Cisco 3900 Series, Cisco 2900 Series, and
Cisco 1900 Series
Integrated Services Routers Generation 2
Software Configuration Guide
April 10, 2015
Cisco Systems, Inc.
www.cisco.com
Cisco has more than 200 offices worldwide.
Addresses, phone numbers, and fax numbers
are listed on the Cisco website at
www.cisco.com/go/offices.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Cisco 3900 Series,Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Software Configuration Guide
This preface describes the objectives, audience, organization, conventions of this guide, and the
references that accompany this document set. The following sections are provided:
• Objectives, page iii
• Audience, page iii
• Organization, page iii
• Conventions, page v
• Related Documentation, page vi
• Searching Cisco Documents, page vii
This guide provides an overview and explains how to configure the various features for the Cisco 1900
series, Cisco 2900 series, and Cisco 3900 series integrated services routers generation 2 (ISR G2). Some
information may not apply to your particular router model.
Audience
This document is written for experienced technical workers who install, monitor, and troubleshoot
routers under a service contract, or who work for an information technology (IT) department.
Organization
This guide is divided into three parts:
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
• Part 1—Configuring the Router
• Part 2—Configuring the Access Point
• Part 3—Appendix
2iii
Organization
Part 1Configuring the RouterDescription
Module 1
Overview of Hardware and Software Describes new hardware and software features
in this release, features by platform, new slots,
common ports, and getting started tasks.
Module 2
Basic Router ConfigurationDescribes how to perform the basic router
configuration, interface configuration, and
routing configuration.
Module 3
Module 4
Configuring Backup Data Lines and
Remote Management
Configuring Power Efficiency
Management
Describes how to configure backup interfaces,
dial backup, and remote management.
Describes the hardware and software power
efficiency management features on the router.
See Cisco EnergyWise Configuration Guide for
information about configuring power efficiency
management on modules and interface.
Module 5
Module 6
Module 7
Configuring Security FeaturesDescribes how to configure security features.
Unified Communications on Cisco
Integrated Services Routers
Describes voice application services that are
supported on these routers.
Describes how to configure the new
next-generation PVDM3
router.
Module 8
Multi-Gigabit Fabric
Communication
Describes how modules and interface cards
inter-communicate using the MGF
router.
Module 9
Upgrading the Cisco IOS SoftwareDescribes how to upgrade the Cisco IOS
software image on the router or the access
point.
Part 2Configuring the Access PointDescription
Module 1
Wireless OverviewDescribes the autonomous image and recovery
image shipped on the Cisco 1941W access point
flash. Explains the default autonomous mode
and Cisco Unified mode.
Module 2
Configuring the Wireless DeviceDescribes how to configure the autonomous
wireless device, how to upgrade the
autonomous software to Cisco Unified
software, and how to configure a Unified
wireless device.
Module 3
Configuring the Radio Settings Describes how to configure the radio settings
for the wireless device.
Module 4
Administering the Wireless DeviceDescribes many administration tasks for the
wireless device.
Part 3AppendixDescription
Appendix A
Cisco IOS CLI for Initial
Configuration
Describes how to perform the initial
configuration of the router using the Cisco IOS
CLI, and additional configuration procedures
for the router.
1
installed on your
2
on the
Preface
2iv
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Preface
Conventions
Conventions
This document uses the following conventions:
Appendix B
Using CompactFlash Memory Cards Describes how to use Advanced Capability CF3
memory cards on the router.
Appendix C
Using ROM MonitorDescribes how to use the ROM monitor to
manually load a system image, upgrade the
system image when there are no TFTP servers
or network connections, or prepare for disaster
recovery.
Appendix D
Changing the Configuration
Register Settings
Describes the 16-bit configuration register in
NVRAM and how to make changes to the
register settings using the Cisco IOS CLI.
1. PVDM3 = packet voice/data module
2. MGF = Multi-Gigabit Fabric.
3. CF = CompactFlash.
ConventionIndication
bold fontCommands and keywords and user-entered text appear in bold font.
italic fontDocument titles, new or emphasized terms, and arguments for which you supply
values are in italic font.
[ ]Elements in square brackets are optional.
{x | y | z }Required alternative keywords are grouped in braces and separated by
vertical bars.
[ x | y | z ]Optional alternative keywords are grouped in brackets and separated by
vertical bars.
stringA nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
courier fontTerminal sessions and information the system displays appear in courier font.
< >Non-printing characters such as passwords are in angle brackets.
[ ]Default responses to system prompts are in square brackets.
!, #An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
NoteMeans reader take note.
TipMeans the following information will help you solve a problem.
CautionMeans reader be careful. In this situation, you might perform an action that could result in equipment
damage or loss of data.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
2v
Related Documentation
TimesaverMeans the described action saves time. You can save time by performing the action described in
the paragraph.
Preface
Warning
Means reader be warned. In this situation, you might perform an action that could result in
bodily injury.
Related Documentation
In addition to the Cisco 1900 series, Cisco 2900 series, and Cisco 3900 series ISR Software
Configuration Guide (this document), the following reference guides are included:
Type of DocumentLinks
Hardware
• Read Me First for the Cisco 1900 Series, 2900 Series, and 3900 Series
Integrated Services Routers.
• Regulatory Compliance and Safety Information for Cisco 1900 Series
Integrated Services Routers.
• Cisco 2900 Series and 3900 Series Integrated Services Routers
Hardware Installation Guide
• Cisco 1900 Series Integrated Services Routers Hardware Installation
Cisco IOS software release 15.0 is the next IOS release following the Cisco
IOS 12.4(24)T release. For information about new features in Cisco IOS
software release 15.0, see the Cisco IOS software pages at Cisco.com.
Go here to read a product bulletin that specifies the software feature sets
available for Cisco 1900, 2900 and 3900 Series Integrated Services
Routers in release 15.0. It also issues recommendations for Flash and
DRAM memory configuration.
• Connecting Cisco EtherSwitch Service Modules to the Network.
• Cisco EtherSwitch Service Modules Feature Guide.
