt displays a list of commands available for each command
mode. You can also get a list of keywords and arguments associated with any command by using the
context-sensitive help feature.
To get help specific to a command mode, a command, a keyword, or an argument, use one of the following
commands:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
14
Using Cisco IOS XE Software
Finding Command Options Example
Command Purpose
Provides a list of commands that begin with a particular character string. (No space between command
abbreviated-command-entry
and question mark.)
?
Lists the keywords or arguments that you must enter next on the command line. (Space between
command
command and question mark.)
?
Command Comment
Router> enable Enter the enable command and password to access
Password: <password>
privileged EXEC commands. You are in privileged
Router#
EXEC mode when the prompt changes to a "# " from
the "> "; for example,Router> to Router# .
Router# configure terminal Enter the configure terminal privileged EXEC
Enter configuration commands, one per line.
command to enter global configuration mode. You
End with CNTL/Z.
Router(config)# are in global configuration mode when the prompt
changes to Router(config)# .
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
15
Using Cisco IOS XE Software
Finding Command Options Example
Command Comment
Router(config)# gigabitethernet 0/0/1 Enter interface configuration mode by specifying the
serial interface that you want to configure using the
gigabitethernet or tengigabitethernet global
configuration command.
Router(config-if)# ? Enter ? to display a list of all the interface
Interface configuration commands:
configuration commands available for the serial
.
. interface. This example shows only some of the
. available interface configuration commands.
ip Interface Internet Protocol config commands
keepalive Enable keepalive
lan-name LAN Name command
llc2 LLC2 Interface Subcommands
load-interval Specify interval for load
calculation for an
interface
locaddr-priority Assign a priority group
logging Configure logging for interface
loopback Configure internal loopback on an
interface
mac-address Manually set interface MAC address
mls mls router sub/interface commands
mpoa MPOA interface configuration commands
mtu Set the interface Maximum Transmission
Unit (MTU)
netbios Use a defined NETBIOS access list or
enable
name-caching
no Negate a command or set its defaults
nrzi-encoding Enable use of NRZI encoding
ntp Configure NTP
.
.
.
Router(config-if)#
Router(config-if)# ip ? Enter the command that you want to configure for the
Interface IP configuration subcommands:
interface. This example uses the ip command.
access-group Specify access control for
packets Enter ? to display what you must enter next on the
accounting Enable IP accounting on this
interface command line. This example shows only some of the
address Set the IP address of an interface available interface IP configuration commands.
authentication authentication subcommands
bandwidth-percent Set EIGRP bandwidth limit
broadcast-address Set the broadcast address
of an interface
cgmp Enable/disable CGMP
directed-broadcast Enable forwarding of
directed broadcasts
dvmrp DVMRP interface commands
hello-interval Configures IP-EIGRP hello
interval
helper-address Specify a destination address
for UDP broadcasts
hold-time Configures IP-EIGRP hold time
.
.
.
Router(config-if)# ip
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
16
Using Cisco IOS XE Software
Using the no and default Forms of Commands
Command Comment
Router(config-if)# ip address ? Enter the command that you want to configure for the
A.B.C.D IP address negotiated IP Address
interface. This example uses the ip address command.
negotiated over PPP
Router(config-if)# ip address Enter ? to display what you must enter next on the
command line. In this example, you must enter an IP
address or the negotiated keyword.
A carriage return (<cr>) is not displayed; therefore,
you must enter additional keywords or arguments to
complete the command.
Router(config-if)# ip address 172.16.0.1 ? Enter the keyword or argument that you want to use.
A.B.C.D IP subnet mask
This example uses the 172.16.0.1 IP address.
Router(config-if)# ip address 172.16.0.1
Enter ? to display what you must enter next on the
command line. In this example, you must enter an IP
subnet mask.
A <cr> is not displayed; therefore, you must enter
additional keywords or arguments to complete the
command.
Router(config-if)# ip address 172.16.0.1 Enter the IP subnet mask. This example uses the
255.255.255.0 ?
255.255.255.0 IP subnet mask.
secondary Make this IP address a secondary
address Enter ? to display what you must enter next on the
<cr>
Router(config-if)# ip address 172.16.0.1
command line. In this example, you can enter the
255.255.255.0 secondary keyword, or you can press Enter.
A <cr> is displayed; you can press Enter to complete
the command, or you can enter another keyword.
Router(config-if)# ip address 172.16.0.1 In this example, Enter is pressed to complete the
255.255.255.0
command.
Router(config-if)#
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
17
Using Cisco IOS XE Software
Saving Configuration Changes
It might take a minute or two to save the configuration. After the configuration has been saved, the following
output appears:
[OK]
Router#
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
18
Using Cisco IOS XE Software
Filtering Output from the show and more Commands
For more detailed information on managing configuration files, see the Configuration Fundamentals
Configuration Guide, Cisco IOS XE Release 3S.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
19
Using Cisco IOS XE Software
Powering Off the Router
Router# reload
Proceed with reload? [confirm]
*Jun 18 19:38:21.870: %SYS-5-RELOAD: Reload requested by console. Reload Reason: Reload
command.
Place the power supply switch in the Off position after seeing this message.
Password Recovery
Warning You will loose the startup configuration by using this Password Recovery procedure.
Note The configuration register is usually set to 0x2102 or 0x102. If you can no longer access the router (because
of a lost login or TACACS password), you can safely assume that your configuration register is set to 0x2102.
• Use the power switch to turn off the router and then turn it on again.
• Press Break on the terminal keyboard within 60 seconds of power up to put the router into ROMMON.
In some cases Ctrl+Break key combination can be used.
• Type confreg 0x2142 at the ROMMON.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
20
Using Cisco IOS XE Software
Finding Support Information for Platforms and Cisco Software Images
• The router will reload and prompt for configuration.Type no after each setup question, or press Ctrl-C
to skip the initial setup procedure.
• Type enable at the Router> prompt.
You are now in enable mode and should see the Router# prompt.
• Reset the config-register from 0x2142 to 0x2102. To do so, type the following:
config-register configuration_register_setting
Where, configuration_register_setting is 0x2102. For example,
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
21
Using Cisco IOS XE Software
Using Software Release Notes
Release notes are intended to be release-specific for the most current release, and the information provided
in these documents may not be cumulative in providing information about features that first appeared in
previous releases. Refer to Cisco Feature Navigator for cumulative feature information.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
22
CHAPTER 4
Using Zero Touch Provisioning
Note The Cisco ASR 920 Series Router (ASR-920-20SZ-M, ASR-920-24SZ-IM, ASR-920-24SZ-M, and
ASR-920-24TZ-M)do not have a ZTP or Reset button.
Note Routers running ZTP must be able to connect to a DHCP server and TFTP server, download the configuration
template, and begin operation, all at the press of a button.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
23
Using Zero Touch Provisioning
Restrictions for Using ZTP
On the Cisco ASR 920 Series Routers, ZTP is triggered under any of the following conditions:
• A router without a start up configuration is powered on
• ZTP button is pressed (applicable on Cisco ASR 920 Series Router variants where the ZTP button is
present on the front panel) or,
• The write erase and reload commands are executed (applicable on Cisco ASR 920 Series Router variants
where the ZTP button is not present on the front panel)
Note The Cisco ASR 920 Series Routers (ASR-920-12CZ-A, ASR-920-12CZ-D, ASR-920-4SZ-A, ASR-920-4SZ-D,
ASR-920-10SZ-PD, ASR-920-8S4Z-PD, ASR-920-12SZ-D and ASR-920-12SZ-A) have a ZTP button on
the front panel.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
24
Using Zero Touch Provisioning
Information About Using ZTP
The Cisco ASR 920 Series Routers (ASR-920-20SZ-M, ASR-920-24SZ-IM, ASR-920-24SZ-M, and
ASR-920-24TZ-M) do not have a ZTP or Reset button.
Note If you type yes at the prompt, the system configuration is saved in the nvRAM and the ZTP process terminates.
Note The operations center can initiate any of the above packets over the network to establish a connection to the
DHCP server.
2. When the first packet on any VLAN is detected, the router initiates a DHCP session to a DHCP server
over that VLAN.
3. After a DHCP session is established, the router must establish a connection with the TFTP server through
DHCP option 43 or DHCP option 150.
4. When connectivity to the TFTP server is established, the bootup process starts.
When the ZTP process initiates, the Cisco ASR 920 Series Router creates an Ethernet flow point (EFP) and
associates a bridge domain interface (BDI) on the detected management VLAN.
The router creates the following configuration to establish a connection with the DHCP server and the TFTP
server. The BDI created for this purpose has description ZTP_BDI configured under the BDI interface.
Caution Do not delete ZTP_BDI. Deleting this configuration results in loss of connectivity to the router and the ZTP
process terminates.
Note Effective Cisco IOS-XE Release 3.14.0S, to stop the ZTP process when the ZTP button is accidentally pressed,
use the ztp disable command in global configuration mode. However, if you long press the ZTP button, (more
than 8 sec) ZTP is still initialized reload even though ZTP is disabled through the ztp disable command.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
25
Using Zero Touch Provisioning
Example ZTP Configuration
Note Ensure to use hyphenated hexadecimal notation of MAC address (DOM-78-72-5D-00-A5-80) to name the
files.
Note A router running ZTP downloads the configuration from DHCP server. Sometimes, the ZTP DHCP config
may already exist as part of network config file. We recommend that you remove the ZTP configuration in
the network-confg download file to avoid the router moving into a hung state.
ip dhcp pool <pool-number>
network <ip-address> <wildcard-mask>
option 150 ip <ip-address>
default-router <router-address>
dns-server <dns-server-address>
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
26
Using Zero Touch Provisioning
DHCP Server
DHCP Server
The following is a sample configuration to set up a Cisco router as a DHCP server:
This configuration creates a DHCP pool of 30.30.1.x addresses with 30.30.1.0 as the subnet start. The IP
address of the DHCP server is 30.30.1.6. Option 150 specifies the TFTP server address. In this case, the DHCP
and TFTP server are the same.
The DHCP pool can allocate from 30.30.1.1 to 30.30.1.19 with the exception of 30.30.1.6, which is the DHCP
server itself.
TFTP Server
The TFTP server stores the bootstrap configuration file.
The following is a sample configuration (network– confg file):
hostname test-router
!
{ asrrouter-specifc configuration content}
!
end
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
27
Using Zero Touch Provisioning
Verifying the ZTP Configuration
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
28
CHAPTER 5
Using Dual Rate Ports
Dual rate ports support both SFP and SFP+ optic modules.
Note Dual rate ports are not supported on Cisco ASR 920 Series Router (ASR-920-24SZ-IM, ASR-920-24SZ-M,
ASR-920-24TZ-M, and ASR-920-12SZ-D).
Note Effective with Cisco IOS XE Bengaluru 17.4.1 release, on 1G interface or 1G mode on a dual rate port, when
negotiation is configured (for example, if the default is 'negotaiton auto' and 'no negotiation auto' is configured),
you can find the interface flap once during bootup. This is an expected behavior.
See the Supported SFP chapter in the Cisco ASR 920 Series Aggregation Services Router Hardware Installation
Guide .
• Restrictions for Dual Port, on page 29
• Prerequisites for Dual Port, on page 31
• Information About Dual Port, on page 32
• Verifying the Interface Mode , on page 33
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
29
Using Dual Rate Ports
Restrictions for Dual Port
• If sufficient 10G licenses or bulk port licenses are not available or activated for a port and an SFP+ is
installed in that port, the 10G mode is not enabled and the interface will be in link down state . The
following system warning message is displayed:
Warning: SFP+ inserted at port 5 tengig license not in use
• However, if the 10G license is installed and activated after the insertion of the SFP+ the interface
comes up in 10G mode automatically.
Note Do not issue another license command until the previous license command is processed completely. As part
of the license command, multiple dual port EEM scripts will be running. These scripts, in turn, copy the port
configuration. After executing completely, the previous configuration is restored. However, if you change
the port configuration while the command is still executing, changes will not be in effect.
• If an activated 10G license is uninstalled or deactivated for a port with SFP+, the interface is initialized
to 1G mode and 10G interfaces is administratively down.
• Dual rate interfaces in 1G mode cannot be bundled with another 1G port under a port channel interface.
However, two dual rate interfaces of the same bandwidth can be bundled together. For example,
• Interface Te0/0/11 and Interface Gig0/0/3 cannot be bundled in a port channel interface even if
interface Te 0/0/11 is operating in 1G mode
• Interface Te0/0/11 and Interface Te0/0/12 can be bundled together under a port channel interface
provided they have the same bandwidth (1G or 10G).
• After changing an SFP on a dual rate port, you must wait for approximately three minutes before attempting
any other SFP changes in that port.
• In case of ASR-920-10SZ-PD, ASR-920-8S4Z-PD and ASR-920-12CZ-A:
• The maximum default VTY lines supported by Cisco IOS XE is 5, and atleast 2 VTY (VTY 0 and
1) lines must be kept free for the dual rate EEM script to work as stated in the general EEM
configuration guidelines at Embedded Event Manager Configuration Guide.
Note Ensure that the VTY used for the dual rate EEM script is not used by any other
transport protocols such as SSH, Telnet.
If AAA is configured on the VTY used by the dual rate EEM script, then it might
take time to authorize each command, thus causing timeout issues.
If more than 5 VTYs are required, you can increase the number of VTY lines by
running the vty line 0 n command where range 0 to n represents the total number
of VTY lines permitted on the router.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
30
Using Dual Rate Ports
Prerequisites for Dual Port
• Copper SFPs are not supported in dual rate ports for ASR920-12SZ-IM.
• Dual rate EEM script triggers DHCP renegotiation. The dualrate_eem_policy.tcl script is triggered
when there is a 10G to 1G optics change or vice versa in a dual rate front panel interface.
• We recommend that you wait for 30 seconds between the removal and insertion of an SFP on an interface.
Ensure the following procedure for the devices that are configured with AAA authentication for their VTY
access:
1. AAA or TACACS server must authenticate the devices by ensuring:
a. the reachability
b. the correct username credentials configured for EEM (refer point-3 below)
Note If the mentioned criteria fails, then the EEM script prompts MAXRUN Timeout Error.
b. Reconfigure the policy with Authorization bypass using the following command.
event manager policy Mandatory.dualrate_eem_policy.tcl type system authorization
bypass
Example:
event manager session cli username Cisco_user1 privilege 15
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
31
Using Dual Rate Ports
Information About Dual Port
Note Ensure that at least 10MB of free space is available on the bootflash:, else the script and dual rate functionality
itself may fail.
Note It is highly recommended that you wait for the interfaces to be administratively up before performing a
subsequent OIR.
Note Features such as, QoS that rely on the bandwidth of the interface for service policy configuration may need
to be reconfigured as the previously-configured service policy may no longer be applicable. Perform a careful
verification of such features and consider reconfiguring them as required.
Note Since the configuration are reapplied on detection of change of SFP type, depending on the size of the
configuration on the router, the reapplication of configuration may take some time. It is recommended that
you wait for 60 seconds before verifying the configuration.
Use the following command to debug failures and collect EEM debug logs:
debug event manager tcl cli_lib
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
32
Using Dual Rate Ports
Verifying the Interface Mode
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
33
Using Dual Rate Ports
Verifying the Interface Mode
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
34
CHAPTER 6
Console Port and Telnet Handling
• Console Port Overview, on page 35
• Connecting Console Cables, on page 35
• Installing USB Device Drivers, on page 35
• Console Port Handling Overview, on page 36
• Telnet and SSH Overview, on page 36
• Persistent Telnet, on page 36
• Configuring a Console Port Transport Map, on page 36
• Configuring Persistent Telnet, on page 38
• Viewing Console Port, SSH, and Telnet Handling Configurations, on page 41
• Important Notes and Restrictions, on page 43
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
35
Console Port and Telnet Handling
Console Port Handling Overview
Persistent Telnet
In traditional Cisco routers, accessing the router using Telnet is not possible in the event of an IOS failure.
When Cisco IOS fails on a traditional Cisco router, the only method of accessing the router is through the
console port. Similarly, if all active IOS processes have failed on a router that is not using persistent Telnet,
the only method of accessing the router is through the console port.
With persistent Telnet however, users can configure a transport map that defines the treatment of incoming
Telnet traffic on the Management Ethernet interface. Among the many configuration options, a transport map
can be configured to direct all traffic to the IOS command-line interface, diagnostic mode, or to wait for an
IOS vty line to become available and then direct users into diagnostic mode when the user sends a break signal
while waiting for the IOS vty line to become available. If you use Telnet to access diagnostic mode, the Telnet
connection will be usable even in scenarios when no IOS process is active. Therefore, persistent Telnet
introduces the ability to access the router via diagnostic mode when the IOS process is not active.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
36
Console Port and Telnet Handling
Configuring a Console Port Transport Map
Procedure
Router> enable
Step 3 transport-map type console Creates and names a transport map for handling
transport-map-name console connections, and enter transport map
configuration mode.
Example:
Step 4 connection wait [allow interruptible | none] Specifies how a console connection will be
handled using this transport map:
Example:
• allow interruptible—The console
Router(config-tmap)# connection wait none connection waits for an IOS vty line to
become available, and also allows user to
Example: enter diagnostic mode by interrupting a
console connection waiting for the IOS vty
line to become available. This is the default
setting.
Note Users can interrupt a waiting
connection by entering Ctrl-C or
Ctrl-Shift-6.
• none—The console connection
immediately enters diagnostic mode.
Step 5 banner [diagnostic | wait] banner-message (Optional) Creates a banner message that will
be seen by users entering diagnostic mode or
Example:
waiting for the IOS vty line as a result of the
console transport map configuration.
Router(config-tmap)# banner diagnostic
X • diagnostic—Creates a banner message
Enter TEXT message. End with the
character 'X'.
seen by users directed into diagnostic
--Welcome to Diagnostic Mode--X mode as a result of the console transport
Router(config-tmap)# map configuration.
• wait—Creates a banner message seen by
users waiting for the IOS vty to become
available.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
37
Console Port and Telnet Handling
Examples
Router(config-tmap)# exit
Step 7 transport type console console-line-number Applies the settings defined in the transport map
input transport-map-name to the console interface.
Example: The transport-map-name for this command
must match the transport-map-name defined in
Router(config)# transport type console the transport-map type console comm and.
0 input consolehandler
Examples
In the following example, a transport map to set console port access policies is created and attached to console
port 0:
Procedure
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
38
Console Port and Telnet Handling
Configuring Persistent Telnet
Router> enable
Step 3 transport-map type persistent telnet Creates and names a transport map for handling
transport-map-name persistent Telnet connections, and enters
transport map configuration mode.
Example:
Step 4 connection wait [allow {interruptible}| none Specifies how a persistent Telnet connection
{disconnect}] will be handled using this transport map:
Example: • allow—The Telnet connection waits for
an IOS vty line to become available, and
Router(config-tmap)# connection wait none exits the router if interrupted.
• allow interruptible—The Telnet
connection waits for the IOS vty line to
become available, and also allows user to
enter diagnostic mode by interrupting a
Telnet connection waiting for the IOS vty
line to become available. This is the default
setting.
Note Users can interrupt a waiting
connection by entering Ctrl-C or
Ctrl-Shift-6.
• none—The Telnet connection immediately
enters diagnostic mode.
• none disconnect—The Telnet connection
does not wait for the IOS vty line and does
not enter diagnostic mode, so all Telnet
connections are rejected if no vty line is
immediately available in IOS.
Step 5 banner [diagnostic | wait] banner-message (Optional) Creates a banner message that will
be seen by users entering diagnostic mode or
Example:
waiting for the IOS vty line as a result of the
persistent Telnet configuration.
Router(config-tmap)# banner diagnostic
X • diagnostic—creates a banner message
Enter TEXT message. End with the
character 'X'.
seen by users directed into diagnostic
--Welcome to Diagnostic Mode-- mode as a result of the persistent Telnet
X configuration.
Router(config-tmap)#
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
39
Console Port and Telnet Handling
Examples
Step 6 transport interface gigabitethernet 0 Applies the transport map settings to the
Management Ethernet interface (interface
Example:
gigabitethernet 0).
Router(config-tmap)# transport interface Persistent Telnet can only be applied to the
gigabitethernet 0 Management Ethernet interface on the router.
This step must be taken before applying the
transport map to the Management Ethernet
interface.
Router(config-tmap)# exit
Step 8 transport type persistent telnet input Applies the settings defined in the transport map
transport-map-name to the Management Ethernet interface.
Example: The transport-map-name for this command
must match the transport-map-name defined in
Router(config)# transport type persistent the transport-map type persistent telnet
telnet input telnethandler comm and.
Examples
In the following example, a transport map that will make all Telnet connections wait for an IOS vty line to
become available before connecting to the router, while also allowing the user to interrupt the process and
enter diagnostic mode, is configured and applied to the Management Ethernet interface (interface gigabitethernet
0).
A diagnostic and a wait banner are also configured.