Searching Cisco Documents
To search a Hyper Text Markup Language (HTML) document using a web browser, press Ctrl-F
(Windows) or Cmd-F (Apple). In most browsers, the option to search whole words only, invoke case
sensitivity, or search forward and backward is also available.
To search a PDF document in Adobe Reader, use the basic Find toolbar (Ctrl-F) or the Full Reader
Search window (Shift-Ctrl-F). Use the Find toolbar to find words or phrases within a specific document.
Use the Full Reader Search window to search multiple PDF files simultaneously and to change case
sensitivity and other options. Adobe Reader’s online help has more information about how to search PDF
documents.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
2vii
Searching Cisco Documents
Preface
2viii
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Overview of the Hardware and Software
The Cisco 3900 series, Cisco 2900 series, and Cisco 1900 series integrated services routers (ISRs) offer
secure, wire-speed delivery of concurrent data, voice, and video services. The modular design of these
routers provides maximum flexibility, allowing you to configure your router to meet evolving needs.
The routers offer features such as hardware-based virtual private network (VPN) encryption
acceleration, intrusion-protection and firewall functions, and optional integrated call processing and
voice mail. A wide variety of legacy network modules and interfaces, service modules (SMs), internal
services modules (ISMs), next-generation packet voice/data modules (PVDM3), Services Performance
Engines (SPEs), high-density interfaces for a wide range of connectivity requirements, and sufficient
performance and slot density for future network expansion requirements and advanced applications are
available.
Power-saving hardware and software features are incorporated throughout the series. These routers
provide access to the multi-gigabit fabric, which provides a connection between switch ports without
using up external ports. The logical Gigabit Ethernet (GE) interface on the router connects external and
internal modules through the backplane for LAN and WAN switching. Software feature upgrades are
provided through software licensing.
The following sections describe the Cisco 3900 series, 2900 series, and 1900 series ISRs:
• Feature Information, page 2
• New Features by Platform, page 4
• New Slots, page 4
• New Slots and Ports by Platform, page 5
• Common Ports, page 6
• Licensing, page 6
• Getting Started, page 7
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
1
Feature Information
Feature Information
Table 1Feature Information
FeatureDescription
Services Performance
Engine
Cryptographic Engine
Accelerator
USB ConsoleCisco 3900 series, 2900 series, and 1900 series ISRs provide an additional
Power ManagementSome modules and interface cards that are inserted in new slots provide
Chapter Overview of the Hardware and Software
1
SPEs
are modular motherboards on Cisco 3900 series ISRs. The SPE
houses PVDM3 slots, system memory slots, and the ISM slot. The SPE
provides a modular approach to system upgrades. You simply slide out the
SPE from the router to replace internal modules, or upgrade the SPE to
improve router performance. See Cisco 2900 series and 3900 series
Integrated Services Routers Hardware Installation Guide for instructions.
Cisco 3900 series routers with either Services Performance Engine 200 or
Services Performance Engine 250 have an onboard cryptographic
accelerator that is shared between SSLVPN and IPSec. By default,
acceleration of SSL is disabled so IPSec performance is maximized.
See the “Configuring Security Features” section on page 127 in this guide
for information about enabling the SSLVPN feature.
mechanism for configuring the system through a USB
2
serial console port.
The traditional RJ-45 serial console port is also available.
hardware and software power management features described below:
• High efficiency AC power supplies
• Electrical components with built-in power saving features, such as
RAM select and clock gating
• Ability to disable unused clocks to modules and peripherals
• Ability to power down unused modules and put peripherals into a
reset state, put front panel ports and unused internal components in a
shutdown or reset state
Advanced Capability
CompactFlash
Cisco 3900 series, 2900 series, and 1900 series ISRs use Advanced
Capability CF
3
memory to store the system image, configuration files, and
some software data files.
SFP/Gigabit Ethernet Port Cisco 2921, Cisco 2951 and Cisco 3900 Series routers have an
SFP/Gigabit Ethernet port that supports copper and fiber concurrent
connections. Media can be configured for failover redundancy when the
network goes down. For more information, see the “Configuring Backup
Data Lines and Remote Management” section on page 97.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
2
Chapter Overview of the Hardware and Software
Table 1Feature Information (continued)
FeatureDescription
New Modules and
Interface Cards
Multi-Gigabit Fabric
Communication
Integrated Application
Services Features
Feature Information
Cisco 3900 series, 2900 series, and 1900 series ISRs introduce the
following new modules and interface cards, which are inserted in the
following new router slots:
• EHWIC
• PVDM3
• ISM
• SM
NoteSee the router’s product page at Cisco.com for a complete list of
supported modules and interfaces.
Cisco 3900 series, Cisco 2900 series, and Cisco 1900 series ISRs use a
4
MGF
for the new modules and interface cards to inter-communicate on
the router. Legacy modules that support Cisco HIMI
5
also support MGF
to inter-communicate on the router. Next generation module drivers
integrate with the MGF to perform port configurations, configure packet
flow, and control traffic buffering. All configurations are performed from
the module-side, which may or may not lead to changes on the MGF. For
more information, see the “Configuring Multi-Gigabit Fabric
Communication” section on page 211.
Cisco 3900 series, 2900 series, and 1900 series ISRs offer integrated
security features and voice features.
• See the “Configuring Security Features” section on page 127
• See the “Unified Communications on Cisco Integrated Services
1. Must have Services Performance Engine 200 installed in the router.
2. Must have Services Performance Engine 250 installed in the router.
3. Does not support Voice application services.
4. Does not support Voice application services. Includes embedded wireless access point that supports Cisco Unified Wireless Architecture.
3
4
Y
Y Y YYYYYY
2
Y
New Slots
Cisco 3900 series, 2900 series, and 1900 series ISRs have introduced new slots on the chassis. The first
column in Tabl e 3 lists the new slot names. The second column lists the corresponding old slot names.
Modules previously inserted in the old slots now insert in the new slots with the help of an adapter card.
For instance, network modules (NMs), enhanced network modules (NMEs), and extension voice
modules (EVMs) use an adapter, or carrier card, to insert into the SM slot. See your router’s hardware
installation guide for adapter information.
Table 3New Slot Names and Old Slot Names
New Slot NamesOld Slot Names
EHWICHWIC,HWIC-DW, WIC, VWIC, VIC
ISMAIM
1
PVDM3PVDM
SMNM, NME, EVM
2
SPE
1. AIM is not supported in this release. See your hardware installation guide for more information.
2. The SPE is available only on the Cisco 3900 series ISRs.
—
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
4
Chapter Overview of the Hardware and Software
New Slots and Ports by Platform
This section provides the type and number of the slots and ports available in the Cisco 3900 series,
2900 series, and 1900 series ISRs.
• Cisco 3900 Series ISRs, page 5
• Cisco 2900 Series ISRs, page 5
• Cisco 1900 Series ISRs, page 6
Cisco 3900 Series ISRs
Table 4 lists the slots and ports available on Cisco 3900 series routers.
To view the installation guide, see the following URL
1. One of the two EWHIC slots is adouble-wide EWHIC slot,giving the appearance of three EWHIC slots.
Common Ports
The following ports are common among Cisco 3900 series, Cisco 2900 series, and Cisco 1900 series
routers:
• Gigabit Ethernet RJ45—Ports available through an RJ45 connector.
• Gigabit Ethernet RJ45/SFP—Ports available through RJ45- SFP connectors. Connection supports
fail-over if the secondary connection goes down.
• RS232 Aux—Supports modem control lines and remote administration for box-to-box redundancy
applications.
• RS232 Serial Console—Supports modem control lines and remote administration of the router with
the proprietary cable shipped in the box.
• Type A USB 2.0—Supports USB-based flash memory sticks, security tokens, and USB-compliant
devices.
• Type B mini-port USB Serial Console—Supports modem control lines and remote administration of
the router using a type B USB-compliant cable.
Dbl-Wide
1
EHWICSM
Dbl-Wide
SMISMPVDM3 WLAN CF
GE (RJ-45)
ports
Licensing
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
6
Cisco 3900 series, Cisco 2900 series, and Cisco 1900 series ISRs support Cisco IOS software
entitlement. Your router is shipped with the software image and the corresponding permanent licenses
for the technology packages and features that you specified preinstalled. You do not need to activate or
register the software prior to use. If you need to upgrade or install a new technology package or feature
see Software Activation on Integrated Services Router,
See the router-specific hardware installation guide to install the router in an appropriate location.
Connect the router with the appropriate cables. Supply power to the router and perform the initial
software configuration using Cisco Configuration Professional Express. After the initial configuration
is completed, perform the following steps:
Step 1Follow instructions in the “Basic Router Configuration” section on page 13 to perform additional router
configurations.
Step 2(Optional) If you are setting up the Cisco 1941W ISR, follow instructions in the “Configuring the
Wireless Device” section on page 247 to configure the embedded wireless device on the router.
Step 3Follow instructions in the “Configuring Security Features” section on page 127 to configure security
features on the router.
Step 4Follow instructions in the “Unified Communications on Cisco Integrated Services Routers” section on
page 169 to configure Voice features on the router.
Getting Started
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
7
IOS Commands
IOS Commands
Table 7 lists the Cisco IOS commands and features that can trigger an erase, write, or erase and write
operation on a device's boot flash. The erase or write of an attribute on the boot flash can hold the CPU
for a few milliseconds to complete the operation. The CPU hold can result in a functional impact on
protocols or applications that are extremely time sensitive, for instance, Bidirectional Forwarding
Detection (BFD) or routing protocols which use finely tuned short timers. For example, OSPF with fast
hellos and short dead timers.
Table 7Cisco IOS Commands
FunctionalityCommand NameDescription
Write to NV
memory.
Changing the
configuration
register value.
write memoryThis command
writes the device's
configuration in to
the Non-Volatile
RAM (NVRAM)
on the boot flash.
Use this command
in privileged
EXEC mode.
config-register
value
The router has a
16-bit
configuration
register in
NVRAM. Each bit
has value 1 (on or
set) or value 0 (off
or clear), and each
bit setting affects
the router
behavior upon the
next reload power
cycle. Use this
command in
Global
configuration
mode.
Chapter Overview of the Hardware and Software
Configuration
ExampleImpact
Router#write
memory
A BFD flap is triggered when one of the
following configuration elements are
activated or deactivated and configuration is
saved to memory:
(config)#warm-reboot
(config)#boot config
(config)#boot system
Router(config)#
Potential enough to flap bfd.
config-register
0xvalue
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
8
Chapter Overview of the Hardware and Software
Table 7Cisco IOS Commands
FunctionalityCommand NameDescription
Copy running
configuration to
startup
configuration.
copy
running-config
startup-config
This command
copies running
configuration to
startup
configuration.
Changing boot
variables.
boot {bootstrap |
config |host|
netowrk |
system}
This command
configures
bootstrap image
file, configuration
file, router
specific config
file, Networkwide
config file or
system image file.
Setting the
system software
clock manually.
clock set
hh:mm:ss day
month year
To manually set
the system
software clock,
use one of the
formats of the
clock set
command in
privileged EXEC
mode.
Configuration
ExampleImpact
Router#copy
running-config
startup-config
A BFD flap is not triggered for all 'write
mem' commands. For instance, when the
configuration attributes changes without
either a write or an erase+write on the
NVRAM, the BFD is not triggered.
In the following example, when one of the
configuration elements are
activated/deactivated and the configuration
is saved using the 'write mem' command, the
flap is triggered:
(config)#warm-reboot
(config)#boot config
(config)#boot system
Router(config)#bo
Potential enough to flap bfd.
ot bootstrap
Router#clock set
Potential enough to flap bfd.
13:32:00 23 July
1997
NoteEvery time the command is issued.
IOS Commands
clock set
hh:mm:ss day
month year
clock set
hh:mm:ss month
day year
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
9
IOS Commands
Table 7Cisco IOS Commands
FunctionalityCommand NameDescription
Random
Entropy
No special
Command exists
for this.
After the system
boot up, entropy is
collected by
accessing the
security chip. This
is potential
enough to flap the
BFD session
immediately after
the router boots
up.