The transport map is then applied to the interface when the transport type persistent telnet input command
is entered to enable persistent Telnet.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
40
Console Port and Telnet Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
Router(config-tmap)# exit
Router(config)# transport type persistent telnet input telnethandler
Interface:
GigabitEthernet0
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Waiting for IOS prompt
Bshell banner:
Transport Map:
Name: telnethandler
Type: Persistent Telnet Transport
Interface:
GigabitEthernet0
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Waiting for IOS process
Bshell banner:
Welcome to Diagnostic Mode
Transport Map:
Name: telnethandling1
Type: Persistent Telnet Transport
Connection:
Wait option: Wait Allow
Router# show transport-map type console
Transport Map:
Name: consolehandler
Type: Console Transport
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Waiting for the IOS CLI
Bshell banner:
Welcome to Diagnostic Mode
Router# show transport-map type persistent telnet
Transport Map:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
41
Console Port and Telnet Handling
Viewing Console Port, SSH, and Telnet Handling Configurations
Name: telnethandler
Type: Persistent Telnet Transport
Interface:
GigabitEthernet0
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Waiting for IOS process
Bshell banner:
Welcome to Diagnostic Mode
Transport Map:
Name: telnethandling1
Type: Persistent Telnet Transport
Connection:
Wait option: Wait Allow
Router# show transport-map name telnethandler
Transport Map:
Name: telnethandler
Type: Persistent Telnet Transport
Interface:
GigabitEthernet0
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Waiting for IOS process
Bshell banner:
Welcome to Diagnostic Mode
Router# show transport-map name consolehandler
Transport Map:
Name: consolehandler
Type: Console Transport
Connection:
Wait option: Wait Allow Interruptable
Wait banner:
Waiting for the IOS CLI
Bshell banner:
Welcome to Diagnostic Mode
The show platform software configuration access policy command can be used to view the current
configurations for the handling of incoming console port, SSH, and Telnet connections. The output of this
command provides the current wait policy for each type of connection, as well as any information on the
currently configured banners. Unlike show transport-map, this command is available in diagnostic mode so
it can be entered in cases when you need transport map configuration information but cannot access the IOS
CLI.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
42
Console Port and Telnet Handling
Important Notes and Restrictions
The show platform software configuration access policy output is given both before the new transport map
is enabled and after the transport map is enabled so the changes to the SSH configuration are illustrated in the
output.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
43
Console Port and Telnet Handling
Important Notes and Restrictions
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
44
CHAPTER 7
Using the Management Ethernet Interface
The Cisco ASR 920 Series Router has one Gigabit Ethernet Management Ethernet interface on each Route
Switch Processor.
The purpose of this interface is to allow users to perform management tasks on the router; it is basically an
interface that should not and often cannot forward network traffic but can otherwise access the router, often
via Telnet and SSH, and perform most management tasks on the router. The interface is most useful before
a router has begun routing, or in troubleshooting scenarios when the interfaces are inactive.
The following aspects of the Management Ethernet interface should be noted:
• Each router has a Management Ethernet interface.
• IPv4, IPv6, and ARP are the only routed protocols supported for the interface.
• The interface provides a method of access to the router even if the interfaces or the IOS processes are
down.
• The Management Ethernet interface is part of its own VRF. This is discussed in more detail in the Gigabit
Ethernet Management Interface VRF, on page 46.
• Gigabit Ethernet Port Numbering, on page 45
• IP Address Handling in ROMmon and the Management Ethernet Port, on page 46
• Gigabit Ethernet Management Interface VRF, on page 46
• Common Ethernet Management Tasks, on page 46
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#interface gigabitethernet0
Router(config-if)#
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
45
Using the Management Ethernet Interface
IP Address Handling in ROMmon and the Management Ethernet Port
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
46
Using the Management Ethernet Interface
Viewing Detailed VRF Information for the Management Ethernet VRF
IPv4 Example
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
47
Using the Management Ethernet Interface
Telnetting over the Management Ethernet Interface
IPv6 Example
TFTP Example
FTP Example
NTP Server
To allow the software clock to be synchronized by a Network Time Protocol (NTP) time server over the
Management Ethernet interface, enter the ntp server vrf Mgmt-intf command and specify the IP address of
the device providing the update.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
48
Using the Management Ethernet Interface
SYSLOG Server
SYSLOG Server
To specify the Management Ethernet interface as the source IP or IPv6 address for logging purposes, enter
the logging host ip-address vrf Mgmt-intf command.
The following CLI provides an example of this procedure.
SNMP-related services
To specify the Management Ethernet interface as the source of all SNMP trap messages, enter the snmp-server
source-interface traps gigabitEthernet 0 command.
The following CLI provides an example of this procedure:
DNS service
To specify the Management Ethernet interface VRF as a name server, enter the ip name-server vrf Mgmt-intf
IPv4-or-IPv6-address command.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
49
Using the Management Ethernet Interface
VTY lines with ACL
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
50
CHAPTER 8
Out of Band Management Through USB Modem
Effective Cisco IOS XE Release 3.15.0S, the Cisco ASR 920 Series Router provides out-of-band connectivity
to manage remotely-deployed cell site routers using the 3G or 4G cellular network through the USB modem
(also called the dongle). This OOB connectivity gives the service providers the ability to securely manage
their remote cell site routers at anytime from anywhere. This feature also eliminates the need for the onsite
or remote IT staff to handle outages.
Out of Band Management feature is not supported in Cisco IOS XE Everest 16.5.1.
• Prerequisites for the OOB Management Through USB Modem, on page 51
• Restrictions for the OOB Management Through USB Modem, on page 51
• Information About the OOB Management Through USB Modem, on page 52
• Configuring the Management Interface on the MAG, on page 53
• Configuring the LMA, on page 56
• Verifying the Configuration, on page 57
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
51
Out of Band Management Through USB Modem
Information About the OOB Management Through USB Modem
• OOB Management using USB Modem works only when the advancemetroipaccess license is enabled.
• Starting from Cisco IOS-XE 3.15.0S release, you cannot configure or remove an virtual interface,
virtualPPP-4001, manually.
Note By default, the management interface remains in administratively down state until the dongle in inserted and
the feature is enabled.
In the above topology, the LMA assigns an IP address to the LMN. The USB modem receives its IP address
from the Service Provider. A UDP tunnel is established between the LMA and MAG through the proxy mobile
IPv6 (PMIPv6) protocol.
• Proxy Mobile IPv6 technology—Provides network-based IP mobility management to a mobile node
without requiring the participation of the mobile node in any mobility-related signaling. The network is
responsible for managing IP mobility on behalf of the host.
• MAG—Manages mobility-related signaling for a mobile node attached to its access link. It is the first
layer 3 attachment node for the mobile clients.
The major functions of MAG are:
• • Assigning an IP address to the loopback address given by the LMA (when LMA assigns an IP
address dynamically)
• Assigning an IP address to the loopback address and sending an update to LMA (in case of static
IP address)
• Tunneling the traffic to the corresponding LMA.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
52
Out of Band Management Through USB Modem
Configuring the Management Interface on the MAG
Step 3 ip route prefix mask {ip-address} Creates a route to reach the LMA through the
virtualPPP-4001 dongle interface (virtual pp interface).
Step 6 ipv6 mobile pmipv6-domain domain-name Configures common parameters valid across
the domain—a logical grouping of the MAG
and LMA.
Creates a PMIPv6 domain and configures it
by using the configuration from the LMA
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
53
Out of Band Management Through USB Modem
Configuration Example: MAG Configuration with Dynamic IP Address on Logical MN Interface
Step 14 address {ipv4 ipv4-address | ipv6 ipv6-address Configures an IPv4, an IPv6, or dynamic
| dynamic} address for a MAG or to configure an IPv4 or
an IPv6 address on an LMA.
Step 15 roaming interface type number priority Specifies an interface as a roaming interface
priority-value egress-att access-tech-type for a Mobile Access Gateway (MAG) and set
label egress-label its parameters
Step 17 interface GigabitEthernet slot/subslot The local routing ACL’s are not populated,
which affects the locally generated/destined
data packets. This command ensures the issue
does not arise.
Step 18 lma lma-id domain-name Configures the LMA for the MAG and enters
MAG-LMA configuration mode.
Step 19 ipv4-address ipv4-address Configures the IPv4 address for the LMA
within MAG, for the MAG with LMA, or for
the LMA or MAG within the Proxy Mobile
IPv6 (PMIPv6) domain.
Step 20 auth-option spi {spi-hex-value | decimal Configures authentication for the PMIPv6
spi-decimal-value} key {ascii ascii-string | domain.
hex hex-string}
Note This authentication should match
that at the LMA side, otherwise
the UDP tunnel will not be
established.
Step 23 home interface type Enables the MAG service on the specified
interface.
ConfigurationExample:MAGConfigurationwithDynamicIPAddressonLogical
MN Interface
Router(config)# platform usb modem 1234567890
1234567890
Router(config)# interface loopback 1
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
54
Out of Band Management Through USB Modem
Configuration Example: MAG Configuration with Static IP Address on Logical MN Interface
Router(config-if)# exit
Router(config)# ipv6 unicast-routing
Router(config)# ip route 0.0.0.0 0.0.0.0 Virtual-PPP4001
Router(config)# ipv6 mobile pmipv6-domain D1
Router(config-ipv6-pmipv6-domain)# encap udptunnel
Router(config-ipv6-pmipv6-domain)# lma LMA1
Router(config-ipv6-pmipv6-domain-lma)# ipv4-address 173.39.88.101
Router(config-ipv6-pmipv6-domain-lma)# exit
Router(config-ipv6-pmipv6-domain)# nai [email protected]
Router(config-ipv6-pmipv6-domain-mn)# lma LMA1
Router(config-ipv6-pmipv6-domain-mn)# exit
Router(config-ipv6-pmipv6-domain)# ipv6 mobile pmipv6-mag M1 domain D1
Router(config-ipv6-pmipv6-mag)# address dynamic
Router(config-ipv6-pmipv6mag-addr-dyn)# roaming interface Virtual-PPP4001 priority 1
egress-att 3g label etyr
Router(config-ipv6-pmipv6mag-addr-dyn)# interface loopback1
Router(config-ipv6-pmipv6mag-intf)# interface GigabitEthernet0/0/1
Router(config-ipv6-pmipv6mag-intf)# lma LMA1 D1
Router(config-ipv6-pmipv6mag-lma)# ipv4-address 173.39.88.101
Router(config-ipv6-pmipv6mag-lma)# auth-option spi 67 key ascii key1
Router(config-ipv6-pmipv6mag-lma)# logical-mn [email protected]
Router(config-ipv6-pmipv6mag-logicalmn)# address dynamic
Router(config-ipv6-pmipv6mag-logicalmn)# home interface loopback1
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
55
Out of Band Management Through USB Modem
Configuring the LMA
Step 3 auth-option spi {spi-hex-value | decimal Configures authentication for the PMIPv6
spi-decimal-value} key {ascii ascii-string | domain.
hex hex-string}
Note This authentication should match
that at the MAG side, otherwise
the UDP tunnel will not be
established.
Step 7 ipv6 mobile pmipv6-lma lma-id domain Enables the LM) service on the router and
domain-name [force] configures the Proxy Mobile IPv6 (PMIPv6)
domain for the LMA.
Step 8 address ipv4 ipv4-address | ipv6 ipv6-address Configures an IPv4, an IPv6, or dynamic
| dynamic} address for a MAG or LMA.
Step 9 dynamic mag learning Enables the LMA to accept PMIPv6 signaling
messages from any MAG that is not locally
configured.
Step 11 pool ipv4 name pfxlen length Specifies the name of the IPv4 address pool,
from which a home address is allocated to a
mobile node (MN), in the LMA.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
56
Out of Band Management Through USB Modem
Configuration Example
Configuration Example
ip local pool v4pool 10.10.10.0 10.10.10.254
!
ipv6 mobile pmipv6-domain D1
auth-option spi 64 key ascii 100
encap udptunnel
nai [email protected]
network net1
ipv6 mobile pmipv6-lma LMA1 domain D1
address ipv4 173.39.88.101
dynamic mag learning
network net1
pool ipv4 v4pool pfxlen 24
!
ip route 0.0.0.0 0.0.0.0 GigabitEthernet0/0/2
exit
On the LMA:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
57
Out of Band Management Through USB Modem
MAG Data Path
Note If the LMA has bindings to multiple MAGs, use the following command to view a specific MAG:show ipv6
mobile pmipv6 LMA binding nai [email protected].
Note Addresses assigned to the MN should be from the local pool configured in the LMA.
Debug Commands
The following debugs can be used to debug the call flow information and events.
• debug ipv6 mobile mag events
• debug ipv6 mobile mag info
• debug ipv6 mobile mag api
To view the packet level information messages, use
• debug ipv6 mobile packets
To clear the PMIPv6 bindings and statistics:
• clear ipv6 mobile pmipv6 mag binding all
• clear ipv6 mobile pmipv6 mag binding nai MN-nai
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
58
Out of Band Management Through USB Modem
Related Documents
Related Documents
For more information on mobility commands, see the Cisco IOS IP Mobility Command Reference.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
59
Out of Band Management Through USB Modem
Related Documents
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
60
CHAPTER 9
Power Over Ethernet
Effective Cisco IOS XE Release 3.16S, the Cisco ASR-920-12SZ-IM Aggregation Services Router supports
Power over Ethernet (PoE). PoE is the ability for any LAN switching infrastructure to provide power over a
copper Ethernet cable to an endpoint or powered device.
• Prerequisites for PoE, on page 61
• Restrictions for PoE, on page 61
• Information About PoE, on page 61
• How to Configure the PoE, on page 62
• Verifying the PoE Configuration, on page 63
• Additional References, on page 66
• Feature Information for Power Over Ethernet, on page 67
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
61
Power Over Ethernet
Installing the PoE License
the system, the system may run out of power to allot to the new device. Over-subscription of power could
also result in tripping the power supplies and bringing down modules or even the entire router. In such cases,
PoE can manage power allocation.
Note In the Cisco ASR-920-12SZ-IM Router, the dual power supplies function in redundant power mode.
For more information on installing licenses, see Configuring the Cisco IOS Software Activation Feature.
PoE License
PoE can be enabled only through the PoE license. As the PoE ports are controlled by the Port License, you
must enable the PoE Port License as well as the PoE license to use this feature. Once you install the PoE
license and enable the feature, the router attempts to detect and classify PoE on those PoE ports that are in
ADMIN_UP state and the link state in DOWN state.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
62
Power Over Ethernet
Verifying the PoE Configuration
Step 2 To determine how inline power is applied to the device on the specified port, use the power inline command:
Example:
Step 3 If the interfaces tries to draw more power than negotiated through LLDP, the power inline police action
errdisable command sets the port to errdisable mode.
Example:
Router(config-if)# end
Router(config)# end
Router#
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
63
Power Over Ethernet
Verifying the PoE Configuration
• The following is a sample output for port policing using the show power inline police commands:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
64
Power Over Ethernet
Debugging the PoE Configuration
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
65
Power Over Ethernet
Additional References
Additional References
Related Documents
Cisco IOS commands Cisco IOS Master Commands List, All Releases
Standards
Standard Title
802.3af The original IEEE 802.3af-2003 PoE standard provides up to 15.4 W of DC power to each device.
802.3at The updated IEEE 802.3at-2009 PoE standard also known as PoE+ or PoE plus, provides up to
25.5 W of power. The 2009 standard prohibits a powered device from using all four pairs for
power.
MIBs
• POWER-ETHERNET-MIB To locate and download MIBs for selected platforms, Cisco software
• CISCO-POWER-ETHERNET-MIB releases, and feature sets, use Cisco MIB Locator found at the following
URL:
http://www.cisco.com/go/mibs
RFCs
RFC Title
Technical Assistance
Description Link
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
66
Power Over Ethernet
Feature Information for Power Over Ethernet
Note The table below lists only the software release that introduced support for a given feature in a given software
release train. Unless noted otherwise, subsequent releases of that software release train also support that
feature.
Power Over Ethernet Cisco IOS-XE Release 3.16.0S In this release, this feature was introduced on the
Cisco ASR-920-12SZ-IM Aggregation Services
Router.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
67
Power Over Ethernet
Feature Information for Power Over Ethernet
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
68
CHAPTER 10
Configuring T1/E1 Interfaces
Effective Cisco IOS-XE Release 3.14.0S, the Cisco ASR-920-24SZ-IM, ASR-920-24SZ-M, ASR-920-24TZ-M
Aggregation Services Router supports the following types of interface modules (IMs):
• 8x1G Cu IM (A900-IMA8T)
• 8xT1/E1 IM (A900-IMA8D)
• 1x10G IM (A900-IMA1Z)
• 2x10G IM (A900-IMA2Z)
Effective Cisco IOS-XE Release 3.16S, the Cisco ASR-920-12SZ-IM Aggregation Services Router supports
the following types of interface modules (IMs):
• A900-IMA8T
• A900-IMA8S
• A900-IMA8D
• A900-IMA16D
• A900-IMA1X
This chapter provides information about configuring the T1/E1 interface module on the Cisco ASR 920 Series
Router. For information about managing your system images and configuration files, refer to the Cisco IOS
Configuration Fundamentals Configuration Guide and Cisco IOS Configuration Fundamentals Command
Reference publications.
For more information about the commands used in this chapter, refer to the Cisco IOS Command Reference
publication for your Cisco IOS software release.
The router does not support swapping of the TDM interface modules to Gigabit Ethernet modules. If the TDM
interface module is swapped with the Gigabit Ethernet module in the same slot or vice-versa, the router must
be reloaded.
• Configuration Tasks, on page 69
• Verifying the Interface Configuration, on page 82
• Configuration Examples, on page 82
Configuration Tasks
This section describes how to configure the T1/E1 interface module for the Cisco ASR 920 Series Router.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
69
Configuring T1/E1 Interfaces
Limitations
Limitations
This section describes the software limitations that apply when configuring the T1/E1 interface module on
the Cisco ASR 920 Series Router.
• The Cisco ASR 920 Series Router does not support ATM and IMA on T1/E1 interface modules.
• The Cisco ASR 920 Series Router only supports the following BERT patterns: 2^11, 2^15, 2^20-O153,
and 2^20-QRSS.
• When TDM is inserted in the Cisco ASR 920 Series Router, it should be activated by running the
hw-module subslot slot-number/subslot-number activate command in EXEC mode.
This command removes the following ports from front panel and brings up the respective IMs:
• • Slots 20–23 for T1E1 IMs
• Slot 16–23 for copper IMs
Once the TDM is activated, you must reload the router to bring up the T1/E1 interface module.
Note The above command is not required to bring up the 8X1G Cu, 1x10G and 2x10G IMs.
• To recover the front panel ports from the IMs, run the hw-module subslot slot-number/subslot-number
deactivate command in EXEC mode.
• The above activation and deactivation commands assume that the correct IM is inserted in its corresponding
slot. If an IM inserted in a different slot than what is activated, the IM does not come up and the
corresponding front panel interfaces are removed.
• front panel interfaces will be removed)
• L2TPv3 encapsulation is not supported on the Cisco ASR 920 Series Router.
• CEM on access BDI in core is not supported.
• Any change in the card type requires a router reload. To change the card type, the current card type must
be unconfigured, then the router must be reloaded, and then the new card type must be changed.
• The Payload calculation per unit for T1/E1 interface module is:
• Framed E1 / T1 with no. of time slots less than 4 –> Payload = 4 x no. of time slots
• Framed E1 / T1 with no. of timeslots greater than or equal 4 –> Payload = 2 x no. of time slots
• Unframed T1, C11 –> Payload = 48 (2 x 24 (all slots))
• Unframed E1, C12 –> Payload = 64 (2 x32 (all slots))
• Channelization is not supported for serial interfaces. However, channelization is supported for CEM at
the DS0 level.
Note A card type change cannot be applied when the interface module is booting up. You must wait until after the
interface module is administratively up.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
70
Configuring T1/E1 Interfaces
Required Configuration Tasks
Procedure
Procedure
Note Mixing of T1 and E1 interface types is not supported. All ports on the interface module must be of the same
type.
To set the card type for the T1/E1 interface module, complete these steps:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
71
Configuring T1/E1 Interfaces
Configuring the Controller
Procedure
Step 2 Router(config)# card type {e1 | t1} slot subslot Sets the serial mode for the interface module:
• t1—Specifies T1 connectivity of 1.536
Mbps. B8ZS is the default linecode for T1.
• e1—Specifies a wide-area digital
transmission scheme used predominantly
in Europe that carries data at a rate of
1.984 Mbps in framed mode and 2.048
Mbps in unframed E1 mode.
• slot subslot —Specifies the location of the
interface module.
Procedure
Step 2 Router(config)# controller {t1 | e1} slot/port Selects the controller to configure and enters
controller configuration mode.
• t1—Specifies the T1 controller.
• e1—Specifies the E1 controller.
• slot/port—Specifies the location of the
interface.
Note The slot number is always 0 and
subslot number is always 1.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
72
Configuring T1/E1 Interfaces
Verifying Controller Configuration
Step 6 cablelength {long | short} To fine-tune the pulse of a signal at the receiver
for an E1 cable, use the cablelength command
Example:
in controller configuration mode.
Router(config-controller)# cablelength
long
Router(config)# exit
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
73
Configuring T1/E1 Interfaces
Optional Configurations
No alarms detected.
alarm-trigger is not set
Soaking time: 3, Clearance time: 10
AIS State:Clear LOS State:Clear LOF State:Clear
Framing is ESF, Line Code is B8ZS, Clock Source is Internal.
Data in current interval (230 seconds elapsed):
0 Line Code Violations, 0 Path Code Violations
0 Slip Secs, 0 Fr Loss Secs, 0 Line Err Secs, 0 Degraded Mins
0 Errored Secs, 0 Bursty Err Secs, 0 Severely Err Secs, 0 Unavail Secs
0 Near-end path failures, 0 Far-end path failures, 0 SEF/AIS Secs
Total Data (last 24 hours)
136 Line Code Violations, 63 Path Code Violations,
0 Slip Secs, 6 Fr Loss Secs, 4 Line Err Secs, 0 Degraded Mins,
7 Errored Secs, 1 Bursty Err Secs, 6 Severely Err Secs, 458 Unavail Secs
2 Near-end path failures, 0 Far-end path failures, 0 SEF/AIS Secs
Optional Configurations
There are several standard, but optional, configurations that might be necessary to complete the configuration
of your T1/E1 interface module.
Configuring Framing
Framing is used to synchronize data transmission on the line. Framing allows the hardware to determine when
each packet starts and ends. To configure framing, use the following commands.
Procedure
Step 2 Router(config)# controller {t1 | e1} slot/port Selects the controller to configure.
• t1—Specifies the T1 controller.
• e1—Specifies the E1 controller.
• slot/port—Specifies the location of the
controller.
Note The slot number is always 0 and
subslot number is always 1.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
74
Configuring T1/E1 Interfaces
Verifying Framing Configuration
Router(config)# exit
Setting an IP Address
To set an IP address for the serial interface, complete these steps:
Note You can also set an IP address using an IMA or CEM configuration.
Procedure
Step 2 Router(config-if)# ip address address mask Sets the IP address and subnet mask.
• address —Specify the IP address.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
75
Configuring T1/E1 Interfaces
Configuring Encapsulation
What to do next
Note IPV4 routing protocols, such as eigrp , ospf , bgp , and rip , are supported on serial interfaces.
Configuring Encapsulation
When traffic crosses a WAN link, the connection needs a Layer 2 protocol to encapsulate traffic.
Note L2TPv3 encapsulation is not supported on theCisco ASR 920 Series Routers.
Procedure
Step 2 Router(config)# interface serial slot/port Selects the interface to configure from global
configuration mode.
• slot—Specifies the slot in which the
T1/E1 interface module is installed.
• port —Specifies the location of the
controller. The port range for T1 and E1
is 0 to 1.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
76
Configuring T1/E1 Interfaces
Verifying Encapsulation
Verifying Encapsulation
Use the show interfaces serial command to verify encapsulation on the interface:
Procedure
Step 2 Router(config)# interface serial slot/port Selects the interface to configure from global
configuration mode.
• slot—Specifies the slot in which the
T1/E1 interface module is installed.
• port —Specifies the location of the
controller. The port range for T1 and E1
is 0 to 1.
Step 3 Router(config-if)# crc {16 | 32} Selects the CRC size in bits.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
77
Configuring T1/E1 Interfaces
Verifying the CRC Size
Command Purpose
For information about managing your system images and configuration files, refer to the Cisco IOS
Configuration Fundamentals Configuration Guide and Cisco IOS Configuration Fundamentals Command
Reference publications.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
78
Configuring T1/E1 Interfaces
Setting a Loopback on the E1 Controller
Command Purpose
Select the E1 controller and enter controller configuration mode. controller e1 slot/port
Note The slot number is
always 0.
Set a network payload loopback on the E1 line. loopback network {line | payload}
Exit configuration mode when you have finished configuring the end
controller.
Task Command
Selects the T1 controller and enter controller configuration mode. controller t1 slot/port
Note The slot number is
always 0.
Sets a local loopback on the T1 line. You can select to loopback the line loopback local {line | payload}
or the payload.
Sets a remote loopback on the T1 line. This loopback setting will loopback loopback remote iboc
the far end at line or payload, using IBOC (in band bit-orientated code)
or the Extended Super Frame (ESF) loopback codes to communicate the
request to the far end.
Exits configuration mode when you have finished configuring the end
controller.
Loopback Description
loopback local Loops the incoming receive signal back out to the transmitter. You can specify
whether to use the line or payload.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
79
Configuring T1/E1 Interfaces
Running Bit Error Rate Testing
Loopback Description
loopback network Loops the inbound traffic back to the network. You can specify whether to use line
or payload.
loopback remote iboc Attempts to set the far-end T1 interface into line loopback. This command sends an
in-band bit-oriented code to the far-end to cause it to go into line loopback. This
command is available when using ESF or SF framing mode.
network line Loops the incoming signal back in the interface module using the line loopback mode
of the framer. The framer does not reclock or reframe the incoming data. All incoming
data is received by the interface module driver.
network payload Loops the incoming signal back using the payload loopback mode of the framer.
The framer reclocks and reframes the incoming data before sending it back out to
the network. When in payload loopback mode, an all 1s data pattern is received by
the local HDLC receiver, and the clock source is automatically set to line (overriding
the clock source command). When the payload loopback is ended, the clock source
returns to the last setting selected by the clock source command.
Task Command
Selects the E1 or T1 controller and enters controller Router(config)# controller {e1 | t1} slot/port
configuration mode.
Note The slot number is always 0.
Specifies the BERT pattern for the E1 or T1 line and the Router(config-controller)# bert pattern
duration of the test in minutes. The valid range is 1 to 1440 {2^15 | 2^23 | All 1s} interval minutes
minutes.
Note Only the 2^11, 2^15, 2^20-O153, and
2^20-QRSS patterns are supported.
Exit configuration mode when you have finished configuring Router(config-controller)# end
the controller.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
80
Configuring T1/E1 Interfaces
Monitoring and Maintaining the T1/E1 Interface Module
The following keywords list different BERT keywords and their descriptions.
Keyword Description
Both the total number of error bits received and the total number of bits received are available for analysis.
You can select the testing period from 1 minute to 24 hours, and you can also retrieve the error statistics
anytime during the BER test.
Note To terminate a BERT test during the specified test period, use the no bert command.
Note BERT is supported only on controllers with channel-group configured. If CEM, IMA, or ATM are configured
on controller, the BERT option is disabled.
Note When BERT is running, the serial interface of that controller will be made down till BERT is complete.
You can view the results of a BERT test at the following times:
• After you terminate the test using the no bert command
• After the test runs completely
Task Command
Displays statistics about the serial information for a specific show interface serialslot/port
E1 or T1 channel group. Valid values are 0 to 30 for E1 and
0 to 23 for T1.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
81
Configuring T1/E1 Interfaces
Verifying the Interface Configuration
Note To change the T1/E1 card type configuration, use the no card type command and reload the router.
Configuration Examples
This section includes the following configuration examples:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
82
Configuring T1/E1 Interfaces
Example: CRC Configuration
!
! Specify the framing method
!
Router(config-controller)# framing esf
!
! Exit controller configuration mode and return to global configuration mode
!
Router(config-controller)# exit
!
! Specify the interface and enter interface configuration mode
!
Router(config)# interface serial 0/1/x
!
! Specify the encapsulation protocol
!
Router(config-if)# encapsulation ppp
!
! Exit interface configuration mode
!
Router(config-if)# exit
!
! Exit global configuration mode
!
Router(config)# exit
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
83
Configuring T1/E1 Interfaces
Example: Invert Data on the T1/E1 Interface
!
Router(config-controller)# exit
!
! Exit global configuration mode
!
Router(config)# exit
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
84
CHAPTER 11
Installing and Upgrading Software
This chapter describes how to update software on the Cisco ASR 920 Series Router.
• Upgrading Field Programmable Hardware Devices, on page 85
• File Systems on the Cisco ASR 920 Series Router, on page 85
• Restrictions, on page 86
• System Requirements, on page 86
• Autogenerated Files and Directories, on page 87
• Upgrading the Router Software, on page 88
• Verifying the Upgrade, on page 91
• Software Upgrade Example, on page 92
nvram: Router NVRAM. You can copy the startup configuration to NVRAM or from NVRAM.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
85
Installing and Upgrading Software
Restrictions
system: The system memory file system, which includes the running configuration.
usb[0-1]: The Universal Serial Bus (USB) flash drive file systems.
If you see a file system not listed in the table above, enter the ? help option or see the copy command reference
for additional information on that file system.
Restrictions
• When you migrate to Cisco IOS-XE Release 3.18 SP, HOFPGA upgrade is mandatory and not optional.
The router works for few minutes after the first reboot is complete and starts a second reboot without a
notice.
• When FPGA upgrade is triggered during reload or SDM template change, the last reset reason in show
version shows as power on.
System Requirements
The following sections describe the system requirements for the Cisco ASR 920 Series Router software:
Memory Recommendations
These are the recommendation for the routers for the Cisco IOS XE images and packages:
• DRAM Memory—4 GB
• Software Image—asr920-universalk9_npe.bin—420 MB (ASR 920-24SZ-IM)
• Software Image—asr920-universalk9_npe.bin—430 MB (ASR 920-12SZ-IM)
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
86
Installing and Upgrading Software
Bootflash Space Requirements
Note Always use bootflash instead of flash on all the system operations.
Note If you try to copy or archive upgrade beyond the bootflash memory capacity, the action terminates.
You can use the show version privileged EXEC command to see the software version that is running on your
router. The second line of the display shows the version.
You can also use the dir bootflash: privileged EXEC command to see the names of other software images
that you might have stored in bootflash.
3.13.0S 15.4(3)S
3.14.0S 15.5(1)S
The Cisco ASR 920 Series Router does not support IOS XE versions prior to 3.13.0S.
Caution Do not alter any autogenerated file in the bootflash: directory should not be deleted, renamed, moved, or
altered in any way unless directed by customer support; altering these files can have unpredictable consequences
for system performance.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
87
Installing and Upgrading Software
Upgrading the Router Software
crashinfo files A crashinfo file may appear in the bootflash: file system.
Crashinfo files are useful for tuning and troubleshooting, but are not related to router
operations: you can erase them without impacting the router’s performance.
core files The bootflash/core directory is the storage area for .core files.
Caution Do not erase or move the core directory.
lost+found directory This directory is created on bootup if a system check is performed. Its appearance is
completely normal and does not indicate any issues with the router.
Caution Ensure that you have chosen an upgrade image that is supported by your current software version.
Note Before upgrading from Cisco IOS XE 3.13.0S to 3.14.0S, we recommend that you disable the following CLI
on router: platform trace runtime slot 0 bay 0 process iomd module all-modules level info
The routers are shipped with the latest software image installed. Follow the instructions in this section if you
need to reinstall or upgrade the software image.
Before installing your router software, make sure that you have archived copies of the current Cisco IOS XE
release and the Cisco IOS XE release to which you are upgrading. You should keep these archived images
until you have upgraded all devices in the network to the new Cisco IOS XE image and until you have verified
that the new Cisco IOS XE image works properly in your network.
Cisco routinely removes old Cisco IOS XE versions from Cisco.com. See End of Sale and End of Life Products
at this URL: http://www.cisco.com/en/US/products/sw/iosswrel/prod_category_end_of_life.html.
You can copy the software image file on the bootflash memory to the appropriate TFTP directory on a host
by using the copy bootflash: tftp: privileged EXEC command. You can also configure the router as a TFTP
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
88
Installing and Upgrading Software
Downloading an Image
server to copy files from one router to another without using an external TFTP server by using the tftp-server
global configuration command. For more information about the tftp-server command, see the “Basic File
Transfer Services Commands” section of the Cisco IOS Configuration Fundamentals Command Reference
at this URL: http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_book.html.
This procedure is for copying the combined bin file to the router. You copy the file to the router from a TFTP
server and extract the files. You can download an image file and replace or keep the current image.
To download software, follow these steps:
Procedure
Step 2 Download the image to a TFTP server and make sure that the server is properly configured.
Step 3 Log into the router through the console port or a Telnet session.
Step 4 If Gigabit Ethernet (GE) port 0 is used as management interface, check the connectivity to TFTP server using
the following CLI:
Router# ping vrf Mgmt-intf tftp-server-address
For more information about assigning an IP address and default gateway to the router, refer to the software
configuration guide for this release.
Step 5 Download the image file from the TFTP server to the router by entering this privileged EXEC command:
Router# copy tftp://location/directory/filename.bin bootflash:
This example shows how to download an image from a TFTP server at 192.0.2.1 and to overwrite the image
on the router:
Router# copy tftp://192.0.2.1/image-name.bin bootflash:
The installation process extracts the bin file with all the files and the IOS XE image, and sets the BOOT
directory to the created directory in bootflash memory. The process takes approximately 5 to 10 minutes, and
at some stages might appear to have stopped.
Step 6 Set the image path in the boot variables and configure the router to autoboot as follows:
Router# configure terminal
Router(config)# config-register 0x2102 (! 0x2102 sets the router for autoboot)
Router(config)# boot system bootflash:image-name.bin (! sets the image to be loaded in the
next reload)
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
89
Installing and Upgrading Software
Upgrading the ROMMON on router
Step 7 Verify the boot variables set on the router using the following CLI:
Router# show bootvar
BOOT variable = bootflash:asr920-universalk9_npe.bin ,12;
CONFIG_FILE variable does not exist
BOOTLDR variable does not exist
Configuration register is 0x0 (! will be 0x2102 at next reload)
After the installation, the router is running the universal image. To install a purchased license with increased
capabilities, see Software Activation Configuration Guide. To purchase a license, contact Cisco.
Caution To avoid actions that might make your system unable to boot, read this entire section before starting the
upgrade.
Procedure
Step 1 Check the router bootup ROMMON region (ROM0 or ROM1). The example, shows the router boots up from
ROM0 region.
Example:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
90
Installing and Upgrading Software
Verifying the Upgrade
Step 5 Reload the router again to confirm bootup from upgraded ROMMON region ROM1.
Example:
Router# reload
System configuration has been modified. Save? [yes/no]: y
Building configuration...
[OK]
Proceed with reload? [confirm]
Jul 24 09:56:34.510: %SYS-5-RELOAD: Reload requested by console. Reload Reason: Reload
Command.Jul 24 15:27:03.205 R0/0: %PMAN-5-EXITACTION: Process manager is exiting: process
exit with reload chassis code
System Bootstrap, Version 12.2(20140211:085836) [pbalakan-sb_romver_16 130], DEVELOPMENT
SOFTWARE
Copyright (c) 1994-2012 by cisco Systems, Inc.
Compiled Fri 28-Mar-14 18:57 by pbalakan-sb_romver_16
Boot ROM1
Last reset cause: RSP-Board
Step 6 Repeat Step 3 to Step 5 to update the other region on the RSP (ROM0) region in this procedure).
Note We recommend that both region ROM0 a.ndROM1 are upgraded.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
91
Installing and Upgrading Software
Software Upgrade Example
R0 14080701 15.4(3r)S4
F0 14080701 15.4(3r)S4
Use the show rom-monitor r0 command to check the rommon version on the router.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
92
Installing and Upgrading Software
Software Upgrade Example
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
93
Installing and Upgrading Software
Software Upgrade Example
[email protected].
License Level: advancedmetroipaccess
License Type: Smart License
Next reload license Level: advancedmetroipaccess
cisco ASR-920-12CZ-A (Freescale P2020) processor (revision 1.0 GHz) with 687183K/6147K bytes
of memory.
Processor board ID CAT1748U1GQ
12 Gigabit Ethernet interfaces
2 Ten Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
2097152K bytes of physical memory.
1328927K bytes of SD flash at bootflash:.
Configuration register is 0x2102
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
94
CHAPTER 12
Activating or Deactivating Interface Module
This chapter provides information about activating or deactivating interface module (IM) on the Cisco
ASR-920-24SZ-IM and Cisco ASR-920-12SZ-IM Routers. For more information about the commands used
in this chapter, see the Cisco IOS XE 3S Command References.
Note The router does not support swapping of the TDM interface modules to Gigabit Ethernet modules on the Cisco
ASR 920 Router and vice-versa. If the TDM interface module is swapped with the Gigabit Ethernet module
in the same slot or vice-versa, the router must be reloaded.
• Overview, on page 95
• Prerequisites for Activating an IM, on page 96
• Restrictions for Activating an IM, on page 96
• Activating an IM, on page 97
• Prerequisites for Deactivating an IM, on page 97
• Restrictions for Deactivating an IM, on page 98
• Deactivating an IM, on page 98
• Sample Configuration and Verification Examples for Activation or Deactivation of IMs, on page 99
Overview
Cisco ASR-920-24SZ-IM Router supports the following IMs in Cisco IOS XE Release 3.16:
• 8-port 10/100/1000 Ethernet Interface Module (A900-IMA8T)
• 1-port 10GE XFP Interface Module (A900-IMA1X)
• 2-port 10GE SFP+/XFP Interface Module (A900-IMA2Z)
• 8-port RJ48C T1/E1 Interface Module (A900-IMA8D)
• 16-port T1/E1 Interface Module (A900-IMA16D)
• 32-port T1/E1 Interface Module (A900-IMA32D)
• 4-port OC3/STM1 or 1 port OC12/STM4 Interface Module (A900-IMA4OS)
• Combo 8-port 10/100/1000 and 1 port 10GE Interface Module (A900-IMA8T1Z)
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
95
Activating or Deactivating Interface Module
Prerequisites for Activating an IM
Cisco ASR-920-12SZ-IM Router supports the following IMs in Cisco IOS XE Release 3.14S:
• 8-port 10/100/1000 Ethernet Interface Module (A900-IMA8T)
• 8-port SFP Gigabit Ethernet Interface Module (A900-IMA8S)
• 8-port RJ48C T1/E1 Interface Module (A900-IMA8D)
• 16-port T1/E1 Interface Module (A900-IMA16D)
• 32-port T1/E1 Interface Module (A900-IMA32D)
• 1-port 10GE XFP Interface Module (A900-IMA1X)
• 2-port 10GE SFP+/XFP Interface Module (A900-IMA2Z)
• Combo 8-port 10/100/1000 and 1 port 10GE Interface Module (A900-IMA8T1Z)
• Combo 8 SFP GE and 1-port 10GE IM (A900-IMA8S1Z)
• 4-port OC3/STM1 or 1-port OC12/STM4 Interface Module (A900-IMA4OS)
For information on installing and removing the IMs, see the Cisco ASR-920-24SZ-IM, ASR-920-24SZ-M,
ASR-920-24TZ-M Aggregation Services Router Hardware Installation Guide.
The router does not support swapping of the TDM interface modules to Gigabit Ethernet modules. If the TDM
interface module is swapped with the Gigabit Ethernet module in the same slot or vice-versa, the router must
be reloaded.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
96
Activating or Deactivating Interface Module
Activating an IM
Activating an IM
Note This section is not applicable to Cisco ASR-920-12SZ-IM Router for TDM IMs.
Note This section is applicable only to the 8x1G Cu IM or 8xT1/E1 IMs. There is no impact to the front panel ports
to bring up or bring down the 1x10G and 2x10G IMs.
Note The following ports on the router are relinquished when activating 8x1G Cu IM
or 8xT1/E1 IM:
• 16 to 23 for Cu IM
• 20 to 23 for T1/E1 IM
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
97
Activating or Deactivating Interface Module
Restrictions for Deactivating an IM
• The hw-module subslot default command is not supported on TDM and OC-3 interface module.
Deactivating an IM
Note This section is applicable only to the 8-port 1G Cu IM or 8-port T1/E1 IMs. There is no impact to the front
panel ports to bring up or bring down the 1-port 10G and 2-port 10G IMs.
Before removing the IM from the router, you must deactivate the IM.
• Verify that the correct IM is in OK state in the router.
• Remove all virtual interfaces (using the no interface interface-name command) that are associated with
the IM. These interfaces include MPLS TP tunnels, TE tunnels, BDI interface, and Port-Channel interface.
• Shut down all pluggable IM interfaces in the router.
• Wait for a minute.
• Default all pluggable IM interfaces in the router.
• Execute the following command to deactivate the IM present in the IM slot:
hw-module subslot slot-number/subslot-number deactivate
• slot-number—Specifies the chassis slot number where the IM is installed.