Crashing the
router on user’s
wish.
test crashThis is a hidden
Cisco IOS
command to crash
the Cisco router
on a user’s wish.
License EULAlicense accept
end user
agreement
To accept the
End-user License
Agreement
(EULA) for all
Cisco IOS
software packages
and features at one
time.
RTC Battery
Failure
No CLIWrite the event of
losing battery for
Real Time Clock.
Chapter Overview of the Hardware and Software
Configuration
ExampleImpact
No commandPotential enough to flap bfd.
Router#test crashPotential enough to flap bfd.
Router(config)#lice
Potential enough to flap bfd.
nse accept end
user agreement
No CLIPotential enough to flap bfd.
NoteThis is a one-time event during a
hardware failure.
Erasing NV
memory.
Erasing
startup-config
Erasing NV
memory.
Writing
configuration to
memory.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
10
erase nvramThis command
erases the nvram:
file system.
erase
startup-config
This command
erases startup
configurations.
write eraseThis command
erases the NV
memory.
writeThis command
quickly saves
config to memory.
Router#erase
Potential enough to flap bfd.
nvram:
Router#erase
Potential enough to flap bfd.
startup-config
Router#write erase Potential enough to flap bfd.
Router#writePotential enough to flap bfd.
Chapter Overview of the Hardware and Software
Table 7Cisco IOS Commands
FunctionalityCommand NameDescription
Reloading the
router.
reloadThis command
reloads the router.
The reload time is
written to NV
memory.
To boot a new
software license
on routing
platforms, use the
license boot
module command
in global
configuration
mode.
Configuration
ExampleImpact
Router#reloadPotential enough to flap bfd.
Router(config)#
Potential enough to flap bfd.
warm-reboot
count 10 uptime
10
Router(config)#
Potential enough to flap bfd.
license boot
module c2900
technology-packa
ge datak9
IOS Commands
Enabling or
disabling USB
ports.
Disabling access
to ROMMON.
config mode :
hw-module usb
[no] service
password-recove
ry
Enable or disable
USB ports from
IOS config mode.
This command
disables all access
to ROMMON.
Router(config)#hw
-module usb
disable
Router(config)#no
hw-module usb
disable
Router# no service
password-recover
y
Will trigger a BFD flap.
Potential enough to flap bfd.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
11
IOS Commands
Chapter Overview of the Hardware and Software
12
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Basic Router Configuration
This module provides configuration procedures for Cisco 3900 series, Cisco 2900 series, and Cisco 1900
series integrated services routers (ISRs). It also includes configuration examples and verification steps
whenever possible.
NoteSee Appendix A, “Cisco IOS CLI for Initial Configuration” for information on how to perform the initial
configuration using the Cisco Internet Operating System (IOS) command line interface on Cisco 3900
series, Cisco 2900 series, and Cisco 1900 series integrated services routers.
• Configuring Interface Card and Module Interfaces, page 19
• Configuring a Loopback Interface, page 19
Routing Configuration
• Configuring Command-Line Access, page 21
• Configuring Static Routes, page 23
• Configuring Dynamic Routes, page 25
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
13
Default Configuration
Default Configuration
When you boot up your Cisco router for the first time, you notice some basic configuration has already
been performed. Use the show running-config command to view the initial configuration, as shown in
the following example.
Router# show running-config
Building configuration...
Current configuration : 723 bytes
!
version 12.4
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
logging message-counter syslog
!
no aaa new-model
!
no ipv6 cef
ip source-route
ip cef
!
!
!
!
multilink bundle-name authenticated
!
!
archive
log config
hidekeys
!
!
!
!
!
interface GigabitEthernet0/0
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/1
no ip address
shutdown
duplex auto
speed auto
!
interface GigabitEthernet0/2
no ip address
shutdown
duplex auto
speed auto
!
ip forward-protocol nd
Chapter Basic Router Configuration
14
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Basic Router Configuration
!
no ip http server
!
!
!
!
!
control-plane
!
!
line con 0
line aux 0
line vty 0 3
login
!
exception data-corruption buffer truncate
scheduler allocate 20000 1000
end
Configuring Global Parameters
Configuring Global Parameters
SUMMARY STEPS
DETAILED STEPS
Step 1
Step 2
To configure the global parameters for your router, follow these steps.
1. configure terminal
2. hostname name
3. enable secret password
4. no ip domain-lookup
CommandPurpose
configure terminal
Enters global configuration mode, when using the
console port.
Router(config)# no ip domain-lookup
Router(config)#
For complete information on global parameter commands, see the Cisco IOS Release configuration
guide documentation set.
Configuring I/O Memory Allocation
Chapter Basic Router Configuration
Specifies an encrypted password to prevent
unauthorized access to the router.
Disables the router from translating unfamiliar
words (typos) into IP addresses.
Example
To reallocate the percentage of DRAM in use for I/O memory and processor memory on Cisco 3925E
and Cisco 3945E routers, use the memory-size iomemi/o-memory-percentage command in global
configuration mode. To revert to the default memory allocation, use the no form of this command. This
procedure enables smartinit.
Syntax Description
i/o-memory-percentage The percentage of DRAM allocated to I/O memory. The values permitted
are 5, 10, 15, 20, 25, 30, 40, and 50. A minimum of 201 MB of memory is
required for I/O memory.
TipWe recommend that you configure the memory-size iomem below 25%. Any value above 25% should be
used only for enhancing IPSec performance.
When you specify the percentage of I/O memory in the command line, the processor memory
automatically acquires the remaining percentage of DRAM memory.
The following example allocates 25% of the DRAM memory to I/O memory and the remaining 75% to
processor memory:
Router#config t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# memory-size iomem 5
IO memory size too small: minimum IO memory size is 201M
Router(config)#
Router(config)# memory-size iomem ?
<5-50> percentage of DRAM to use for I/O memory: 5, 10, 15, 20, 25, 30, 40, 50
16
Router(config)# memory-size iomem 25
Smart-init will be disabled and new I/O memory size will take effect upon reload.
Router(config)# end
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Basic Router Configuration
Verifying IOMEM Setting
Router# show run
Current configuration : 6590 bytes
!