• subslot-number—Specifies the chassis subslot number where IM is installed.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
98
Activating or Deactivating Interface Module
Sample Configuration and Verification Examples for Activation or Deactivation of IMs
Note The following ports on the router are recovered when deactivating 8-port 1G Cu
IM or 8-port T1/E1 IM:
• 16 to 23 for Cu IM
• 20 to 23 for T1/E1 IM
The following example shows how to activate an 8-port 1G Cu IM (A900-IMA8T) on the Cisco
ASR-920-24SZ-IM Router:
Router# hw-module
*Nov 20 09:31:53.361: %SYS-5-CONFIG_I: Configured from console by consolesu
Command will disable & default configs in module 0 (16-23). Proceed ? [confirm]
Changed ACTIVATED IM: ASR900_IMA8T
Router#
*Nov 20 09:32:11.112: %IOSXE-1-PLATFORM:kernel: Board info b500002
*Nov 20 09:32:11.359: %TRANSCEIVER-6-REMOVED:iomd: Transceiver module removed from
GigabitEthernet0/0/23
*Nov 20 09:32:11.369: %IOSXE_RP_ALARM-6-INFO: ASSERT None GigabitEthernet0/0/23
*Nov 20 09:32:21.743: %SPA_OIR-6-ONLINECARD: SPA (A900-IMA8T) online in subslot 0/1
*Nov 20 09:32:23.639: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/0, changed state to down
*Nov 20 09:32:23.652: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/1, changed state to down
*Nov 20 09:32:23.692: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/2, changed state to down
*Nov 20 09:32:23.697: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/3, changed state to down
*Nov 20 09:32:23.702: %LINK-3-UPDOWN: Interface GigabitEthernet0/1/4, changed state to down
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
99
Activating or Deactivating Interface Module
Sample Configuration and Verification of Activating an 8-port 1G Cu IM (A900-IMA8T)
The following example displays platform information for the Cisco ASR-920-24SZ-IM Router:
The following example displays sample output for interfaces on the Cisco ASR-920-24SZ-IM Router:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
100
Activating or Deactivating Interface Module
Sample Configuration and Verification for Deactivating an 8-port 1G Cu IM (A900-IMA8T)
The following example displays platform information for the Cisco ASR-920-24SZ-IM Router:
The following example displays sample output for interfaces on the Cisco ASR-920-24SZ-IM Router:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
101
Activating or Deactivating Interface Module
Sample Configuration and Verification for Deactivating an 8-port 1G Cu IM (A900-IMA8T)
The following example shows how to deactivate 8x1G Cu IM (A900-IMA8T)) on the Cisco ASR-920-24SZ-IM
Router:
The following example displays platform information for the Cisco ASR-920-24SZ-IM Router:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
102
Activating or Deactivating Interface Module
Sample Configuration and Verification of Activating 8-port T1/E1 IM (A900-IMA8D)
F0 01491802 15.4(3r)S4
Router#
The following example displays sample output for interfaces on the Cisco ASR-920-24SZ-IM Router:
Router# show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0/0 unassigned YES NVRAM down down
GigabitEthernet0/0/1 unassigned YES NVRAM down down
GigabitEthernet0/0/2 unassigned YES NVRAM down down
GigabitEthernet0/0/3 unassigned YES NVRAM down down
GigabitEthernet0/0/4 unassigned YES NVRAM down down
GigabitEthernet0/0/5 unassigned YES NVRAM down down
GigabitEthernet0/0/6 unassigned YES NVRAM down down
GigabitEthernet0/0/7 unassigned YES NVRAM down down
GigabitEthernet0/0/8 unassigned YES NVRAM down down
GigabitEthernet0/0/9 unassigned YES NVRAM down down
GigabitEthernet0/0/10 unassigned YES NVRAM down down
GigabitEthernet0/0/11 unassigned YES NVRAM down down
GigabitEthernet0/0/12 unassigned YES NVRAM down down
GigabitEthernet0/0/13 unassigned YES NVRAM down down
GigabitEthernet0/0/14 unassigned YES NVRAM down down
GigabitEthernet0/0/15 unassigned YES NVRAM down down
GigabitEthernet0/0/16 unassigned YES NVRAM down down
GigabitEthernet0/0/17 unassigned YES NVRAM down down
GigabitEthernet0/0/18 unassigned YES NVRAM down down
GigabitEthernet0/0/19 unassigned YES NVRAM down down
GigabitEthernet0/0/20 unassigned YES NVRAM down down
GigabitEthernet0/0/21 unassigned YES NVRAM down down
GigabitEthernet0/0/22 unassigned YES NVRAM down down
GigabitEthernet0/0/23 unassigned YES NVRAM down down
Te0/0/24 unassigned YES NVRAM administratively down down
Te0/0/25 unassigned YES NVRAM administratively down down
Te0/0/26 unassigned YES NVRAM administratively down down
Te0/0/27 unassigned YES NVRAM administratively down down
GigabitEthernet0 7.23.21.156 YES NVRAM up up
BDI243 unassigned YES NVRAM down down
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
103
Activating or Deactivating Interface Module
Sample Configuration and Verification of Activating 8-port T1/E1 IM (A900-IMA8D)
#############################################################
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
104
Activating or Deactivating Interface Module
Sample Configuration and Verification of Activating 8-port T1/E1 IM (A900-IMA8D)
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
cisco ASR-920-24SZ-IM (Freescale P2020) processor (revision 1.2 GHz) with 687112K/6147K
bytes of memory.
Processor board ID CAT1707V01N
20 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
2097152K bytes of physical memory.
1328927K bytes of SD flash at bootflash:.
Authentication passed
PLATFORM:kernel: Board info b500002
*Nov 20 09:53:23.315: %SPA_OIR-6-ONLINECARD: SPA (A900-IMA8D) online in subslot 0/1[OK]
The following example displays sample output for interfaces on the Cisco ASR-920-24SZ-IM Router:
Router# show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0/0 unassigned YES NVRAM down down
GigabitEthernet0/0/1 unassigned YES NVRAM down down
GigabitEthernet0/0/2 unassigned YES NVRAM down down
GigabitEthernet0/0/3 unassigned YES NVRAM down down
GigabitEthernet0/0/4 unassigned YES NVRAM down down
GigabitEthernet0/0/5 unassigned YES NVRAM down down
GigabitEthernet0/0/6 unassigned YES NVRAM down down
GigabitEthernet0/0/7 unassigned YES NVRAM down down
GigabitEthernet0/0/8 unassigned YES NVRAM down down
GigabitEthernet0/0/9 unassigned YES NVRAM down down
GigabitEthernet0/0/10 unassigned YES NVRAM down down
GigabitEthernet0/0/11 unassigned YES NVRAM down down
GigabitEthernet0/0/12 unassigned YES NVRAM down down
GigabitEthernet0/0/13 unassigned YES NVRAM down down
GigabitEthernet0/0/14 unassigned YES NVRAM down down
GigabitEthernet0/0/15 unassigned YES NVRAM down down
GigabitEthernet0/0/16 unassigned YES NVRAM down down
GigabitEthernet0/0/17 unassigned YES NVRAM down down
GigabitEthernet0/0/18 unassigned YES NVRAM down down
GigabitEthernet0/0/19 unassigned YES NVRAM down down
Te0/0/24 unassigned YES NVRAM administratively down down
Te0/0/25 unassigned YES NVRAM administratively down down
Te0/0/26 unassigned YES NVRAM administratively down down
Te0/0/27 unassigned YES NVRAM administratively down down
GigabitEthernet0 7.23.21.156 YES NVRAM up up
BDI243 unassigned YES NVRAM down down
The following example displays platform information for the Cisco ASR-920-24SZ-IM Router:
Router# show platform
Chassis type: ASR-920-24SZ-IM
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
105
Activating or Deactivating Interface Module
Sample Configuration and Verification of Deactivating 8-port T1/E1 IM (A900-IMA8D)
The following example displays sample output for interfaces on the Cisco ASR-920-24SZ-IM Router:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
106
Activating or Deactivating Interface Module
Sample Configuration and Verification of Deactivating 8-port T1/E1 IM (A900-IMA8D)
The following example shows how to deactivate 8-port T1/E1 IM (A900-IMA8D) on the Cisco
ASR-920-24SZ-IM Router:
#################################################
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
107
Activating or Deactivating Interface Module
Sample Configuration and Verification of Deactivating 8-port T1/E1 IM (A900-IMA8D)
GPL code under the terms of GPL Version 2.0. For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
Authentication passed
*Nov 20 10:23:14.107: %PKI-6-CONFIGAUTOSAVE: Running configuration saved to NVRAM[OK]
*Nov 20 10:23:29.665: %CALL_HOME-6-CALL_HOME_ENABLED: Call-home is enabled by Smart Agent
for Licensing.
*Nov 20 10:23:29.666: %SMART_LIC-5-COMM_RESTORED: Communications with Cisco licensing cloud
restored
*Nov 20 10:24:14.037: %SPA_OIR-6-ONLINECARD: SPA (24xGE-4x10GE-FIXED) online in subslot 0/0
The following example displays platform information for the Cisco ASR-920-24SZ-IM Router:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
108
Activating or Deactivating Interface Module
Sample Configuration and Verification of Deactivating 8-port T1/E1 IM (A900-IMA8D)
F0 01491802 15.4(3r)S4
Router#
The following example displays sample output for interfaces on the Cisco ASR-920-24SZ-IM Router:
Router# show ip interface brief
Interface IP-Address OK? Method Status Protocol
GigabitEthernet0/0/0 unassigned YES NVRAM down down
GigabitEthernet0/0/1 unassigned YES NVRAM down down
GigabitEthernet0/0/2 unassigned YES NVRAM down down
GigabitEthernet0/0/3 unassigned YES NVRAM down down
GigabitEthernet0/0/4 unassigned YES NVRAM down down
GigabitEthernet0/0/5 unassigned YES NVRAM down down
GigabitEthernet0/0/6 unassigned YES NVRAM down down
GigabitEthernet0/0/7 unassigned YES NVRAM down down
GigabitEthernet0/0/8 unassigned YES NVRAM down down
GigabitEthernet0/0/9 unassigned YES NVRAM down down
GigabitEthernet0/0/10 unassigned YES NVRAM down down
GigabitEthernet0/0/11 unassigned YES NVRAM down down
GigabitEthernet0/0/12 unassigned YES NVRAM down down
GigabitEthernet0/0/13 unassigned YES NVRAM down down
GigabitEthernet0/0/14 unassigned YES NVRAM down down
GigabitEthernet0/0/15 unassigned YES NVRAM down down
GigabitEthernet0/0/16 unassigned YES NVRAM down down
GigabitEthernet0/0/17 unassigned YES NVRAM down down
GigabitEthernet0/0/18 unassigned YES NVRAM down down
GigabitEthernet0/0/19 unassigned YES NVRAM down down
GigabitEthernet0/0/20 unassigned YES NVRAM down down
GigabitEthernet0/0/21 unassigned YES NVRAM down down
GigabitEthernet0/0/22 unassigned YES NVRAM down down
GigabitEthernet0/0/23 unassigned YES NVRAM down down
Te0/0/24 unassigned YES NVRAM administratively down down
Te0/0/25 unassigned YES NVRAM administratively down down
Te0/0/26 unassigned YES NVRAM administratively down down
Te0/0/27 unassigned YES NVRAM administratively down down
GigabitEthernet0 7.23.21.156 YES NVRAM up up
BDI243 unassigned YES NVRAM down down
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
109
Activating or Deactivating Interface Module
Sample Configuration and Verification of Deactivating 8-port T1/E1 IM (A900-IMA8D)
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
110
CHAPTER 13
Configuring Ethernet Interfaces
This chapter provides information about configuring the Gigabit Ethernet interface on the Cisco ASR 920
Series Router.
For more information about the commands used in this chapter, see the Cisco IOS XE 3S Command References.
Effective Cisco IOS-XE Release 3.16S, the Cisco ASR-920-12SZ-IM Aggregation Services Router was added
to the Cisco ASR 920 Series Routers family.
Note On the Cisco ASR-920-12SZ-IM Aggregation Services Router, ports from 12 through 15 can operate at either
1G or 10G, and operates in a mutually exclusive way. You cannot insert both 1G and 10G together. If you
insert IG IMs (A900-IMA8T1Z, A900-IMA8S1Z, A900-IMA8T, A900-IMA8S), the dual rate port supports
only 10G.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
111
Configuring Ethernet Interfaces
Configuring an Interface
Configuring an Interface
This section lists the required configuration steps to configure Gigabit and Ten Gigabit Ethernet interfaces.
Follow these steps to configure your interface:
Note Carrier delays of less than 2 seconds are not supported on both 1G and 10G modes.
Procedure
(Optional) Specifies the speed for an interface to transmit at 10, 100, and 1000 Mbps (1 Gbps), where the
default is 1000 Mbps.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
112
Configuring Ethernet Interfaces
Specifying the Interface Address on an Interface
(Optional) Sets the router to signal within the specified time delay, when an interface should be up again,
where:
• up—Time delay before an interface should be up again.
You must wait for atleast 2 msec before bring the interface up again, this is to protect against link flaps.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
113
Configuring Ethernet Interfaces
Configuring Hot Standby Router Protocol
The maximum number of different HSRP groups that can be created on one physical interface is 4. If additional
groups are required, create 4 groups on the physical interface, and the remaining groups on the BDI or on
another physical interface.
The maximum number of HSRP or VRRP groups allowed are:
• RSP1A —128 HSRP or VRRP groups. 128 HSRP or VRRP groups restriction implies that the maximum
number of different interfaces that can be configured with VRRP or HSRP is 128. You cannot configure
HSRP or VRRP for more than 128 interfaces but you can configure upto 256 HSRP or VRRP groups in
those 128 interfaces.
• RSP1B —256 HSRP or VRRP groups
• RSP2A-64 and RSP2-128—128 HSRP or VRRP groups, prior to Cisco IOS Release XE 3.15S
• RSP2A-64 and RSP2-128 —256 HSRP or VRRP groups, starting Cisco IOS Release XE 3.15S
• RSP3-200 and RSP3-400—255 HSRP or VRRP groups, starting Cisco IOS Release XE 3.18.1SP
Note TCAM space utilization changes when HSRP groups are configured on the router. If HSRP groups are
configured the TCAM space is utilized. Each HSRP group takes 1 TCAM entry. The “Out of TCAM” message
may be displayed if total number of TCAM space used by HSRP groups and prefixes on the router exceeds
scale limit.
Restrictions
HSRPv2 is not supported.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
114
Configuring Ethernet Interfaces
Verifying HSRP
Verifying HSRP
To verify the HSRP information, use the show standby command in EXEC mode:
Increase Maximum MTU Cisco IOS XE Cupertino Maximum Transmission Unit (MTU) is increased to
Size 17.8.1 a maximum of 9670 bytes on the Cisco ASR 920
router. You can configure the MTU bytes using the
mtu bytes command.
The Cisco IOS software supports three different types of configurable maximum transmission unit (MTU)
options at different levels of the protocol stack:
• Interface MTU—The interface checks the MTU value of incoming traffic. Different interface types
support different interface MTU sizes and defaults. The interface MTU defines the maximum packet
size allowable (in bytes) for an interface before drops occur. If the frame is smaller than the interface
MTU size, but is not smaller than the minimum frame size for the interface type (such as 64 bytes for
Ethernet), then the frame continues to process.
• IP MTU—Can be specified on an interface. If an IP packet exceeds the IP MTU size, then the packet is
fragmented.
• Tag or Multiprotocol Label Switching (MPLS) MTU—Can be specified on an interface and allows up
to six different tag headers to be attached to a packet. The maximum number of tag headers (also referred
to as labels) depends on your Cisco IOS software release.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
115
Configuring Ethernet Interfaces
Interface MTU Configuration Guidelines
Note If the MTU interface configuration exceeds the maximum number of supported bytes, then the input errors
are incremented. For packets with maximum size, the counter does not support increment by using CLI as
the ASIC is unable to handle it. This is applicable on Cisco ASR 920-10SZ-PD (OD), ASR-920-8S4Z-PD,
ASR-920-12SZ-IM, ASR-920U-12SZ-IM, ASR-920-24SZ-IM, ASR-920-24SZ-M, and ASR-920-24TZ-M
routers.
Encapsulation methods and MPLS MTU labels add additional overhead to a packet. For example, Subnetwork
Access Protocol (SNAP) encapsulation adds an 8-byte header, dot1q encapsulation adds a 4-byte header, and
each MPLS label adds a 4-byte header (n labels x 4 bytes).
For the Gigabit Ethernet interface on the router, the default MTU size is 1500 bytes. The maximum configurable
MTU is 9216 bytes. The interface automatically adds an additional 22 bytes to the configured MTU size to
accommodate some of the additional overhead.
Limitations
• The giants and input errors field counts are not incremented for both 1G and 10G ports on Cisco ASR
920 platforms.
• In EtherLike-MIB, the dot3StatsFrameTooLongs frames count in SNMP increases when the frame
packet size is more than the default MTU.
• If the packet size is more than the configured MTU value and exceeds 1Mbps, packets are dropped.
Packets are fragmented when the packet size is more than the configured MTU value and when traffic
is lesser than 1Mbps.
• Due to hardware limitation on the Cisco ASR 920 router, ping is not supported with MTU size of greater
than 9215 bytes.
Note The default interface MTU size always accommodates a 1500-byte packet, plus 22 additional bytes to cover
the following additional overhead.
• An interface (without tagging applied), sends a maximum of 1522 bytes of data. Here the interface sends
1508 (Data) bytes + 14 (Layer 2 header) bytes = 1522 bytes.
• An interface (with tagging applied) sends bytes as follows:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
116
Configuring Ethernet Interfaces
Interface MTU Configuration Task
• dot1q tagging — Interface sends 1504 (Data) bytes + 14 (Layer 2 header) + 4 (dot1q encapsulation
header) bytes = 1522 bytes.
• double dot1q tagging — Interface sends 1500 (Data) bytes + 14 (Layer 2 header) + 8 (double dot1q
encapsulation header) bytes = 1522 bytes.
Note If you are using MPLS, ensure that the mpls mtu command is configured for a
value less than or equal to the interface MTU. This is not applicable on the RSP3
Module.
Command Purpose
To return to the default MTU size, use the no form of the command.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
117
Configuring Ethernet Interfaces
Configuring the Encapsulation Type
Note VLANs are only supported on Ethernet Virtual Connection (EVC) service instances and Trunk Ethernet Flow
Point (EFP) interfaces. For more information about how to configure these features, see the Configuring
Ethernet Virtual Connections document.
Enabling Autonegotiation
To enable autonegotiation on a Gigabit Ethernet interface, use the following command in interface configuration
mode:
Command Purpose
Disabling Autonegotiation
Autonegotiation is automatically enabled and can be disabled on Gigabit Ethernet interfaces . During
autonegotiation, advertisement for flow control, speed, and duplex occurs, depending on the media (fiber or
copper) in use.
Speed and duplex configurations can be advertised using autonegotiation. However, the only values that are
negotiated are:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
118
Configuring Ethernet Interfaces
Configuring Carrier Ethernet Features
• For Gigabit Ethernet interfaces using RJ-45 copper interfaces—1000 Mbps for speed and full-duplex
mode. Link speed is not negotiated when using fiber interfaces.
To disable autonegotiation, use the following command in interface configuration mode:
Command Purpose
Command Purpose
For information about managing your system image and configuration files, refer to the Cisco IOS Configuration
Fundamentals Configuration Guide and Cisco IOS Configuration Fundamentals Command Reference
publications that correspond to your Cisco IOS software release.
Command Purpose
To shut down an interface, use the following command in interface configuration mode:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
119
Configuring Ethernet Interfaces
Verifying the Interface Configuration
Command Purpose
Disables an interface.
Router(config-if)# shutdown
To enable traffic on an interface, use the following command in interface configuration mode:
Command Purpose
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
120
Configuring Ethernet Interfaces
Verifying Interface Status
Note The show interface transceiver command is not supported on the router.
To check or verify the status of an SFP Module or SFP+ Module, use the following show commands:
Command
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
121
Configuring Ethernet Interfaces
Verifying Interface Status
Following are sample output of several show commands for SFP Modules and SFP+ Modules.
The following show hw-module subslot command sample output is for SFP-GE-S:
The following show hw-module subslot command sample output is for CWDM 1490:
The following show hw-module subslot command sample output is for an SFP+ module:
Router# show
hw-module subslot 2/2 transceiver 9 idprom brief
IDPROM for transceiver TenGigabitEthernet0/0/9:
Description = SFP or SFP+ optics (type 3)
Transceiver Type: = SFP+ 10GBASE-SR (273)
Product Identifier (PID) = SFP-10G-SR
Vendor Revision = 1
Serial Number (SN) = JUS1803G2FT
Vendor Name = CISCO-JDSU
Vendor OUI (IEEE company ID) = 00.01.9C (412)
CLEI code = COUIA8NCAA
Cisco part number = 10-2415-03
Device State = Enabled.
Date code (yy/mm/dd) = 14/01/18
Connector type = LC.
Encoding = 4b5b
NRZ
Manchester
Nominal bitrate = (10300 Mbits/s)
Minimum bit rate as % of nominal bit rate = not specified
Maximum bit rate as % of nominal bit rate = not specified
The following show hw-module subslot command sample output is for an SFP+ module:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
122
Configuring Ethernet Interfaces
Configuring LAN/WAN-PHY Controllers
Note VID for optics that are displayed in show inventory command and vendor revision that is shown in idprom
detail command output are stored in different places in Idprom.
Note WAN-PHY Mode is not currently supported on the Cisco ASR 920 Series Router.
Procedure
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
123
Configuring Ethernet Interfaces
Configuring the LAN-PHY Mode
Displays the configuration mode of the LAN/WAN-PHY controller. By default, prior to configuration of the
LAN-PHY mode, the controller operates in the WAN-PHY mode.
Configures the LAN PHY mode for the 1-Port 10-Gigabit Ethernet LAN/WAN PHY SPA.
Step 4 exit
Example:
Router(config)# exit
Displays the configuration mode for the LAN/WAN-PHY controller. The example shows the mode of operation
as LAN mode for the 1-Port 10-Gigabit Ethernet LAN/WAN PHY SPA.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
124
Configuring Ethernet Interfaces
Configuring WAN-PHY Signal Failure and Signal Degrade Bit Error Rates
Configuring WAN-PHY Signal Failure and Signal Degrade Bit Error Rates
Note WAN-PHY Mode is not supported on the Cisco ASR 920 Series Router.