! Last configuration change at 16:48:41 UTC Tue Feb 23 2010 !
version 15.1
service timestamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
service internal
!
hostname Router1
!
!
no aaa new-model
!
memory-size iomem 25
!
Interface Ports
Interface Ports
Table 1 lists the interfaces that are supported on Cisco 3900 series, Cisco 2900 series, and Cisco 1900
not supportednot supportednot supportedinterface 2/port5
Wide-SM
Interfaces HWIC on
not supportednot supportedinterface1wic-slot/
SM
Interfaces VWIC on
SM
1. On the Cisco 2901 router, the numbering format for configuring an asynchronous interface is 0/slot/port. To configure the line associated with an
asynchronous interface, simply use the interface number to specify the asynchronous line. For example, line 0/1/0 specifies the line associated with
interface serial 0/1/0 on a WIC-2A/S in slot 1. Similarly, line 0/2/1 specifies the line associated with interface async 0/2/1 on a WIC-2AM in slot 2.
2. MGF = multi-gigabit fabric
3. Applies only to Cisco 2951, Cisco 3925, and Cisco 3925E routers.
4. Applies only to Cisco 3945 and Cisco 3945E routers.
5. Applies only to Cisco 2951, Cisco 3925, and Cisco 3925E routers.
6. Applies only to Cisco 3945 and Cisco 3945E routers.
7. Applies only to Cisco 2951, Cisco 3925, and Cisco 3925E routers.
8. Applies only to Cisco 3945 and Cisco 3945E routers.
1
2911 & 29212951 & 3925 & 39453925E & 3945E
interface 2/port
6
interface 4/port
interface1-2/wic-
7
slot/port
interface1-4/wic-
8
slot/port
port
interface4/port
interface1-2/wicslot/port
interface1-4/wicslot/port
Configuring Gigabit Ethernet Interfaces
To manually define onboard Gigabit Ethernet (GE) interfaces, follow these steps, beginning in global
configuration mode.
SUMMARY STEPS
DETAILED STEPS
Step 1
Step 2
1. interface gigabitethernet slot/port
2. ip address ip-address mask
3. no shutdown
4. exit
CommandPurpose
interface gigabitethernet slot/port
Enters the configuration mode for a Gigabit
Ethernet interface on the router.
Sets the IP address and subnet mask for the
specified GE interface.
Example:
Router(config-if)# ip address 192.168.12.2
255.255.255.0
Router(config-if)#
18
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Basic Router Configuration
CommandPurpose
Step 3
Step 4
no shutdown
Example:
Router(config-if)# no shutdown
Router(config-if)#
exit
Example:
Router(config-if)# exit
Router(config)#
Configuring Wireless LAN Interfaces
The wireless LAN interface on the Cisco 1941W router enables connection to the router through
interface wlan-ap0. For more information about configuring a wireless connection, see the
“Configuring the Wireless Device” section on page 247.
Configuring Wireless LAN Interfaces
Enables the GE interface, changing its state
from administratively down to administratively
up.
Exits configuration mode for the GE interface
and returns to global configuration mode.
Configuring Interface Card and Module Interfaces
To configure interface cards and modules inserted in internal services module (ISM), enhanced
high-speed WAN interface card (EHWIC), Ethernet WAN interface card (EWIC), and service module
(SM) slots, see the appropriate interface card or module configuration documents on Cisco.com.
Configuring a Loopback Interface
The loopback interface acts as a placeholder for the static IP address and provides default routing
information.
For complete information on the loopback commands, see the Cisco IOS Release configuration guide
documentation set.
To configure a loopback interface, follow these steps, beginning in global configuration mode.
SUMMARY STEPS
1. interface type number
2. ip address ip-address mask
3. exit
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
19
Configuring a Loopback Interface
DETAILED STEPS
Step 1
Step 2
Step 3
CommandPurpose
interface type number
Enters configuration mode for the loopback
interface.
Sets the IP address and subnet mask for the
loopback interface.
Example:
Router(config-if)# ip address 10.108.1.1
255.255.255.0
Router(config-if)#
exit
Exits configuration mode for the loopback
interface and returns to global configuration
Example:
Router(config-if)# exit
Router(config)#
mode.
Chapter Basic Router Configuration
Example
The loopback interface in this sample configuration is used to support Network Address Translation
(NAT) on the virtual-template interface. This configuration example shows the loopback interface
configured on the gigabit ethernet interface with an IP address of 200.200.100.1/24, which acts as a static
IP address. The loopback interface points back to virtual-template1, which has a negotiated IP address.
!
interface loopback 0
ip address 200.200.100.1 255.255.255.0 (static IP address)
ip nat outside
!
interface Virtual-Template1
ip unnumbered loopback0
no ip directed-broadcast
ip nat outside
!
Verifying Configuration
To verify that you have properly configured the loopback interface, enter the show interface loopback
command. You should see verification output similar to the following example.
Router# show interface loopback 0
Loopback0 is up, line protocol is up
Hardware is Loopback
Internet address is 200.200.100.1/24
MTU 1514 bytes, BW 8000000 Kbit, DLY 5000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation LOOPBACK, loopback not set
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/0, 0 drops; input queue 0/75, 0 drops
20
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Another way to verify the loopback interface is to ping it:
Router# ping 200.200.100.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 200.200.100.1, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/2/4 ms
Configuring Command-Line Access
To configure parameters to control access to the router, follow these steps, beginning in global
configuration mode.
Configuring Command-Line Access
NoteThe TTY lines are asynchronous lines used for inbound or outbound modem and terminal connections
SUMMARY STEPS
and can be seen in a router or access server configuration as line x. The specific line numbers are a
function of the hardware built into or installed on the router or access server. In Cisco ISR G2 series
routers, the TTY lines are incremented by 1 and start with line number3 instead of line number 2 in Cisco
ISR G1 series routers. In ISR G2 series routers, line number 2 cannot be accessed since it has been used
for the second core feature.TTY lines are not static and line numbers can be changed in future when more
features are added similar to the second core.