This section describes how to configure WAN-PHY Signal Failure (SF) and Signal Degrade (SD) Bit Error
Rate (BER) reporting and thresholds.
A Signal Failure (SF) alarm is declared if the line bit error (B2) rate exceeds a user-provisioned threshold
range (over the range of 10e-3 to 10e-9).
A Signal Degrade (SD) alarm is declared if the line bit error (B2) rate exceeds a user-provisioned threshold
range (over the range of 10e-3 to 10e-9). If the B2 errors cross the SD threshold, a warning of link quality
degradation is triggered. The WAN-PHY alarms are required for some users who are upgrading their Layer
2 core network from a SONET ring to a 10-Gigabit Ethernet ring.
Note The controller must be in the WAN-PHY mode prior to configuring the SF and SD BER reporting and
thresholds.
Configuration Examples
This section includes the following configuration examples:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
125
Configuring Ethernet Interfaces
MTU Configuration
MTU Configuration
The following example shows how to set the MTU interface to 9216 bytes.
Note The interface automatically adds an additional 38 bytes to the configured MTU interface size.
VLAN Encapsulation
The following example shows how to configure the interface port 2 (the third port), and configure the first
interface on the VLAN with the ID number 268, using IEEE 802.1Q encapsulation:
VLANs are only supported on EVC service instances and Trunk EFP interfaces. For more information about
how to configure these features, see the see the Carrier Ethernet Configuration Guide, Cisco IOS XE Release
3S.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
126
CHAPTER 14
Configuring Optical Interface Modules
This chapter describes the most common configurations for optical interface modules on the Cisco ASR 920
Series Routers.
• Limitations and Restrictions, on page 127
• Managing Interface Naming, on page 128
• Setting the Card Type, on page 129
• Configuring the Controller, on page 129
• Configuring SDH, on page 130
• Configuring SONET Mode, on page 137
• Configuring a CEM group, on page 141
• Configuring DS3 Clear Channel on OC-3 and OC-12 Interface Module, on page 144
• Optional Configurations, on page 148
• Configuring Multilink Point-to-Point Protocol, on page 152
• Configuring BERT, on page 156
• Configuring Automatic Protection Switching, on page 156
• Verifying Interface Configuration, on page 156
• Troubleshooting, on page 156
• Configuration Examples, on page 161
• Additional Resources, on page 162
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
127
Configuring Optical Interface Modules
Managing Interface Naming
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
128
Configuring Optical Interface Modules
Setting the Card Type
For example, if the optical interface module is installed in slot 0 of the chassis, the controller configuration
address is specified as controller sonet 0/1/0.
For channelized configuration, the interface address format is: slot/subslot/port:channel-group, where:
• channel-group—Specifies the logical channel group assigned to the time slots within the T1 link.
Procedure
Step 3 exit
Example:
Router(config)# exit
Exits configuration mode and returns to the EXEC command interpreter prompt.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
129
Configuring Optical Interface Modules
Configuring SDH
Command Purp
Configuring SDH
The following sections describe how to configure SDH on the optical interface module:
Procedure
Step 2 aug mapping {au-4} Configures AUG mapping for SDH framing.
Example:
Step 3 clock source {internal | line} Sets the clock source, where:
Example: • internal—Specifies that the internal clock
source is used.
Router(config-controller)# clock source
line • line—Specifies that the network clock
source is used. This is the default for T1
and E1.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
130
Configuring Optical Interface Modules
SDH T1 Mode
Step 5 In SDH framing in AU-4 mode: (Optional) Configures mode of operation for
AU-3 or AU-4 mode, where:
Example:
mode {c-11 | c-12 | t3 | e3} C-11 and C-12 are container level-n (SDH)
channelized T3s. They are types of T3 channels
Example: that are subdivided into 28 T1 channels.
• c-11—Specifies an AU-3/AU-4 TUG-3
Router(config-ctrlr-tug3)# mode {c-11
divided into seven TUG-2s. Each TUG-2
| c-12 | t3 | e3}
is then divided into four TU11s, each
carrying a C-11 T1.
• c-12—Specifies an AU-3/AU-4 TUG-3
divided into seven TUG-2. Each TUG-2
is then divided into three TU12s, each
carrying a C-12 E1.
• t3—Specifies an AU-3/AU-4 TUG-3
carrying an unchannelized (clear channel)
T3.
• e3—Specifies an AU-3/AU-4 TUG-3
carrying an unchannelized (clear channel)
E3.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
131
Configuring Optical Interface Modules
SDH T1 Mode
Router(config-ctrlr-tug3)# tug-2 1 e1 1
cem-group 1 timeslots 1-31
Example:
IMA Group
tug-2 1 e1 1 ima-group 1
Example:
Router(config-ctrlr-tug3)# tug-2 1 e1 1
ima-group 1
Example:
Channel Group
tug-2 1 e1 1 [[channel-group
channel-group-number] [timeslots
list-of-timeslots]]
Example:
Router(config-ctrlr-tug3)# tug-2 1 e1
1 channel-group 1 timeslots 1-31]
Router(config-controller)# exit
Router(config-controller)# controller
t1 0/1/1/0/0/0
Router(config-ctrlr)# t1 cem-group 1
timeslots 1-24
Clear-Channel ATM
Router(config-ctrlr-tug3)# e1 1 atm
IMA Group
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
132
Configuring Optical Interface Modules
SDH T1 Mode
Router(config-ctrlr-tug3)# e1 1
ima-group 1
Channel Group
Router(config-ctrlr)# t1 2
channel-group 4 [[channel-group
channel-group-number] [timeslots
list-of-timeslots]]
What to do next
Example
The example configures SDH E1 mode:
SDH T1 Mode
To configure SDH T1 mode, complete the following steps:
Procedure
Step 2 aug mapping {au-3} Configures AUG mapping for SDH framing.
Example: Supports au-3 and au-4 aug mapping. The
default setting is au-3.
Router(config-controller)# aug mapping
au-3
Step 3 clock source {internal | line} Sets the clock source, where:
Example: • internal—Specifies that the internal clock
source is used.
Router(config-controller)# clock source
line •l
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
133
Configuring Optical Interface Modules
SDH T1 Mode
Step 5 In SDH framing in AU-3 mode: (Optional) Configures mode of operation for
AU-3 or AU-4 mode, where:
Example:
mode {c-11 | c-12 | t3 | e3} C-11 and C-12 are container level-n (SDH)
channelized T3s. They are types of T3 channels
Example: that are subdivided into 28 T1 channels.
• c-11—Specifies an AU-3/AU-4 TUG-3
Router(config-ctrlr-au3)# mode {c-11
divided into seven TUG-2s. Each TUG-2
| c-12 | t3 | e3}
is then divided into four TU11s, each
carrying a C-11 T1.
• c-12—Specifies an AU-3/AU-4 TUG-3
divided into seven TUG-2. Each TUG-2
is then divided into three TU12s, each
carrying a C-12 E1.
• t3—Specifies an AU-3/AU-4 TUG-3
carrying an unchannelized (clear channel)
T3.
• e3—Specifies an AU-3/AU-4 TUG-3
carrying an unchannelized (clear channel)
E3.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
134
Configuring Optical Interface Modules
SDH T1 Mode
Router(config-ctrlr-au3)# tug-2 1 t1 1
cem-group 1 timeslots 1-31
Example:
IMA Group
tug-2 1 t1 1 ima-group 1
Example:
Router(config-ctrlr-au3)# tug-2 1 t1 1
ima-group 1
Example:
Channel Group
tug-2 1 e1 1 [[channel-group
channel-group-number] [timeslots
list-of-timeslots]]
Example:
Router(config-ctrlr-tug3)# tug-2 1 t1
1 channel-group 0 timeslots 1-31
Router(config-controller)# exit
Router(config-controller)# controller
t1 0/1/1/0/0/0
Router(config-ctrlr)# t1 cem-group 1
timeslots 1-24
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
135
Configuring Optical Interface Modules
Configuring SDH in POS Mode
Router(config-ctrlr-tug3)# e1 1 atm
IMA Group
Router(config-ctrlr-tug3)# e1 1
ima-group 1
Channel Group
Router(config-ctrlr)# t1 2
channel-group 4 [[channel-group
channel-group-number] [timeslots
list-of-timeslots]]
What to do next
The example configures SDH T1 mode:
For information about configuring optional features, see Optional Configurations, on page 148.
Procedure
Example:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
136
Configuring Optical Interface Modules
Configuring SONET Mode
Step 4 au-4 au-4-number pos Selects the AU-4 to be configured in POS mode
with SDH framing. The command creates a POS
Example:
interface, such as POS0/1/0:1. In OC-3 mode,
the value is 1; in OC-12 mode, valid values are
Router(config-controller)# au-4 1 pos 1-4.
Router(config-controller)# end
Procedure
Router(config-controller)# framing
sonet
Step 3 clock source {line | internal} Specifies the clock source for the POS link,
where:
Example:
• line—The link uses the recovered clock
Router(config-if)# clock source line from the line. This is the default setting.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
137
Configuring Optical Interface Modules
Configuring SONET Mode
Router(config-if)# end
What to do next
The below example shows the configuration for the DS1 T1 serial interface:
For information on optional SONET configurations, see Optional Configurations, on page 148. For information
on optional ATM, IMA, POS and Serial interface configuration, see Optional Configurations, on page 148.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
138
Configuring Optical Interface Modules
Configuring SONET POS Mode
For information about configuring optional features, see Optional Packet over SONET Configurations, on
page 150
Procedure
Router(config-controller)# framing
sonet
Step 3 clock source {line | internal} Specifies the clock source for the POS link,
where:
Example:
• line—The link uses the recovered clock
Router(config-controller)# clock source from the line. This is the default setting.
line
• internal—The link uses the internal clock
source.
Step 4 sts-1 {1- 12 | 1 - 3 | 4 - 6 | 7 - 9 | 10 - 12} pos Specifies POS mode; starting-number and
ending-number arguments indicate the starting
Example:
and ending STS value of the POS interface. For
OC-3 interfaces, this value is 1.
Router(config-controller)# sts-1 1 -
3 pos Note The 1-12 value is supported only
in OC-12 mode.
Router(config-controller# exit
Step 6 Do one of the following: Use any of the following commands to access
the POS interface.
• interface POS slot/subslot/port
•
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
139
Configuring Optical Interface Modules
Configuring SONET POS Mode
interface 0/1/1
Example:
interface 0/1/1.1
Example:
interface 0/1/1:1
Step 7 encapsulation encapsulation-type {hdlc | ppp} Configures encapsulation; you can configure
the following options:
Example:
• hdlc—Serial HDLC. This is the default
Router(config-if)# encapsulation for synchronous serial interfaces.
hdlc
• ppp—Point-to-Point Protocol (for serial
interface).
Router(config-if)# end
What to do next
Example
For information on optional SONET configurations, see Configuring SONET POS Mode, on page 139.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
140
Configuring Optical Interface Modules
Configuring a CEM group
Procedure
Step 3 controller sonet slot/bay/port Selects the controller to configure and enters
controller configuration mode, where:
Example:
• slot/bay/port—Specifies the location of
Router(config)# controller sonet 0/1/1 the interface.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
141
Configuring Optical Interface Modules
Configuring CEM Group in SDH Mode
Example:
Router(config-ctrlr-sts1-3)# vtg 1 t1 1
cem-group 1 timeslots 1-10
What to do next
Example
The example shows a CEM interface configuration:
Procedure
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
142
Configuring Optical Interface Modules
Configuring CEM Group in SDH Mode
Step 3 controller sonet slot/bay/port Selects the controller to configure and enters
controller configuration mode, where:
Example:
• slot/bay/port—Specifies the location of
Router(config)# controller sonet 0/1/0 the interface.
Note The slot number is always 1 and
the bay number is always 0.
Step 5 au-4 au-4# tug-3 tug-3# Configures AU-4, and tributary unit groups,
type 3 (TUG-3) for AU-4 and enters specific
Example:
configuration mode.
Router(config-controller)# au-4 1 tug-3 In SDH framing mode, each TUG-3, and AU-4
1 can be configured with one of these commands.
Depending on currently configured AUG
mapping setting, this command further specifies
TUG-3, or AU-4 muxing. The CLI command
parser enters into config-ctrlr-tug3 (SDH mode)
or config-ctrlr-au3 (SDH mode), which makes
only relevant commands visible.
• au-4#—Range is from 1 to 4. For OC-3
mode, the value is 1.
Note DS3 configuration is supported
only on AuU-4.
• tug-3#—Range is from 1 to 3.
Note T1 can only be configured in au-3
mode, E1 can only be configured
in the au-4 mode.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
143
Configuring Optical Interface Modules
Configuring DS3 Clear Channel on OC-3 and OC-12 Interface Module
Router(config-ctrlr-tug3)# end
What to do next
Example
Procedure
enable
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
144
Configuring Optical Interface Modules
Configuring DS3 Clear Channel in SONET Mode
Step 5 clock source {line | internal} Specifies the clock source for the POS link,
where:
Example:
• line—The link uses the recovered clock
Router(config-if)# clock source from the line. This is the default setting.
internal
• internal—The link uses the internal clock
source.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
145
Configuring Optical Interface Modules
Configuring DS3 Clear Channel in SDH Mode
What to do next
Example
The below example shows the configuration for a DS3 interface:
Configuration Example
Procedure
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
146
Configuring Optical Interface Modules
Configuring DS3 Clear Channel in SDH Mode
Step 3 controller sonet slot/bay/port Selects the controller to configure and enters
controller configuration mode, where:
Example:
• slot/bay/port—Specifies the location of
Router(config)# controller sdh 0/1/0 the interface.
Note The slot number is always 1 and
the bay number is always 0.
Step 5 clock source {line | internal} Specifies the clock source for the POS link,
where:
Example:
• line—The link uses the recovered clock
Router(config-controller)# clock from the line. This is the default setting.
source line • internal—The link uses the internal clock
source.
Step 6 aug mapping au-4 Configures AUG mapping for SDH framing.
Example: If the AUG mapping is configured to be AU-4,
then the following muxing, alignment, and
Router(config-controller)# aug mapping mapping will be used:
au-4
TUG-3 <--> VC-4 <--> AU-4 <--> AUG.
Step 7 au-4 au-4# tug-3 tug-3# Configures AU-4, and tributary unit groups,
type 3 (TUG-3) for AU-4 and enters specific
Example:
configuration mode.
Router(config-controller)# au-4 1 tug-3 In SDH framing mode TUG-3, and AU-4 can
1 be configured with one of these commands.
Depending on currently configured AUG
mapping setting, this command further
specifies TUG-3, or AU-4 muxing. The CLI
command parser enters into config-ctrlr-tug3
(SDH mode) or config-ctrlr-au3 (SDH mode),
which makes only relevant commands visible.
• au-4#—Range is from 1 to 4. For OC-3
mode, the value is 1.
• tug-3#—Range is from 1 to 3.
Note E1 can only be configured in the
AU-4 mode.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
147
Configuring Optical Interface Modules
Optional Configurations
What to do next
Example
Optional Configurations
There are several standard, but optional, configurations that might be necessary to complete the configuration
of your interface module.
Note Configure national bit 1 only when required for interoperability with your telephone company.
To set the national bit in the G.751 frame, use the following commands:
Command Purpose
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
148
Configuring Optical Interface Modules
Verifying the National Bit
Command Purpose
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
149
Configuring Optical Interface Modules
Optional Packet over SONET Configurations
To set the length of the cyclic redundancy check (CRC) on a T1 interface, use these commands:
Procedure
Step 2 crc {16 | 32} Selects the CRC size in bits, where:
Example: • 16—16-bit CRC. This is the default.
• 32—32-bit CRC.
Router(config-if)# crc 16
Encapsulation
encapsulation encapsulation-type Configures encapsulation; you can configure the following
options:
Router(config-if)# encapsulation hdlc • HDLC
• PPP
MTU Value
mtu bytes Configures the maximum packet size for an interface in bytes. The default
packet size is 4470 bytes.
Router(config-if)# mtu 4000
CRC Value
crc size-in-bits CRC size in bits. Valid values are 16 and 32. The
default is 16.
Router(config-if)# crc 32
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
150
Configuring Optical Interface Modules
Keepalive Value
Keepalive Value
keepalive [period [retries]] Specifies the frequency at which the Cisco IOS software sends messages to
the other end of the line to ensure that a network interface is alive, where:
Router(config-if)#
• period—Specifies the time interval in seconds for sending keepalive
keepalive 9 4
packets. The default is 10 seconds.
• retries—Specifies the number of times that the device continues to send
keepalive packets without response before bringing the interface down.
The default is 3 retries.
Bandwidth
Use the following command to configure the bandwidth of a POS interface.
bandwidth {kbps | inherit [kbps]} To set and communicate the current bandwidth value
for an interface to higher-level protocols, use the
bandwidth command in interface configuration
mode.Valid values are from 1 to 10000000. You can
apply the following keywords:
• inherit —Specifies how a subinterface inherits
the bandwidth of its main interface.
• receive—Specifies the receive-side bandwidth.
Scrambling
Use the following command to enable scrambling on a POS interface.
C2 Flag
Use the following command to configure the C2 flag on a POS interface.
pos flag c2 Specifies the C2 byte field for the interface as defined in RFC 2615. Valid values are 0-255.
value
J1 Flag
Use the following command to configure the J1 flag on a POS interface.
pos flag j1 message Specifies the value of the J1 byte in the SONET Path OverHead (POH) column.
word
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
151
Configuring Optical Interface Modules
Configuring Multilink Point-to-Point Protocol
Procedure
Step 3 ip address address mask Sets the IP address for the multilink group,
where:
Example:
• address—The IP address.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
152
Configuring Optical Interface Modules
Assigning an Interface to a Multilink Bundle
Procedure
Step 2 interface serial slot/subslot/port Selects the interface to configure and enters
interface configuration mode, where:
Example:
• slot/subslot/port —Specifies the location
Router(config)# interface serial of the controller.
0/1/1.1/1/1/1:0
Step 4 ppp multilink group group-number Assigns the interface to a multilink bundle,
where:
Example:
• group-number—The multilink group
Router(config-if)# ppp multilink group number for the T1 or E1 bundle.
1
Step 5 end
What to do next
Note Repeat these commands for each interface you want to assign to the multilink bundle
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
153
Configuring Optical Interface Modules
Configuring Fragmentation Size and Delay on an MLPPP Bundle
Procedure
Step 3 ppp multilink fragment size fragment-size Sets the fragmentation size in bytes.
Fragmentation is disabled by default. Valid
Example:
values are 42 to 65535 bytes.
Router(config-if)# ppp multilink
fragment size 512
Step 4 ppp multilink fragment-delay delay Sets the configured delay on the multilink
bundle that satisfies the fragmentation size,
Example:
where:
Router(config-if)# ppp multilink • delay —Delay in milliseconds.
fragment-delay 20
What to do next
The following example of the show ppp multilink command shows the MLPPP type and the fragmentation
size:
Router#
show ppp multilink
Multilink1, bundle name is test2
Bundle up for 00:00:13
Bundle is Distributed
0 lost fragments,
0 reordered, 0 unassigned
0 discarded, 0 lost received, 206/255 load
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
154
Configuring Optical Interface Modules
Changing the Default Endpoint Discriminator
Command Purpose
Procedure
Step 2 interface multilink group-number Specifies the multilink interface and enters
multilink interface mode, where:
Example:
• group-number—The group number for the
Router(config)# interface multilink multilink bundle. Range 1-2147483647
1
ppp multilink
Router(config-if)#
fragment disable
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
155
Configuring Optical Interface Modules
Configuring BERT
Configuring BERT
BERT (Bit-Error Rate Testing) is used for analyzing quality and for problem resolution of digital transmission
equipment. BERT tests the quality of an interface by directly comparing a pseudorandom or repetitive test
pattern with an identical locally generated test pattern.
The BERT operation is data-intensive. Regular data cannot flow on the path while the test is in progress. The
path is reported to be in alarm state when BERT is in progress and restored to a normal state after BERT has
been terminated.
The supported BERT patterns are 2^15, 2^23, all 0s and all 1s.
Troubleshooting
You can use the following commands to verify your configuration:
• show cem circuit—shows information about the circuit state, administrative state, the CEM ID of the
circuit, and the interface on which it is configured. If xconnect is configured under the circuit, the
command output also includes information about the attached circuit.
• show cem circuit 0-504—Displays the detailed information about that particular circuit.
• show cem circuit summary—Displays the number of circuits which are up or down per interface basis.
• show controller sonet x/y/z—Displays the alarm information.
• show hw-module subslot transceiver—Displays information about the optical transceiver.
• show mpls l2transport vc—Displays the state of local and peer access circuits.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
156
Configuring Optical Interface Modules
Troubleshooting
To provide information about system processes, the Cisco IOS software includes an extensive list of EXEC
commands that begin with the word show, which, when executed, display detailed tables of system information.
Following is a list of some of the common show commands for the APS feature.
To display the information described, use these commands in privileged EXEC mode.