1. line [aux | console | tty | vty] line-number
2. password password
3. login
4. exec-timeout minutes [seconds]
5. line [aux | console | tty | vty] line-number
6. password password
7. login
8. end
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
21
Configuring Command-Line Access
DETAILED STEPS
Step 1
Step 2
Step 3
Step 4
Step 5
Step 6
Step 7
Step 8
CommandPurpose
line [aux | console | tty | vty] line-number
Enters line configuration mode, and specifies the
type of line.
Example:
Router(config)# line console 0
Router(config-line)#
passwordpassword
This example specifies a console terminal for
access.
Specifies a unique password for the console
terminal line.
Enables password checking at the virtual terminal
session login.
Example:
Router(config-line)# login
Router(config-line)#
end
Exits line configuration mode, and returns to
privileged EXEC mode.
Example:
Router(config-line)# end
Router#
Chapter Basic Router Configuration
22
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Basic Router Configuration
Example
The following configuration shows the command-line access commands.
You do not need to input the commands marked “default.” These commands appear automatically in the
configuration file generated when you use the show running-config command.
!
line con 0
exec-timeout 10 0
password 4youreyesonly
login
transport input none (default)
stopbits 1 (default)
line vty 0 4
password secret
login
!
Configuring Static Routes
Configuring Static Routes
SUMMARY STEPS
DETAILED STEPS
Step 1
Step 2
Static routes provide fixed routing paths through the network. They are manually configured on the
router. If the network topology changes, the static route must be updated with a new route. Static routes
are private routes unless they are redistributed by a routing protocol.
To configure static routes, follow these steps, beginning in global configuration mode.
1. ip route prefix mask {ip-address | interface-type interface-number [ip-address]}
2. end
CommandPurpose
ip route prefix mask {ip-address | interface-type
interface-number [ip-address]}
Example:
Router(config)# ip route 192.168.1.0
255.255.0.0 10.10.10.2
Router(config)#
end
Specifies the static route for the IP packets.
For details about this command and about
additional parameters that can be set, see Cisco
IOS IP Command Reference, Volume 2 of 4:
Routing Protocols, Release 12.3
Exits router configuration mode, and enters
privileged EXEC mode.
Example:
Router(config)# end
Router#
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
23
Configuring Static Routes
Example
Chapter Basic Router Configuration
In the following configuration example, the static route sends out all IP packets with a destination IP
address of 192.168.1.0 and a subnet mask of 255.255.255.0 on the Gigabit Ethernet interface to another
device with an IP address of 10.10.10.2. Specifically, the packets are sent to the configured PVC.
You do not need to enter the command marked “(default).” This command appears automatically in the
configuration file generated when you use the show running-config command.
!
ip classless (default)
ip route 192.168.1.0 255.255.255.0 10.10.10.2!
24
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Basic Router Configuration
Verifying Configuration
To verify that you have properly configured static routing, enter the show ip route command and look
for static routes signified by the “S.”
You should see verification output similar to the following:
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 1 subnets
C 10.108.1.0 is directly connected, Loopback0
S* 0.0.0.0/0 is directly connected, FastEthernet0
Configuring Dynamic Routes
Configuring Dynamic Routes
In dynamic routing, the network protocol adjusts the path automatically, based on network traffic or
topology. Changes in dynamic routes are shared with other routers in the network.
The Cisco routers can use IP routing protocols, such as Routing Information Protocol (RIP) or Enhanced
Interior Gateway Routing Protocol (EIGRP), to learn routes dynamically. You can configure either of
these routing protocols on your router.
• “Configuring Routing Information Protocol” section on page 25
Disables automatic summarization of subnet routes
into network-level routes. This allows subprefix
Example:
Router(config-router)# no auto-summary
Router(config-router)#
end
routing information to pass across classful network
boundaries.
Exits router configuration mode, and enters
privileged EXEC mode.
Example:
Router(config-router)# end
Router#
Chapter Basic Router Configuration
Example
26
The following configuration example shows RIP version 2 enabled in IP network 10.0.0.0 and
192.168.1.0.
To see this configuration, use the show running-config command from privileged EXEC mode.
!
Router# show running-config
router rip
version 2
network 10.0.0.0
network 192.168.1.0
no auto-summary
!
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Basic Router Configuration
Verifying Configuration
To verify that you have properly configured RIP, enter the show ip route command and look for RIP
routes signified by “R.” You should see a verification output like the example shown below.
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 1 subnets
C 10.108.1.0 is directly connected, Loopback0
R 3.0.0.0/8 [120/1] via 2.2.2.1, 00:00:02, Ethernet0/0
Exits router configuration mode, and enters
privileged EXEC mode.
Example:
Router(config-router)# end
Router#
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
27
Configuring Dynamic Routes
Example
The following configuration example shows the EIGRP routing protocol enabled in IP networks
192.145.1.0 and 10.10.12.115. The EIGRP autonomous system number is 109.
To see this configuration use the show running-config command, beginning in privileged EXEC mode.
Router# show running-config
...
!
router eigrp 109
network 192.145.1.0
!
...
Verifying Configuration
To verify that you have properly configured IP EIGRP, enter the show ip route command, and look for
EIGRP routes indicated by “D.” You should see verification output similar to the following:
Router# show ip route
Codes: C - connected, S - static, R - RIP, M - mobile, B - BGP
D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area
N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2
E1 - OSPF external type 1, E2 - OSPF external type 2
i - IS-IS, su - IS-IS summary, L1 - IS-IS level-1, L2 - IS-IS level-2
ia - IS-IS inter area, * - candidate default, U - per-user static route
o - ODR, P - periodic downloaded static route
Chapter Basic Router Configuration
network 10.10.12.115
Gateway of last resort is not set
10.0.0.0/24 is subnetted, 1 subnets
C 10.108.1.0 is directly connected, Loopback0
D 3.0.0.0/8 [90/409600] via 2.2.2.1, 00:00:02, Ethernet0/0
28
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Configuring Ethernet CFM and Y.1731
Performance Monitoring on Layer 3 Interfaces
This chapter provides procedures for configuring the network interface device functionality, Ethernet
data plane loopback, IEEE connectivity fault management, and Y.1731 performance monitoring, and
contains the following sections:
• Configuring a Network Interface Device on the L3 Interface, page 29
• Ethernet Data Plane Loopback, page 32
• CFM Support on Routed Port and Port MEP, page 38
• Support for Y.1731 Performance Monitoring on a Routed Port (L3 Subinterface), page 54
Configuring a Network Interface Device on the L3 Interface
Configuring a Network Interface Device (NID) enables support for the NID functionality on the router
without including a NID hardware in the network. This feature combines the Customer-Premises
Equipment (CPE) and the NID functionality into a physical device. The following are the advantages of
configuring the NID functionality:
• Eliminates a physical device.