Command or Action
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
157
Configuring Optical Interface Modules
Framing and Encapsulation Configuration Example
For examples of the show commands here, see the Cisco IOS Interface and Hardware Component Command
Reference.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
158
Configuring Optical Interface Modules
CRC Configuration Example
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
159
Configuring Optical Interface Modules
MFR Configuration Example
!
! Enable Multilink PPP
!
Router(config-if)# ppp multilink
!
! Leave interface multilink configuration mode
!
Router(config-if)# exit
!
! Specify the interface to assign to the multilink bundle
!
Router(config)# interface serial 0/1/0:1
!
! Enable PPP encapsulation on the interface
!
Router(config-if)# encapsulation PPP
!
! Assign the interface to a multilink bundle
!
Router(config-if)# multilink-group 1
!
! Enable Multilink PPP
!
Router(config-if)# ppp multilink
!
! Exit interface configuration mode
!
Router(config-if)# exit
!
! Exit global configuration mode
!
Router(config)# exit
Router#
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
160
Configuring Optical Interface Modules
Configuration Examples
Router(config-if)#
frame-relay multilink lid test
!
! Configures the interval at which the interface will send out hello messages
!
Router(config-if)# frame-relay multilink hello 15
!
! Configures the number of seconds the interface will wait for a hello message acknowledgement
before resending the hello message
!
Router(config-if)# frame-relay multilink ack 6
!
! Configures the maximum number of times the interface will resend a hello message while
waiting for an acknowledgement
!
Router(config-if)# frame-relay multilink retry 5
!
! Exit interface configuration mode and return to global configuration mode
!
Router(config-if)# exit
!
! Exit global configuration mode
!
Router(config)# exit
Configuration Examples
This section includes the following configuration examples:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
161
Configuring Optical Interface Modules
Example of Invert Data on T1/E1 Interface
Additional Resources
For more information about configuring ATM, see
• Asynchronous Transfer Mode Configuration Guide, (Cisco ASR 920 Series)
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
162
CHAPTER 15
Enabling Support for Tunable DWDM-XFP-C
The dense wavelength-division multiplexing (DWDM) wavelengths of the DWDM-XFP-C module on the
router is tunable. You can configure the DWDM ITU wavelengths using the itu channel command in the
interface configuration mode. The itu channel command ensures that the traffic continues to flow.
For more information, see the Cisco ASR 920 Series Aggregation Services Routers Optics Matrix at
https://www.cisco.com/c/dam/en/us/td/docs/routers/asr920/compatibility/matrix/Optics-Matrix-ASR920.pdf
Table 13: DWDM-XFP-C Wavelength Mapping, on page 163 contains the wavelength mapping information
for the DWDM-XFP-C module.
1 1561.79 191.95
2 1561.46 192
3 1560.98 192.05
4 1560.65 192.1
5 1560.17 192.15
6 1559.83 192.2
7 1559.35 192.25
8 1559.02 192.3
9 1558.54 192.35
10 1558.21 192.4
11 1557.73 192.45
12 1557.4 192.5
13 1556.92 192.55
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
163
Enabling Support for Tunable DWDM-XFP-C
14 1556.59 192.6
15 1556.11 192.65
16 1555.79 192.7
17 1555.31 192.75
18 1554.98 192.8
19 1554.4 192.85
20 1554.17 192.9
21 1553.7 192.95
22 1553.37 193
23 1552.89 193.05
24 1552.57 193.1
25 1552.09 193.15
26 1551.76 193.2
27 1551.28 193.25
28 1550.96 193.3
29 1550.48 193.35
30 1550.16 193.4
31 1549.68 193.45
32 1549.35 193.5
33 1548.88 193.55
34 1548.55 193.6
35 1548.08 193.65
36 1548.75 193.7
37 1546.95 193.75
38 1546.95 193.8
39 1546.48 193.85
40 1546.16 193.9
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
164
Enabling Support for Tunable DWDM-XFP-C
41 1545.69 193.95
42 1545.36 194
43 1544.89 194.05
44 1544.56 194.1
45 1544.09 194.15
46 1543.77 194.2
47 1543.3 194.25
48 1542.97 194.3
49 1542.5 194.35
50 1542.18 194.4
51 1541.71 194.45
52 1541.39 194.5
53 1540.92 194.55
54 1540.6 194.6
55 1540.13 194.65
56 1539.8 194.7
57 1539.34 194.75
58 1539.01 194.8
59 1538.55 194.85
60 1538.22 194.9
61 1537.76 194.95
62 1537.43 195
63 1536.97 195.05
64 1536.65 195.1
65 1536.18 195.15
66 1535.86 195.2
67 1535.396 195.25
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
165
Enabling Support for Tunable DWDM-XFP-C
Configuring the DWDM-XFP-C Module
68 1535.07 195.3
69 1534.61 195.35
70 1534.29 195.4
71 1533.82 195.45
72 1533.5 195.5
73 1533.04 195.55
74 1532.72 195.6
75 1532.26 195.65
76 1531.94 195.7
77 1531.48 195.75
78 1531.14 195.8
79 1530.69 195.85
80 1530.37 195.9
81 1529.91 195.95
82 1529.59 196
Procedure
Router# enable
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
166
Enabling Support for Tunable DWDM-XFP-C
Verifying the ITU Configuration
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
167
Enabling Support for Tunable DWDM-XFP-C
Verifying the ITU Configuration
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
168
CHAPTER 16
Dying Gasp Support for Loss of Power Supply
Through SNMP, Syslog and Ethernet OAM
Dying Gasp — One of the following unrecoverable condition has occurred:
• Power failure or removal of power supply cable
This type of condition is vendor specific. An Ethernet Operations, Administration, and Maintenance (OAM)
notification about the condition may be sent immediately.
This document describes the Dying Gasp feature which is used to send dying gasp messsages through SNMP,
syslog, or Ethernet Operation, Administration, and Maintenance (OAM) to report the abrupt loss of power to
the host platform.
The SNMP server for the SNMP Dying-Gasp message is specified through the snmp-server host configuration
command. The Ethernet-OAM Dying-Gasp packets are created for interfaces where Ethernet-OAM is enabled.
SNMP Dying Gasp Cisco IOS XE Bengaluru This feature enables FPGA based effective space
Enhancement 17.5.1 utilization between Ethernet OAM and SNMP. Use
the platform-oam-snmp-dg-enable command
on Cisco router to configure this feature.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
169
Dying Gasp Support for Loss of Power Supply Through SNMP, Syslog and Ethernet OAM
Prerequisites for Dying Gasp Support
The maximum number of supported Link-OAM Dying Gasp servers is six. This is chosen dynamically
and cannot be configured manually. This is applicable only to the Cisco IOS XE 16.9.4 and Cisco IOS
XE 16.9.5 releases.
• Dying Gasp is not supported on default Mgmt-interface for the following routers:
• Cisco ASR-920-24SZ-IM
• Cisco ASR-920-24SZ-M
• Cisco ASR-920-24TZ-M
• Cisco ASR 920-10SZ-PD and ASR-920-8S4Z-PD
• Cisco ASR-920-4SZ
• Cisco ASR-920-12CZ-A
• Cisco ASR-920-12CZ-D
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
170
Dying Gasp Support for Loss of Power Supply Through SNMP, Syslog and Ethernet OAM
Configuring SNMP Dying Gasp
• The SNMP Dying GASP for Cisco ASR-920-4SZ-A, Cisco ASR-920-4SZ-D, Cisco ASR-920-12CZ-A,
Cisco ASR-920-12CZ-D, and Cisco ASR-920-10SZ-PD routers is not supported for Netflow video
template in Cisco IOS-XE 16.9.x release. This is because the routers use different and lower FPGA
versions than the supported version (0x00040036 and higher).
• Dying GASP is not supported on the following routers for HW-based SNMP:
• Cisco ASR-920-12SZ-A
• Cisco ASR-920-12SZ-D
• Cisco ASR-920-12SZ-IM
• Effective Cisco IOS XE Bengaluru 17.5.1, you can configure 2 SNMP DG sessions and 6OAM sessions
using the platform oam-snmp-dg enable command on the following variants:
• Cisco ASR-920-24SZ-IM
Cisco ASR-920-24SZ-M and
Cisco ASR-920-24TZ-M .
• However, you can configure upto 20 OAM sessions by default, without configuring the platform
oam-snmp-dg enable command.
• You can configure 5 SNMP DG sessions on the following variants:
• Cisco ASR 920-10SZ-PD
• Cisco ASR-920-12CZ-A/ASR-920-12CZ-D
• Cisco ASR-920-4SZ-A/ASR-920-4SZ-D
•
Note The platform oam-snmp-dg enable command is not supported on the
above variants.
• You can configure SNMP Dying Gasp Sessions on all SNMP Versions.
Procedure
Device> enable
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
171
Dying Gasp Support for Loss of Power Supply Through SNMP, Syslog and Ethernet OAM
Example: Configuring SNMP Dying Gasp on a Router
Device(config)# end
Router> enable
Router# configure terminal
Router(config)# snmp-server community public RW
Router(config)# exit
For more information on command syntax and examples, refer to the Cisco IOS Network Management
Command Reference.
Router> enable
Router# configure terminal
Router(config)# snmp-server host X.X.X.XXX vrf vrf1 version 2c public udp-port 9800
Router(config)# exit
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
172
Dying Gasp Support for Loss of Power Supply Through SNMP, Syslog and Ethernet OAM
Dying Gasp Trap Support for Different SNMP Server Host/Port Configurations
For more information on command syntax and examples, refer to the Cisco IOS Network Management
Command Reference.
Note You can configure up to five different SNMP server host/port configurations.
Router(config)#
Router(config)# snmp-server host 7.0.0.152 vrf vrf1 version 2c public udp-port 9988
Router(config)# snmp-server host 7.0.0.166 vrf vrf1 version 2c public udp-port 9800
Router(config)#
Router(config)# ^Z
Router#
After performing a power cycle, the following output is displayed on the router console:
Router#
Press ESCAPE for boot options
NVRAM: OK
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
173
Dying Gasp Support for Loss of Power Supply Through SNMP, Syslog and Ethernet OAM
Message Displayed on the Peer Router on Receiving Dying Gasp Notification
=======================================
Dying Gasp Trap Received for the Power failure event:
-----------------------------------------------------
Trap on Host1
++++++++++++++
snmp-server host = 7.0.0.149 (nms1-lnx) and SR_TRAP_TEST_PORT=6264
/auto/sw/packages/snmpr/15.4.1.9/bin> /auto/sw/packages/snmpr/15.4.1.9/bin/traprcv
Waiting for traps.
Received SNMPv2c Trap:
Community: public
From: 7.29.25.101
snmpTrapOID.0 = ciscoMgmt.305.1.3.5.0.2
ciscoMgmt.305.1.3.6 = Dying Gasp - Shutdown due to power loss
--------------------------------------------------------------------
Trap on Host2
+++++++++++++
snmp-server host = 7.0.0.152 (nms2-lnx) and SR_TRAP_TEST_PORT=9988
/auto/sw/packages/snmpr/15.4.1.9/bin> /auto/sw/packages/snmpr/15.4.1.9/bin/traprcv
Waiting for traps.
Received SNMPv2c Trap:
Community: public
From: 7.29.25.101
snmpTrapOID.0 = ciscoMgmt.305.1.3.5.0.2
ciscoMgmt.305.1.3.6 = Dying Gasp - Shutdown due to power loss
--------------------------------------------------------------
Trap on Host3
++++++++++++++
snmp-server host = 7.0.0.166 (erbusnmp-dc-lnx) and SR_TRAP_TEST_PORT=9800
/auto/sw/packages/snmpr/15.4.1.9/bin> /auto/sw/packages/snmpr/15.4.1.9/bin/traprcv
Waiting for traps.
Received SNMPv2c Trap:
Community: public
From: 7.29.25.101
snmpTrapOID.0 = ciscoMgmt.305.1.3.5.0.2
ciscoMgmt.305.1.3.6 = Dying Gasp - Shutdown due to power loss
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
174
CHAPTER 17
Configuring Pseudowire
This chapter provides information about configuring pseudowire features on the Cisco ASR 920 Series Router.
• Pseudowire Overview, on page 175
• CEM Configuration, on page 176
• CEM Configuration Guidelines and Restrictions, on page 176
• Configuring a CEM Group, on page 177
• Using CEM Classes , on page 178
• Configuring CEM Parameters, on page 179
• Configuring Structure-Agnostic TDM over Packet (SAToP), on page 181
• Configuring Circuit Emulation Service over Packet-Switched Network (CESoPSN), on page 182
• Configuring an Ethernet over MPLS Pseudowire, on page 184
• Configuring Pseudowire Redundancy, on page 185
• Sample Configurations, on page 187
Pseudowire Overview
Effective Cisco IOS-XE Release 3.18S:
• BGP PIC with TDM Pseudowire is supported on the ASR 920 routers with RSP2 modules.
• BGP PIC for Pseudowires, with MPLS Traffic Engineering is supported on the ASR 920 router with
RSP2 modules.
The following sections provide an overview of pseudowire support on the Cisco ASR 920 Series Router.
Limitations
If you are running Cisco IOS-XE Release 3.17S and later releases, the following limitations apply:
• Channel associated signaling (CAS) is not supported on the T1/E1 and OC-3 interface modules.
• BGP PIC is not supported for MPLS/LDP over MLPPP and POS in the core.
• BGP PIC is not supported for Multi-segment Pseudowire or Pseudowire switching.
• BGP PIC is not supported for VPLS and H-VPLS.
• BGP PIC is not supported for IPv6.
• If BGP PIC is enabled, Multi-hop BFD should not be configured using the bfd neighbor fall-over bfd
command.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
175
Configuring Pseudowire
Transportation of Service Using Ethernet over MPLS
• If BGP PIC is enabled, neighbor ip-address weight weight command should not be configured.
• If BGP PIC is enabled, bgp nexthop trigger delay 6 under the address-family ipv4 command and bgp
nexthop trigger delay 7 under the address-family vpnv4 command should be configured. For information
on the configuration examples for BGP PIC–TDM, see Example: BGP PIC with TDM-PW Configuration.
• If BGP PIC is enabled and the targeted LDP for VPWS Xconnect services are established over BGP,
perform the following tasks:
• Configure Pseudowire-class (pw-class) with encapsulation “mpls”.
• Configure no status control-plane route-watch under the pw-class.
• Associate the pw-class with the VPWS xconnect configurations.
If you are running Cisco IOS-XE 3.18S, the following restrictions apply for BGP PIC with MPLS TE for
TDM Pseudowire:
• MPLS TE over MLPPP and POS in the core is not supported.
• Co-existence of BGP PIC with MPLS Traffic Engineering Fast Reroute (MPLS TE FRR) is not supported.
CEM Configuration
CEM provides a bridge between a time-division multiplexing (TDM) network and a packet network, such as
Multiprotocol Label Switching (MPLS). The router encapsulates the TDM data in the MPLS packets and
sends the data over a CEM pseudowire to the remote provider edge (PE) router. Thus, function as a physical
communication link across the packet network.
Note Steps for configuring CEM features are also included in the Configuring Structure-Agnostic TDM over Packet
(SAToP) and Configuring Circuit Emulation Service over Packet-Switched Network (CESoPSN), on page
182 sections.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
176
Configuring Pseudowire
Configuring a CEM Group
Procedure
Router> enable
Step 4 cem-group group-number {unframed | Creates a circuit emulation channel from one
timeslots timeslot} or more time slots of a T1 or E1 line.
Example: • The group-number keyword identifies
Router(config-controller)# the channel number to be used for this
cem-group 6 timeslots 1-4,9,10 channel. For T1 ports, the range is 0 to 23.
For E1 ports, the range is 0 to 30.
• Use the unframed keyword to specify that
a single CEM channel is being created
including all time slots and the framing
structure of the line.
• Use the timeslots keyword and the timeslot
argument to specify the time slots to be
included in the CEM channel. The list of
time slots may include commas and
hyphens with no spaces between the
numbers.
Router(config-controller)# end
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
177
Configuring Pseudowire
Using CEM Classes
Note The CEM parameters at the local and remote ends of a CEM circuit must match; otherwise, the pseudowire
between the local and remote PE routers will not come up.
Note You cannot apply a CEM class to other pseudowire types such as ATM over MPLS.
Procedure
Router> enable
Router(config-cem-class)# idle-pattern
0x55
Step 6 Router(config)# interface cem 0/0 Configure the CEM interface that you want to
use for the new CEM class.
Example:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
178
Configuring Pseudowire
Configuring CEM Parameters
Router(config-if)# cem 0
Example:
Router(config-if-cem)# xconnect
10.10.10.10 200 encapsulation mpls
Router(config-if)#
Router(config)# exit
Note The CEM parameters at the local and remote ends of a CEM circuit must match; otherwise, the pseudowire
between the local and remote PE routers will not come up.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
179
Configuring Pseudowire
Setting the Dejitter Buffer Size
delay is always 1 millisecond. For example, a structured CEM channel of 16xDS0 has a default payload size
of 128 bytes.
The payload size must be an integer of the multiple of the number of time slots for structured CEM channels.
Custom Idle Pattern Cisco IOS XE Cupertino 17.9.1 You can configure idle pattern
manually on CEM circuits and
verify if it's stable and transmitted
to the other end in alarm conditions.
You can configure on all CEM PWs
in a T1/E1 circuit.
Supported on the following IMs on
CESoPSN circuits with both partial
and full time slots.
• 48-port T1/E1 CEM Interface
Module
• 48-port T3/E3 CEM Interface
Module
To define the idle pattern that a circuit emulation (CEM) channel transmits when the channel experiences an
underrun condition or to replace any missing packets, use the idle-pattern command in CEM configuration
mode. Starting with Cisco IOS XE Cupertino 17.9.1 release, you can manually configure any 8-bit value from
idle pattern. There are multiple CEMs in TDM circuits, these configurations are applicable only to CEM
circuits.
For example, a controller T1 0/1/0, can have one CEM circuit. It’s only applicable for CESoP, the time slots
can be 1–24, these are full time slots.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
180
Configuring Pseudowire
Enabling Dummy Mode
For example, under CEM0 you can manually configure any 8-bit value until 255 (0xFF). For partial time slot,
consider CEM group 0 with time slot 0, and similarly CEM group 1 with time slot 1.
Procedure
Router> enable
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
181
Configuring Pseudowire
Configuring Circuit Emulation Service over Packet-Switched Network (CESoPSN)
Router(config-controller)# controller t1
Router(config-if)# no ip address
Example:
Router(config-if)# cem 4
Step 6 Router(config-if)# xconnect 30.30.30.2 304 Binds an attachment circuit to the CEM
encapsulation mpls interface to create a pseudowire. This example
creates a pseudowire by binding the CEM
circuit 304 to the remote peer 30.30.2.304.
Router(config)# exit
What to do next
Note When creating IP routes for a pseudowire configuration, we recommend that you build a route from the
xconnect address (LDP router-id or loopback address) to the next hop IP address, such as ip route 30.30.30.2
255.255.255.255 1.2.3.4.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
182
Configuring Pseudowire
Configuring Circuit Emulation Service over Packet-Switched Network (CESoPSN)
Procedure
Router> enable
Step 3 Router(config)# controller [e1|t1] 0/0 Enters configuration mode for the E1 or T1
controller.
Example:
Router(config-controller)#
Router(config)#
Router(config-if-cem)# cem 5
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
183
Configuring Pseudowire
Configuring an Ethernet over MPLS Pseudowire
Router(config)#
Router(config)# exit
Procedure
Router> enable
Step 4 service instance number ethernet [name ] Configure an EFP (service instance) and enter
service instance configuration) mode.
Example:
• The number is the EFP identifier, an
Router(config-if)# service instance integer from 1 to 4000.
2 ethernet • (Optional) ethernet name is the name of
a previously configured EVC. You do not
need to use an EVC name in a service
instance.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
184
Configuring Pseudowire
Configuring Pseudowire Redundancy
Step 5 encapsulation {default | dot1q | Configure encapsulation type for the service
priority-tagged | untagged} instance.
Example: • default—Configure to match all
unmatched packets.
Router (config-if-srv)# encapsulation • dot1q—Configure 802.1Q encapsulation.
dot1q 2 • priority-tagged—Specify priority-tagged
frames, VLAN-ID 0 and CoS value of 0
to 7.
• untagged—Map to untagged VLANs.
Only one EFP per port can have untagged
encapsulation.
Step 6 xconnect peer-ip-address vc-id {encapsulation Binds the Ethernet port interface to an
{mpls [manual]} | pw-class pw-class-name attachment circuit to create a pseudowire. This
}[pw-class pw-class-name] [sequencing example uses virtual circuit (VC) 101 to
{transmit | receive | both}] uniquely identify the PW. Ensure that the
remote VLAN is configured with the same VC.
Example:
Note When creating IP routes for a
Router (config-if-srv)# pseudowire configuration, we
xconnect 10.1.1.2 101 recommend that you build a route
encapsulation mpls from the xconnect address (LDP
router-id or loopback address) to
the next hop IP address, such as
ip route 10.30.30.2
255.255.255.255 10.2.3.4.
Router(config)# exit
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
185
Configuring Pseudowire
Configuring Pseudowire Redundancy
Note You must configure the backup pseudowire to connect to a router that is different from the primary pseudowire.
Procedure
Router> enable
Router(config-pw-class)# encapsulation
mpls
Step 6 Router(config)# backup delay enable-delay Configures the backup delay parameters.
{disable-delay | never}
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
186
Configuring Pseudowire
Sample Configurations
Step 7 Router(config-if)# xconnect 1.1.1.2 101 Binds the Ethernet port interface to an
encapsulation mpls attachment circuit to create a pseudowire.
Step 8 Router(config)# backup peer Defines the address and VC of the backup peer.
peer-router-ip-address vcid [pw-class pw-class
name ]
Step 9 exit Exits configuration mode.
Example:
Router(config)# exit
Sample Configurations
The following sections contain sample pseudowire configurations.
controller T1 0/0/0
framing unframed
clock source internal
linecode b8zs
cablelength short 110
cem-group 0 unframed
interface CEM0/0/0
no ip address
cem 0
xconnect 18.1.1.1 1000 encapsulation mpls
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
187
Configuring Pseudowire
Example: Ethernet over MPLS
!
interface GigabitEthernet0/0/4
no ip address
negotiation auto
!
service instance 2 ethernet
encapsulation dot1q 2
xconnect 10.1.1.1 1001 encapsulation mpls
!
service instance 3 ethernet
encapsulation dot1q 3
xconnect 10.1.1.1 1002 encapsulation mpls
!
!
interface GigabitEthernet0/0/5
ip address 172.7.7.77 255.0.0.0
negotiation auto
mpls ip
mpls label protocol ldp
!
router ospf 1
router-id 5.5.5.5
network 5.5.5.5 0.0.0.0 area 0
network 172.0.0.0 0.255.255.255 area 0
network 10.33.33.33 0.0.0.0 area 0
network 192.0.0.0 0.255.255.255 area 0
!
PE 2 Configuration
!
mpls label range 16 12000 static 12001 16000
mpls label protocol ldp
mpls ldp neighbor 10.5.5.5 targeted ldp
mpls ldp graceful-restart
multilink bundle-name authenticated
!
!
redundancy
mode sso
!
!
!
ip tftp source-interface GigabitEthernet0
!
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
188
Configuring Pseudowire
Example: BGP PIC with TDM-PW Configuration
!
interface Loopback0
ip address 10.1.1.1 255.255.255.255
!
interface GigabitEthernet0/0/4
no ip address
negotiation auto
!
service instance 2 ethernet
encapsulation dot1q 2
xconnect 10.5.5.5 1001 encapsulation mpls
!
service instance 3 ethernet
encapsulation dot1q 3
xconnect 10.5.5.5 1002 encapsulation mpls
!
!
interface GigabitEthernet0/0/5
ip address 172.7.7.7 255.0.0.0
negotiation auto
mpls ip
mpls label protocol ldp
!
router ospf 1
router-id 10.1.1.1
network 10.1.1.1 0.0.0.0 area 0
network 172.0.0.0 0.255.255.255 area 0
network 10.33.33.33 0.0.0.0 area 0
network 192.0.0.0 0.255.255.255 area 0
!
router bgp 1
neighbor 18.2.2.2 remote-as 1
neighbor 18.2.2.2 update-source Loopback0
neighbor 18.3.3.3 remote-as 1
neighbor 18.3.3.3 update-source Loopback0
!
address-family ipv4
bgp additional-paths receive
bgp additional-paths install
bgp nexthop trigger delay 6
neighbor 18.2.2.2 activate
neighbor 18.2.2.2 send-community both
neighbor 18.2.2.2 send-label
neighbor 18.3.3.3 activate
neighbor 18.3.3.3 send-community both
neighbor 18.3.3.3 send-label
neighbor 26.1.1.2 activate
exit-address-family
!
address-family vpnv4
bgp nexthop trigger delay 7
neighbor 18.2.2.2 activate
neighbor 18.2.2.2 send-community extended
neighbor 18.3.3.3 activate
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
189
Configuring Pseudowire
Adaptive Clock Recovery (ACR)
The below configuration example is for BGP PIC with TDM PW:
pseudowire-class pseudowire1
encapsulation mpls
control-word
no status control-plane route-watch
status peer topology dual-homed
!
Interface CEM0/0/0
cem 1
xconnect 17.1.1.1 4101 encapsulation mpls pw-class pseudowire1
Note Framing type should be maintained same in all routers end to end.
Effective Cisco IOS XE Everest 16.5.1, ACR is supported on the 8-port T1/E1 interface module.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
190
Configuring Pseudowire
Restrictions for ACR on 8 T1/E1 Interface Module
• The remote Customer Equipment and the remote Provider Edge device. These can be configured
by using the clock source internal and the clock source line commands under the T1/E1 controller.
• The controller on the local Customer Equipment connected to the ACR router by using the clock
source linecommand.
• PRC or PRS reference clock from a GPS reference to the remote Customer Equipment or remote
CEM Provider Edge device.
enable
configure terminal
controller t1 0/4/3
clock source recovered 15
cem-group 20 unframed
exit
recovered-clock 0 4
clock recovered 15 adaptive cem 3 20
exit
Note The clock source recovered configuration on the controller must be completed before configuring the clock
recovery in global configuration mode.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
191
Configuring Pseudowire
Verifying the ACR Configuration of T1 Interfaces for SAToP
Note On the controller, the clock source should be configured before CEM group is configured.
Note Follow a similar procedure to configure to configure CEM ACR for E1 Interfaces for SAToP. Also, follow
a similar procedure to configure CEM ACR for T1 and E1 Interfaces for CESoPSN. Use cem-group circuit-id
timeslots <1-24> | <1-31> command instead of cem-group circuit-id unframed command for the configuration
depending on T1 or E1 controller.
To remove the clock configuration in ACR, you must remove the recovery clock configuration in global
configuration mode, then remove the CEM circuit, and finally remove the clock source recovered configuration
under the controller.
Note For the 8-port T1/E1 interface module (A900-IMA8D), the configuration or unconfiguration of the clock
source recovered is not supported when the cem-group is already configured on the controller. To modify the
clock source, you should remove the CEM group configuration from the controller.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
192
Configuring Pseudowire
Associated Commands
• When large-sized packets are received along with the CEM packets by the devices in the core network
or PSN traffic, CEM packets may incur delay with variance in delay. As ACR is susceptible to delay
and variance in delay, MTIE measurement may fail. This behavior is documented in ITU-T G.8261
section 10.
This is an expected behavior.
• For a provisioned ACR clock that is in Acquired state, if the ACR clock configuration under the
recovered-clock global configuration mode is removed and then reconfigured, the status of the ACR
clock may initially be ACQUIRED and not FREERUN and then move to Acquiring. This happens because
the ACR clock is not fully unprovisioned until the CEM circuit and the controller clock source recovered
configuration are removed. Hence, the clock starts from the old state and then re-attempts to recover the
clock.
This is an expected behavior.
Use the show recovered-clock command to verify the ACR of T1 interfaces for SAToP:
Router#show recovered-clock
Recovered clock status for subslot 0/1
----------------------------------------
Clock Type Mode Port CEM Status Frequency Offset(ppb)
1 T1/E1 ADAPTIVE 3 1 ACQUIRED 100
Use the show running-config command to verify the recovery of adaptive clock of T1 interfaces:
Router#show running-config
controller T1 0/1/2
clock source recovered 1
cem-group 1 unframed
interface CEM0/1/3
cem 1
no ip address
xconnect 2.2.2.2 10
encapsulation mpls
Associated Commands
Commands Links
cem-group http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/
interface/command/ir-cr-book/
ir-c1.html#wp2440628600
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
193
Configuring Pseudowire
Associated Commands
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
194
CHAPTER 18
Configuring and Monitoring Alarm
This chapter describes monitoring alarms, alarms filtering support and configuring external alarms for fan
tray alarm port.
This chapter includes the following sections:
• Monitoring Alarms, on page 195
• Configuring External Alarm Trigger, on page 200
• Alarm Filtering Support, on page 203
• Facility Protocol Status Support, on page 205
Monitoring Alarms
Once hardware is installed and operational, use alarms to monitor hardware status on a daily basis.
The routers are designed to send alarm notifications when problems are detected. Network administrators do
not need to use show commands to poll devices on a routine basis and can monitor the network remotely.
However, network administrators can perform onsite monitoring if they so choose.
Use snmp-server enable traps alarms <severity> command to enable the entity related Traps.
The default severity level is informational, which shows all alarms. Severity levels are defined as the following:
• 1—Critical. The condition affects service.
• 2—Major. Immediate action is needed.
• 3—Minor. Minor warning conditions.
• 4—Informational. No action is required. This is the default.
The entity notifications ceAlarmAsserted and ceAlarmCleared are used to report the condition for e.g. when
a physical entity asserted or cleared an alarm.
Note Effective from Cisco IOS XE Everest 16.6.1, on RSP3 module, alarm notification is enabled on 900 watts
DC power supply. There are 2 input feeds for 900 watts DC power supply, if one of the input voltage is lesser
than the operating voltage, critical alarm is generated for that particular feed and clears (stops) once the voltage
is restored but the power supply state remains in OK state as the other power supply is operationally up.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
195
Configuring and Monitoring Alarm
Network Administrator Checks Console or Syslog for Alarm Messages
If alarm severity is not specified, alarm messages for all severity levels are sent to logging devices.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
196
Configuring and Monitoring Alarm
ALARMS for Router
SPA Re-Inserted
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
197
Configuring and Monitoring Alarm
ALARMS for Router
GigabitEthernet0/2/3 May 11 2016 18:54:25 CRITICAL Physical Port Link Down [1]
xcvr container 0/2/4 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/2/5 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
GigabitEthernet0/2/6 May 11 2016 18:54:25 CRITICAL Physical Port Link Down [1]
SONET 0/3/0 May 11 2016 18:54:25 INFO Physical Port Administrative
State Down [36]
xcvr container 0/3/1 May 11 2016 18:53:44 INFO Transceiver Missing [0]
xcvr container 0/3/2 May 11 2016 18:53:44 INFO Transceiver Missing [0]
xcvr container 0/3/3 May 11 2016 18:53:44 INFO Transceiver Missing [0]
xcvr container 0/4/0 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/4/1 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/4/2 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
GigabitEthernet0/4/3 May 11 2016 18:54:25 CRITICAL Physical Port Link Down [1]
xcvr container 0/4/4 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/4/5 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/4/6 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/4/7 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
TenGigabitEthernet0/4/8 May 11 2016 18:54:25 CRITICAL Physical Port Link Down
[35]
To view critical alarms specifically, use the show facility-alarm status critical command:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
198
Configuring and Monitoring Alarm
ALARMS for Router
xcvr container 0/4/6 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/4/7 May 11 2016 18:54:25 CRITICAL Transceiver Missing - Link
Down [1]
TenGigabitEthernet0/4/8 May 11 2016 18:54:25 CRITICAL Physical Port Link Down
[35]
To view the operational state of the major hardware components on the router, use the show platform diag
command. This example shows the Power supply P0 has failed:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
199
Configuring and Monitoring Alarm
Reviewing and Analyzing Alarm Messages
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
200
Configuring and Monitoring Alarm
Approaches for Monitoring Hardware Alarms
To clear a visual alarm, you must resolve the alarm condition. . For example, if a critical alarm LED is
illuminated because an active SPA was removed without a graceful deactivation of the SPA, the only way to
resolve that alarm is to replace the SPA.
Note The clear faciltity-alarm command is not supported. The clear facility-alarm command does not clear an
alarm LED on the RP faceplate or turn off the DC lightbulb
Router> enable
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
201
Configuring and Monitoring Alarm
Example
Router#exit
Example
Router>enable
Router#configure terminal
Router(config)#alarm-contact 2 description door sensor
Router(config)#alarm-contact 2 severity major
Router(config)#alarm-contact 2 trigger open
Router(config)#end
Router#show facility-alarm status
System Totals Critical: 15 Major: 0 Minor: 0
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
202
Configuring and Monitoring Alarm
Alarm Filtering Support
Alarm [0]
subslot 0/13 Sep 21 2016 14:56:35 CRITICAL Active Card Removed OIR
Alarm [0]
subslot 0/14 Sep 21 2016 14:56:29 CRITICAL Active Card Removed OIR
Alarm [0]
subslot 0/15 Sep 21 2016 14:56:33 CRITICAL Active Card Removed OIR
Alarm [0]
Fan Tray Bay 0 Sep 21 2016 11:50:39 CRITICAL Fan Tray Module Missing [0]
Router(config)#
Note The external alarm trigger and syslog support configuration is supported from Cisco IOS XE Release 3.13.0S.
CISCO-ENTITY-ALARM-MIB
The CISCO-ENTITY-ALARM-MIB provides a management client with the capability to monitor alarms
generated by physical entities in a network that are identified in the entPhysicalTable of the Entity-MIB (RFC
2737). Examples of these physical entities are chassis, fans, modules, ports, slots, and power supplies. The
management client interfaces with an SNMP agent to request access to objects defined in the
CISCO-ENTITY-ALARM-MIB.
ceAlarmGroup
The ceAlarmGroup is a group in the CISCO-ENTITY-ALARM-MIB that defines objects that provide current
statuses of alarms and the capability to instruct an agent to stop (cut off) signaling for any or all external
audible alarms.
Following are the objects in ceAlarmGroup:
• ceAlarmCriticalCount
• ceAlarmMajorCount
• ceAlarmMinorCount
• ceAlarmCutoff
• ceAlarmFilterProfile
• ceAlarmSeverity
• ceAlarmList
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
203
Configuring and Monitoring Alarm
ceAlarmFilterProfileTable
ceAlarmFilterProfileTable
The ceAlarmFilterProfileTable filters alarms according to configured alarm lists. The filtered alarms are then
sent out as SNMP notifications or syslog messages, based on the alarm list enabled for each alarm type. This
table is defined in the CISCO-ENTITY-ALARM-MIB and implemented in the group ceAlarmGroup.
ceAlarmFilterProfile
An alarm filter profile controls the alarm types that an agent monitors and signals for a corresponding physical
entity. The ceAlarmFilterProfile object holds an integer value that uniquely identifies an alarm filter profile
associated with a corresponding physical entity. When the value is zero, the agent monitors and signals all
alarms associated with the corresponding physical entity.
ceAlarmHistTable:
This table contains the history of ceAlarmAsserted and ceAlarmCleared traps generated by the agent.
Each entry to the table will have physical index from entPhsicalTable and the severity of the alarm.
The ceAlarmAsserted and ceAlarmCleared trap varbinds are mostly from this table and the description from
ceAlarmDescrTable.
ceAlarmDescrTable:
This table contains a description for each alarm type defined by each vendor type employed by the system.
This table has the list of possible severity levels and the description for the physical entity, Object
“ceAlarmDescrSeverity” indicates the severity of an alarm (1 to 4 as above).
ceAlarmTable:
This table specifies alarm control and status information related to each physical entity contained by the
system, including the alarms currently being asserted by each physical entity capable of generating alarms.
How to Configure Alarm Filtering for Syslog Messages and SNMP Notifications
Configuring Alarm Filtering for Syslog Messages
This task describes how to configure the alarm severity threshold for generating syslog messages. When you
use this command, the alarm severity threshold is included in the running configuration and automatically
applied when the configuration is reloaded.
enable
configure terminal
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
204
Configuring and Monitoring Alarm
Configuring Alarm Filtering for SNMP Notifications
logging alarm 2
show facility-alarm status
enable
configure terminal
snmp-server enable traps alarms 2
show facility-alarm status
Router# enable
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# snmp-server enable traps alarms 2
Router(config)#
Router(config)# exit
Router# show facility-alarm status
System Totals Critical: 2 Major: 1 Minor: 0
Source Time Severity Description [Index]
------ ------ -------- -------------------
Power Supply Bay 0 Jun 07 2016 13:36:49 CRITICAL Power Supply/FAN Module
Missing [0]
Fan Tray/Ext. ALARM: Jun 07 2016 13:36:55 MAJOR Fan Tray/Fan 8 Failure [15]
xcvr container 0/5/0 Jun 07 2016 13:37:43 CRITICAL Transceiver Missing - Link
Down [1]
xcvr container 0/5/1 Jun 07 2016 13:37:43 INFO Transceiver Missing [0]
xcvr container 0/5/2 Jun 07 2016 13:37:43 INFO Transceiver Missing [0]
xcvr container 0/5/3 Jun 07 2016 13:37:43 INFO Transceiver Missing [0]
xcvr container 0/5/4 Jun 07 2016 13:37:43 INFO Transceiver Missing [0]
xcvr container 0/5/5 Jun 07 2016 13:37:43 INFO Transceiver Missing [0]
xcvr container 0/5/6 Jun 07 2016 13:37:43 INFO Transceiver Missing [0]
xcvr container 0/5/7 Jun 07 2016 13:37:43 INFO Transceiver Missing [0]
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
205
Configuring and Monitoring Alarm
show facility protocol status
• ISIS
• OSPF
• BGP
• TE Tunnels
• LDP
• Bundles
• PWs
• EVPN PWs
• CFM
• SYncE
• PTP
• HSRP
• BFD
• SensorThresholdViolations
Restrictions
Only 14 routing protocols outputs can be displayed.
MPLS Output
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
206
Configuring and Monitoring Alarm
Routing Protocols Outputs
ISIS Output
#show facility-protocol status
==========================================================================================================================
Protocols Interface ISIS-Type Neigh-IP Net-ID Status
Sys-ID Hold-Time
==========================================================================================================================
ISIS HundredGigE0/7/0 Level-1 NA NA DOWN
NA NA
ISIS HundredGigE0/7/0 Level-2 NA NA DOWN
NA NA
ISIS GigabitEthernet0/3/4 Level-2 10.147.158.2 0000.0000.0158 UP
NCS4206-158 26
ISIS BDI72 Level-2 10.10.72.2 0000.0000.0162 UP
NCS4K-101-162 29
ISIS BDI27 Level-2 10.10.27.2 0000.0000.0162 UP
NCS4K-101-162 23
ISIS GigabitEthernet0/0/7 Level-2 NA NA UP
0000.0000.0152 250
ISIS TenGigabitEthernet0/3/0 Level-2 38.206.1.3 0000.0000.0023 UP
C101_A 28
ISIS GigabitEthernet0/2/3 Level-2 38.76.1.3 0000.0000.0007 UP
ASR9K_CORE 23
ISIS Tunnel1315 Level-2 7.7.15.2 0000.0000.0007 UP
ASR9K_CORE 28
BGP Output
#show facility-protocol status
=================================================================================================================
Protocols LocalAS RemoteAS NeighborIP Status Up/Down Time
Remote-RID VRF-Inst-Name
=================================================================================================================
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
207
Configuring and Monitoring Alarm
Routing Protocols Outputs
Pseudowire Output
#show facility-protocol status
===================================================================================================
Protocols Peer-IP VC-ID VC-Status VC-Error
===================================================================================================
PWs 10.0.0.146 2 ADMIN DOWN NA
PWs 10.0.0.146 9 ADMIN DOWN NA
PWs 10.0.0.146 10 ADMIN DOWN NA
PWs 10.0.0.146 54 DOWN NA
PWs 10.0.0.146 87 DOWN NA
PWs 10.0.0.146 98 DOWN NA
SYncE Output
#show facility-protocol status
===========================================================================================
Protocols Interface Mode/QL QL-IN QL-Rx-Config QL-Rx-Overrided
===========================================================================================
SyncE GigabitEthernet0/1/7 Sync/En QL-DNU - QL-DNU
SyncE Sync/En QL-DNU - QL-DNU
SyncE Sync/En QL-DNU - QL-DNU
SyncE Sync/En QL-DNU - QL-DNU
Bundles Output
#show facility-protocol status
===================================================================================================
Protocols Port-Channel Bundle-Status Bundled-Ports Min-Bundle
===================================================================================================
BUNDLES Po48 DOWN 0 2
PTP Output
#show facility-protocol status
==============================================================================================================
Protocols Event Interface Role Clock-port-Name State
Master-IP
==============================================================================================================
PTP CLK_MASTER_PORT_SELECTED NA slave tomaster NA
UNKNOWN
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
208
Configuring and Monitoring Alarm
Routing Protocols Outputs
HSRP Output
#show facility-protocol status
=======================================================
Protocols Interface Group State
========================================================
HSRP HundredGigE0/7/0 1 Init
TE Tunnels Output
#show facility-protocol status
===================================================================================================
Protocols Tunnel-Interface Status
===================================================================================================
MPLS-TE Tunnel0 DOWN
MPLS-TE Tunnel1 DOWN
BFD Output
#show facility-protocol status
============================================================================================================
Protocols Interface Status Neigh-Addr Local-Descriminator
Interface_index
================================================================================================================
BFD FortyGigabitEthernet0/8/1 DOWN NA NA
22
BFD TenGigabitEthernet0/3/0 DOWN NA NA
9
BFD GigabitEthernet0/5/4 DOWN NA NA
15
BFD Tunnel1309 DOWN NA NA
1601
CFM Output
#show facility-protocol status
=================================================================================================================
Protocols Event Interface L-mpid Level Dir BD/VLAN/XCON ID
Defect-Condition
====================================================================================================================
CFM ENTER_AIS_INT GigabitEthernet0/0/4 NA NA Up NA NA AIS
==================================================================================================================
Protocols Event R-mpid Level EVC-NAME MA-NAME Domain MAC Status Event-Code
=====================================================================================================================
CFM REMOTE_MEP_DOWN 1 NA SEN_CFM SEN_CFM EVC NA UP NA
CFM REMOTE_MEP_UP 1 NA SEN_CFM SEN_CFM EVC NA UP NA
CFM CROSSCHECK_MEP_UNKNOWN 1 NA NA SEN_CFM EVC 0022.bdde.05be NA NA
CFM CROSS_CONN_SERVICE 1 4 NA SEN_CFM EVC 0022.bdde.05be NA NA
CFM CONFIG_ERROR 1 NA NA SEN_CFM EVC 0022.bdde.05be NA NA
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
209
Configuring and Monitoring Alarm
show facility-protocol status command
Cisco IOS XE Amsterdam 17.1.x Support for this command was introduced on ASR 900, ASR 920, and
NCS 4200 Series.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
210
CHAPTER 19
Tracing and Trace Management
• Tracing Overview, on page 211
• How Tracing Works, on page 211
• Tracing Levels, on page 212
• Viewing a Tracing Level, on page 213
• Setting a Tracing Level, on page 214
• Viewing the Content of the Trace Buffer, on page 214
Tracing Overview
Tracing is a function that logs internal events. Trace files are automatically created and saved to the tracelogs
directory on the harddisk: file system on the router, which stores tracing files in bootflash:. Trace files are
used to store tracing data.