• Supports both the managed CPE feature set and the NID requirements.
NoteThis feature is supported only if you have purchased the DATA technology package functionality
(datak9) licensing package. For more information about managing software activation licenses on the
Cisco ISR and Cisco ISR G2 platforms, see
Use the following commands to verify the port tagging sessions:
• show run int
• ping
Use the show run int command to display the port tagging sessions:
Router#show run int gi0/2
Building configuration...
Current configuration : 10585 bytes
!
interface GigabitEthernet0/2
no ip address
duplex auto
speed auto
port-tagging
encapsulation dot1q 10
set cos 6
exit
end
!
interface GigabitEthernet0/2.1101
encapsulation dot1Q 100
ip address 132.1.101.4 255.255.255.0
!
interface GigabitEthernet0/2.1102
encapsulation dot1Q 100
ip address 132.1.102.4 255.255.255.0
!
Configuring a Network Interface Device on the L3 Interface
Use the ping command to verify the connectivity with port tagging configured:
Router#ping132.1.101.3
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 132.1.101.3, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms
router#
Troubleshooting the NID Configuration
Table 1 lists the debug commands to troubleshoot the issues pertaining to the NID functionality.
The Cisco IOS Master Command List at
http://www.cisco.com/en/US/docs/ios/mcl/allreleasemcl/all_book.html provides more information
about these commands.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
31
Ethernet Data Plane Loopback
CautionBecause debugging output is assigned high priority in the CPU process, it can diminish the performance
of the router or even render it unusable. For this reason, use debug commands only to troubleshoot
specific problems or during troubleshooting sessions with Cisco technical support staff.
NoteBefore you run any of the debug commands listed in the following table, ensure that you run the logging
buffered debugging command, and then turn off console debug logging using the no logging console
command.
Table 1debug Commands for NID Configuration
debug CommandPurpose
debug ethernet nid configurationEnables debugging of configuration-related issues.
debug ethernet nid packet egressEnables debugging of packet processing (VLAN tag
debug ethernet nid packet ingressEnables debugging of packet processing (VLAN tag
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
push) on the egress side.
pop) on the ingress side.
Ethernet Data Plane Loopback
The Ethernet Data Plane Loopback feature provides a means for remotely testing the throughput of an
Ethernet port. You can verify the maximum rate of frame transmission with no frame loss.
NoteThis feature is supported only if you have purchased the DATA technology package functionality
(datak9) licensing package. For more information about managing software activation licenses on the
Cisco ISR and Cisco ISR G2 platforms, see
NoteInternal Ethernet data plane loopback is not supported.
Restrictions for Configuring External Ethernet Data Plane Loopback
Follow the guidelines and take note of the restrictions listed here when configuring Ethernet data plane
loopback on a Layer 3 interface:
• Only external loopback (packets coming from the wire side) on the L3 dot1q subinterface and
(untagged) main interface are supported.
• To perform a MAC swap, the destination address and source address must be swapped for the
packets that are looped back. If the destination address is broadcast or multicast, the MAC address
is used as the source address for the packets that are looped back.
• Loopback operations are supported at line rate.
32
• Untagged frames are not supported on a subinterface. However, the frames for dot1q and qinq are
supported on a subinterface.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
361482
Router 1
Gi 0/0
Gi 0/0.1101customer 1101vlan 1101
Gi 0/0.1102customer 1102vlan 1102
Gi 0/0.1101customer 1101vlan 1101
Gi 0/0.1102customer 1102vlan 1102
Gi 0/0Gi 0/2
Gi 0/2.1101
Gi 0/2.1102
Providervlan 100
Carriervlan 10
Gi 0/2
Gi 0/2.1101
Gi 0/2.1102
vlan 100
Router 2
Metro Ethernet
• dot1ad is not supported on the main interface. However, untagged frames are supported on the main
interface.
• Single VLAN is supported as a filtering option for a subinterface, but VLAN list and VLAN range
are not supported.
• Only MAC address is supported as a filtering option for the main interface.
• For the filtering option, the destination MAC cannot be combined with inner VLAN or outer VLAN.
• There is no support for L3 and L4 loopback. Source and destination IP address or source and
destination ports will not be swapped.
• Connectivity Fault Management (CFM) packets are transparent to the data plane loopback
configuration and cannot be looped back.
• Packets coming from the other side of the wire where loopback is configured and having the same
destination MAC address are dropped.
• The broadcast and multicast IP addresses of the broadcast and multicast IP frames that are received
cannot be used as the source IP address of the frame when it is sent back to the initiator. In such a
case, the IP address of the subinterface is used as the source IP address of the frame when it is sent
back to the initiator.
Ethernet Data Plane Loopback
Configuring External Ethernet Data Plane Loopback
Configuring external Ethernet data plane loopback is permitted on a Layer 3 main interface and
subinterfaces.
Figure 1 represents a sample topology to configure Ethernet data plane loopback.
Figure 1Sample Topology
Gi 0/0
Gi 0/0.1101
customer 1101
vlan 1101
Gi 0/0.1102
customer 1102
vlan 1102
The following steps show how to configure external Ethernet data plane loopback on a subinterface using
single and double tagging. (The procedure to configure external Ethernet data plane loopback on the
main interface is similar to this procedure.)
This example shows how to start an Ethernet data plane loopback:
Router#ethernet loopback start local interface gigabitethernet 0/2.1101 external timeout
none
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
35
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Ethernet Data Plane Loopback
This is an intrusive loopback and the packets matched with the service will not be able to
pass through. Continue? (yes/[no]):
Enter yes to continue.