The contents of trace files are useful for the following purposes:
• Troubleshooting—If a router is having an issue, the trace file output may provide information that is
useful for locating and solving the problem. Trace files can almost always be accessed through diagnostic
mode even if other system issues are occurring.
• Debugging—The trace file outputs can help users get a more detailed view of system actions and
operations.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
211
Tracing and Trace Management
Tracing Levels
wants to modify the trace level to increase or decrease the amount of trace message output, the user should
set a new tracing level using the set platform software trace command. Trace levels can be set by process
using the all-modules keyword within the set platform software trace command, or by module within a
process. See the set platform software trace command reference for more information on this command,
and the Tracing Levels, on page 212 section of this document for additional information on tracing levels.
Tracing Levels
Tracing levels determine how much information about a module should be stored in the trace buffer or file.
The table below shows all of the trace levels that are available and provides descriptions of what types of
messages are displayed with each tracing level.
Emergency 0 The message is regarding an issue that makes the system unusable.
Critical 2 The message is regarding a critical condition. This is the default setting.
Notice 5 The message is regarding a significant issue, but the router is still working
normally.
Noise - All possible trace messages for the module are logged.
The noise level is always equal to the highest possible tracing level. Even if
a future enhancement to tracing introduces a higher tracing level, the noise
level will become equal to the level of that new enhancement.
Trace level settings are leveled, meaning that every setting will contain all messages from the lower setting
plus the messages from its own setting. For instance, setting the trace level to 3(error) ensures that the trace
file will contain all output for the 0 (emergencies), 1 (alerts), 2 (critical), and 3 (error) settings. Setting the
trace level to 4 (warning) will ensure that all trace output for the specific module will be included in that trace
file.
The default tracing level for every module on the router is notice.
All trace levels are not user-configurable. Specifically, the alert, critical, and notice tracing levels cannot be
set by users. If you wish to trace these messages, set the trace level to a higher level that will collect these
messages.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
212
Tracing and Trace Management
Viewing a Tracing Level
When setting trace levels, it is also important to remember that the setting is not done in a configuration mode,
so trace level settings are returned to their defaults after every router reload.
Caution Setting tracing of a module to the debug level or higher can have a negative performance impact. Setting
tracing to this level or higher should be done with discretion.
Caution Setting a large number of modules to high tracing levels can severely degrade performance. If a high level of
tracing is needed in a specific context, it is almost always preferable to set a single module on a higher tracing
level rather than setting multiple modules to high tracing levels.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
213
Tracing and Trace Management
Setting a Tracing Level
mqipc Notice
nat Notice
nbar Notice
netflow Notice
om Notice
peer Notice
qos Notice
route-map Notice
sbc Notice
services Notice
sw_wdog Notice
tdl_acl_config_type Notice
tdl_acl_db_type Notice
tdl_cdlcore_message Notice
tdl_cef_config_common_type Notice
tdl_cef_config_type Notice
tdl_dpidb_config_type Notice
tdl_fman_rp_comm_type Notice
tdl_fman_rp_message Notice
tdl_fw_config_type Notice
tdl_hapi_tdl_type Notice
tdl_icmp_type Notice
tdl_ip_options_type Notice
tdl_ipc_ack_type Notice
tdl_ipsec_db_type Notice
tdl_mcp_comm_type Notice
tdl_mlp_config_type Notice
tdl_mlp_db_type Notice
tdl_om_type Notice
tdl_ui_message Notice
tdl_ui_type Notice
tdl_urpf_config_type Notice
tdllib Notice
trans_avl Notice
uihandler Notice
uipeer Notice
uistatus Notice
urpf Notice
vista Notice
wccp Notice
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
214
Tracing and Trace Management
Viewing the Content of the Trace Buffer
In the following example, the trace messages for the Host Manager process in Route Switch Processor slot 0
are viewed using the show platform software trace message command:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
215
Tracing and Trace Management
Viewing the Content of the Trace Buffer
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
216
CHAPTER 20
BCP Support on MLPPP
This feature module describes how to configure Bridge Control Protocol (BCP) Support over Multilink PPP
(MLPPP).
Note This feature is only applicable for Cisco ASR 900 RSP2 Module.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
217
BCP Support on MLPPP
Information About BCP Support on MLPPP
• Spanning Tree Protocol (STP) and Resilient Ethernet Protocol (REP) are not supported.
• Jumbo frames are not supported.
• Supports 16 T1/E1 and OC3 IM only. A maximum number of 16 (0-15) links per MLPPP bundle are
supported, where traffic rate is not beyond MLPPP bandwidth. For E1 link, 16 E1 serial interfaces can
be in one MLPPP bundle. For T1, 16 T1 links can be in one MLPPP bundle.
• The following encapsulations are not supported: QinQ, dot1ad, and dot1ad-dot1q .
• You cannot configure default or untagged encapsulations on two different multilinks. When default is
configured on a multilink, you can configure another EFP as untagged on the same multilink. For
untagged, the same multilink cannot have another EFP configured as untagged.
• Two different multilinks cannot bridge the same encapsulated VLAN.
• The same bridge domain cannot be configured twice on the same interface.
• Connectivity Fault Management (CFM), Y.1731, and Layer 2 protocol forward tagged are not supported.
• Set qos-group is not supported in the output policy of physical Gigabit interface and EVC of the multilink
interface. Set qos-group on ASR 903 will not mark the packet. The scope of the set qos-group is limited
to the router.
• QoS policy is not supported on multilink at the interface level. However, it is supported on different
EVCs of the multilink interfaces.
• Qos-group classification will work only on the egress interface or EFP interface.
• The MLPPP interface bundle supports only a maximum of 64 EVCs.
• A miximum of 64 VLANs are supported across all the MLPPPs.
• Layer 3 traffic with default encapsulation is not supported.
• Multicast and IGMP is not supported.
• For ingress classification to work, it should be classified based on “match cos inner <>” or “match vlan
inner <>”.
• Layer 2 QoS behavior is supported only on tagged/priority tagged packets. It is not supported for untagged
packets.
• Only 1r2C policer is supported at the egress.
• With BCP on MLPPP, the COS bits in the paylod are not preserved end to end.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
218
BCP Support on MLPPP
Supported Profiles and Protocols
Quality of Service
The Ethernet Layer 2 traffic is classified on the egress at the EVC of the Multilink interface based on IP DSCP
or VLAN CoS bits. Based on this classification, egress policing (bandwidth percent or priority percent) is
achieved. You can also re-mark the QoS field. The following table lists the options available for re-marking.
Set VLAN CoS or Priority Code Point (PCP) Bits Set VLAN CoS Bits (re-mark VLAN CoS or PCP
Bits)
Configuring an EFP
To configure an EFP, complete the following steps:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
219
BCP Support on MLPPP
Adding an EFP to a Multilink
Procedure
Step 3 interface type number Specifies an interface type and number, and
places the device in interface configuration
Example:
mode.
Router(config)# interface GigabitEthernet
0/0
Step 4 service instance number ethernet Configures an EFP (service instance) and enters
service instance configuration mode.
Example:
Router(config-if)# service instance 10 • number—EFP identifier; an integer from
ethernet 1 to 4000.
Step 5 encapsulation dot1q vlan-id Configures encapsulation type for the service
instance.
Example:
Router(config-if-srv)# encapsulation • vlan-id—Virtual LAN identifier. The valid
dot1q 50 range is from 1 to 4094.
Step 6 rewrite ingress tag pop 1 symmetric Specifies that encapsulation modification occurs
on packets at ingress.
Example:
Router(config-if-srv)# rewrite ingress
tag pop 1 symmetric
Procedure
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
220
BCP Support on MLPPP
Configuring Multiple Encapsulated VLANs Bridged Through Different Multilinks
Step 3 interface type number Specifies an interface type and number, and
places the device in interface configuration
Example:
mode.
Router(config)# interface Multilink 5
Step 4 service instance number ethernet Configures an EFP (service instance) and enters
service instance configuration mode.
Example:
Router(config-if)# service instance 10 • number—EFP identifier; an integer from
ethernet 1 to 4000.
Step 5 encapsulation dot1q vlan-id Configures encapsulation type for the service
instance.
Example:
Router(config-if-srv)# encapsulation • vlan-id—Virtual LAN identifier. The valid
dot1q 60 range is from 1 to 4094.
Step 6 rewrite ingress tag pop 1 symmetric Specifies that encapsulation modification occurs
on packets at ingress.
Example:
Router(config-if-srv)# rewrite ingress
tag pop 1 symmetric
ConfiguringMultipleEncapsulatedVLANsBridgedThroughDifferentMultilinks
You should create two encapsulated VLANs and add them to two multilinks for this configuration to work.
To configure multiple encapsulated VLANs bridged through different multilinks, complete the following
tasks:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
221
BCP Support on MLPPP
Configuring QoS for BCP Support on MLPPP
Procedure
Step 3 interface type number Specifies an interface type and number, and
places the device in interface configuration
Example:
mode.
Router(config)# interface Multilink 5
Step 4 service instance number ethernet Configures an EFP (service instance) and enters
service instance configuration mode.
Example:
Router(config-if)# service instance 10 • number—EFP identifier; an integer from
ethernet 1 to 4000.
Step 5 encapsulation dot1q vlan-id Configures encapsulation type for the service
instance.
Example:
Router(config-if-srv)# encapsulation • vlan-id—Virtual LAN identifier. The valid
dot1q 60 range is from 1 to 4094.
Step 6 rewrite ingress tag pop 1 symmetric Specifies that encapsulation modification occurs
on packets at ingress.
Example:
Router(config-if-srv)# rewrite ingress
tag pop 1 symmetric
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
222
BCP Support on MLPPP
Defining a QoS Policy
Note Define a QoS policy, and apply it to the MLPPP interface, and configure a matching policy on the EFP
interface.
Procedure
Step 3 class-map match-any class-map-name Creates a class map to be used for matching
packets to a specified class and enters QoS
Example:
class-map configuration mode.
Router(config)# class-map match-any
dscpaf11 • class-map-name—Name of the class for
the class map. The class name is used for
both the class map and to configure a
policy for the class in the policy map.
Step 5 class-map match-any class-map-name Creates a class map to be used for matching
packets to a specified class.
Example:
Router(config-cmap)# class-map match-any
qos-group3
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
223
BCP Support on MLPPP
Applying a QoS Policy on an MLPPP Interface
Step 10 set ip dscp ip-dscp-value Marks a packet by setting the IP DSCP value
in the type of service (ToS) byte.
Example:
Router(config-pmap-c)# set ip dscp ef • ip-dscp-value—IP DSCP value; The valid
values are from 0 to 63.
Step 11 class class-name Specifies the name of the class whose policy
you want to create or change. Alternatively, is
Example:
used to specify the default class (commonly
Router(config-pmap-c)# class qos-group3 known as the class-default class) before you
configure its policy.
Step 12 bandwidth percent percentage Specifies the bandwidth allocated for a class
belonging to a policy map.
Example:
Router(config-pmap-c)# bandwidth percent • percentage—Specifies the percentage of
20 guaranteed bandwidth based on an
absolute percent of available bandwidth
to be set aside for the priority class or on
a relative percent of available bandwidth.
The valid range is from 1 to 100.
Step 13 set qos-group group-id Sets a QoS group identifier (ID) that can be
used later to classify packets.
Example:
Router(config-pmap-c)# set qos-group 4 • group-id—group-id—Group ID number.
The valid range is from 0 to 99.
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
224
BCP Support on MLPPP
Verifying BCP Support on MLPPP
Procedure
Step 3 interface type number Specifies an interface type and number, and
places the device in interface configuration
Example:
mode.
Router(config)# interface Multilink 5
Step 4 service instance number ethernet Configures an EFP (service instance) and enters
service instance configuration mode.
Example:
Router(config-if)# service instance 20 • number—EFP identifier; an integer from
ethernet 1 to 4000.
Step 6 encapsulation dot1q vlan-id Configures encapsulation type for the service
instance.
Example:
Router(config-if-srv)# encapsulation • vlan-id—Virtual LAN identifier. The valid
dot1q 50 range is from 1 to 4094.
Step 7 rewrite ingress tag pop 1 symmetric Specifies that encapsulation modification occurs
on packets at ingress.
Example:
Router(config-if-srv)# rewrite ingress
tag pop 1 symmetric
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
225
BCP Support on MLPPP
Configuration Examples for BCP Support on MLPPP
Multilink1
Bundle name: ASR1
Remote Endpoint Discriminator: [1] ASR1
Local Endpoint Discriminator: [1] ASR2
Bundle up for 17:06:50, total bandwidth 20480, load 6/255
2 receive classes, 2 transmit classes
Receive buffer limit 123040 bytes per class, frag timeout 1000 ms
Bundle is Distributed
Receive Class 0:
0/0 fragments/bytes in reassembly list
0 lost fragments, 0 reordered
0/0 discarded fragments/bytes, 0 lost received
0xB9026C received sequence
Receive Class 1:
0/0 fragments/bytes in reassembly list
0 lost fragments, 0 reordered
0/0 discarded fragments/bytes, 0 lost received
0x5D2E8F received sequence
Transmit Class 0:
0x5CBA5 sent sequence
Transmit Class 1:
0x146FA1 sent sequence
Distributed MLP. Multilink in Hardware.
Distributed Fragmentation is on. Fragment size: 256.
Bundle status is: active
Member links: 10 active, 0 inactive (max 255, min not set)
Se0/6:0, since 01:36:49, 7680 weight, 256 frag size
Se0/2:0, since 01:26:26, 7680 weight, 256 frag size
Se0/5:0, since 01:25:18, 7680 weight, 256 frag size
Se0/9:0, since 01:25:17, 7680 weight, 256 frag size
Se0/1:0, since 01:24:25, 7680 weight, 256 frag size
Se0/4:0, since 01:24:20, 7680 weight, 256 frag size
Se0/0:0, since 01:24:18, 7680 weight, 256 frag size
Se0/7:0, since 01:24:17, 7680 weight, 256 frag size
Se0/8:0, since 01:23:09, 7680 weight, 256 frag size
Se0/3:0, since 01:23:08, 7680 weight, 256 frag size
Method 1
enable
configure terminal
interface GigabitEthernet 0/0
service instance 10 ethernet
encapsulation dot1q 50
rewrite ingress tag pop 1 symmetric
bridge-domain 100
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
226
BCP Support on MLPPP
Example: Multilink with a Single EFP
Method 2
enable
configure terminal
interface GigabitEthernet 0/0
service instance 10 ethernet
encapsulation dot1q 50
rewrite ingress tag pop 1 symmetric
exit
configure terminal
bridge-domain 100
member Multilink1 service-instance 100
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
227
BCP Support on MLPPP
Example: Multilink with QoS
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
228
BCP Support on MLPPP
Example: Multilink Between Cisco ASR 903 Series Routers and Cisco C7600 Series Routers
Example: Multilink Between Cisco ASR 903 Series Routers and Cisco C7600
Series Routers
The following is a sample configuration of multilink between a Cisco ASR 903 Series Routers and Cisco
C7600 Series Routers:
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
229
BCP Support on MLPPP
Example: Multilink with Maximum 10 Links
Figure 8: Multilink Between Cisco ASR 903 Series Routers and Cisco C7600 Series Routers
The following sample configurations show how to configure multilink with maximum 10 links.
Policy Map 1
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
230
BCP Support on MLPPP
Example: Multilink with Maximum 10 Links
match qos-group 3
class-map match-any qos-group4
match qos-group 4
class-map match-any qos-group5
match qos-group 5
class-map match-any qos-group6
match qos-group 6
class-map match-any qos-group7
match qos-group 7
policy-map bcpmlpppqos
class qos-group1
priority percent 20
set qos-group 2
class qos-group2
bandwidth percent 20
set qos-group 3
class qos-group3
bandwidth percent 10
set qos-group 4
class qos-group4
bandwidth percent 5
set qos-group 5
class qos-group5
bandwidth percent 30
set qos-group 6
class qos-group7
bandwidth percent 15
set qos-group 1
Policy Map 2
policy-map bcpmlpppdscp
class dscpaf11
priority percent 20
set ip dscp af12
class dscpaf12
bandwidth percent 20
set ip dscp af13
class dscpaf21
bandwidth percent 10
set ip dscp af22
class dscpaf31
bandwidth percent 5
set ip dscp af32
class dscpcs1
bandwidth percent 30
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
231
BCP Support on MLPPP
Example: Multilink with Maximum 10 Links
MLPPP-GIG - 1
interface Multilink1
service instance 1 ethernet
service-policy output bcpmlpppqos
encapsulation untagged
bridge-domain 3000
interface Multilink2
service instance 1 ethernet
service-policy output bcpmlpppqos
encapsulation dot1q 50
bridge-domain 2000
service instance 2 ethernet
encapsulation dot1q 60
bridge-domain 2001
ADD-MLPPP-GIG - 1
interface Multilink1
service instance 2 ethernet
service-policy output bcpmlpppqos
encapsulation dot1q 70
bridge-domain 3001
MLPPP-GIG-2
interface Multilink1
service instance 1 ethernet
service-policy output bcpmlpppdscp
encapsulation untagged
bridge-domain 3000
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
232
BCP Support on MLPPP
Example: Multilink with Maximum 10 Links
interface Multilink2
service instance 2 ethernet
service-policy output bcpmlpppdscp
encapsulation dot1q any
bridge-domain 3001
MLPPP-GIG-3
interface Multilink1
service instance 1 ethernet
service-policy output bcpmlpppdscp
encapsulation default
bridge-domain 3000
interface Multilink1
no ip address
load-interval 30
ppp pfc local request
ppp pfc remote apply
ppp acfc local request
ppp acfc remote apply
ppp multilink
ppp multilink interleave
ppp multilink group 1
ppp multilink fragment size 256
ppp multilink multiclass
service instance 102 ethernet
service-policy output bcpmlpppqos
encapsulation dot1q 102
rewrite ingress tag pop 1 symmetric
bridge-domain 102
!
interface Serial0/0:0
no ip address
encapsulation ppp
ppp multilink
ppp multilink group 1
interface Serial0/1:0
no ip address
encapsulation ppp
ppp multilink
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
233
BCP Support on MLPPP
Additional References
Additional References
The following sections provide references related to BCP Support on MLPPP feature.
Related Documents
Related Topic Document Title
Cisco IOS commands Cisco IOS Master Commands List, All Releases
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
234
BCP Support on MLPPP
MIBs
MIBs
MIB MIBs Link
None To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco
MIB Locator found at the following URL:
http://tools.cisco.com/ITDIT/MIBS/servlet/index
RFCs
RFC Title
RFC 3518 Point-to-Point Protocol (PPP) Bridging Control
Protocol (BCP)
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
235
BCP Support on MLPPP
Technical Assistance
Technical Assistance
Table 18: Technical Assistance
nokintpircD
seL
ew ocm
/hw
oc.s//pi:cw tT.ht
ocsoc/siC ic
lacinhc/eT bw e
trop/putS psor
etm ihtlsnxd.ebw ie
sniatnoc
sdnasuoht
f o
segap
f o
elbahcraes
lacinhcet
,tnetnoc
gnidulcni
skni l
o t
,stcudorp
,seogihnoclet
,onsiutols
lacinhcet
,spit
dn a
.slot
deretsR ige
m
oc.ocsC i
sresu
na c
go l
n i
mor f
siht
egap
o t
ssecca
neve
e rom
.tnetnoc
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
236
BCP Support on MLPPP
Feature Information for BCP Support on MLPPP
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
237
BCP Support on MLPPP
Feature Information for BCP Support on MLPPP
Cisco ASR 920 Series Aggregation Services Router Configuration Guide, Cisco IOS XE 17
238