This example shows how to stop an Ethernet data plane loopback:
Router#ethernet loopback stop local interface gigabitethernet 0/2.1101 id 1
Router#*Oct 21 10:16:17.887: %E_DLB-6-DATAPLANE_LOOPBACK_STOP: Ethernet Dataplane Loopback
Stop on interface GigabitEthernet0/2 with session id 1
Router#show ethernet loopback active
Total Active Session(s): 0
Total Internal Session(s): 0
Total External Session(s): 0
Verifying the Ethernet Data Plane Loopback Configuration
Use the following commands to verify the Ethernet data plane loopback configuration:
• show ethernet loopback permitted
• show ethernet loopback active
Use the show ethernet loopback permitted command to view the loopback capabilities per interface:
Router#show ethernet loopback permitted
-------------------------------------------------------------------------------Interface SrvcInst Direction
Dot1q/Dot1ad(s) Second-Dot1q(s)
Use the show ethernet loopback active command to display the summary of the active loopback
sessions on a subinterface:
Router#show ethernet loopback active
Loopback Session ID : 1
Interface : GigabitEthernet0/2.1101
Service Instance : N/A
Direction : External
Time out(sec) : none
Status : on
Start time : *10:17:46.930 UTC Mon Oct 21 2013
Time left : N/A
Dot1q/Dot1ad(s) : 100
Second-dot1q(s) : 1101
Source Mac Address : Any
Destination Mac Address : Any
Ether Type : Any
Class of service : Any
Llc-oui : Any
Total Active Session(s): 1
Total Internal Session(s): 0
Total External Session(s): 1
Use the show ethernet loopback active command to display the summary of the active loopback
sessions on the main interface:
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Service Instance : N/A
Direction : External
Time out(sec) : none
Status : on
Start time : *10:14:23.507 UTC Mon Oct 21 2013
Time left : N/A
Dot1q/Dot1ad(s) : 1-100
Second-dot1q(s) : 1-1101
Source Mac Address : Any
Destination Mac Address : Any
Ether Type : Any
Class of service : Any
Llc-oui : Any
Total Active Session(s): 1
Total Internal Session(s): 0
Total External Session(s): 1
Troubleshooting the Ethernet Data Plane Loopback Configuration
Table 2 lists the debug commands to troubleshoot issues pertaining to the Ethernet Data Plane Loopback
feature.
Ethernet Data Plane Loopback
The Cisco IOS Master Command List at
http://www.cisco.com/en/US/docs/ios/mcl/allreleasemcl/all_book.html provides more information
about these commands.
CautionBecause debugging output is assigned high priority in the CPU process, it can diminish the performance
of the router or even render it unusable. For this reason, use debug commands only to troubleshoot
specific problems or during troubleshooting sessions with Cisco technical support staff.
NoteBefore you run any of the debug commands listed in the following table, ensure that you run the logging
buffered debugging command, and then turn off console debug logging using the no logging console
command.
Table 2debug Commands for Ethernet Data Plane Loopback Configuration
debug CommandPurpose
debug elb-pal-pd allDisplays all the debugging information about the
Ethernet data plane loopback configuration.
debug elb-pal-pd errorDisplays debugging information about Ethernet data
plane loopback configuration errors.
debug elb-pal-pd eventDisplays debugging information about Ethernet data
plane loopback configuration changes.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
37
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
CFM Support on Routed Port and Port MEP
CFM Support on Routed Port and Port MEP
IEEE Connectivity Fault Management (CFM) is an end-to-end per-service Ethernet-layer Operations,
Administration, and Maintenance (OAM) protocol. CFM includes proactive connectivity monitoring,
fault verification, and fault isolation for large Ethernet metropolitan-area networks (MANs) and WANs.
NoteThis feature is supported only if you have purchased the DATA technology package functionality
(datak9) licensing package. For more information about managing software activation licenses on the
Cisco ISR and Cisco ISR G2 platforms, see
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Services:
Type Id Dir CC CC-int Static-rmep Crosscheck MaxMEP Source MA-Name
Port none Dwn Y 100ms Disabled Disabled 100 Static carrier
Router#
Use the show ethernet cfm maintenance-points local command to view the MEPs that are configured
locally on a router. The following is a sample output of the show ethernet cfm maintenance-points local command:
Router#show ethernet cfm maintenance-points local
Local MEPs:
-------------------------------------------------------------------------------MPID Domain Name Lvl MacAddress Type CC
Ofld Domain Id Dir Port Id
MA Name SrvcInst Source
EVC name
-------------------------------------------------------------------------------44 carrier 2 5657.a844.04fa Port Y
No carrier Down Gi0/2 none
carrier N/A Static
N/A
Total Local MEPs: 1
CFM Support on Routed Port and Port MEP
Local MIPs: None
Use the show ethernet cfm maintenance-points remote command to display information about remote
maintenance point domains or levels. In the following example, carrier, Provider, and customer are the
maintenance point domains that are configured.
-------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain ID Ingress
RDI MA Name Type Id SrvcInst
EVC Name Age
Local MEP Info
-------------------------------------------------------------------------------43 carrier 5657.a86c.fa92 Up N/A
2 carrier Gi0/2
- carrier Port none N/A
N/A 0s
MPID: 44 Domain: carrier MA: carrier
33 Provider 5657.a86c.fa92 Up Up
5 Provider Gi0/2.100
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
41
CFM Support on Routed Port and Port MEP
Total Remote MEPs: 4
Use the show ethernet cfm maintenance-points remote command to view the details of a remote
maintenance point domain:
On router 1:
Router1#show ethernet cfm maintenance-points remote domain carrier service carrier
-------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain ID Ingress
RDI MA Name Type Id SrvcInst
EVC Name Age
Local MEP Info
-------------------------------------------------------------------------------43 carrier 5657.a86c.fa92 Up Up
2 carrier Gi0/2
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
On router 2:
Router2#show ethernet cfm maintenance-points remote domain carrier service carrier
-------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain ID Ingress
RDI MA Name Type Id SrvcInst
EVC Name Age
Local MEP Info
-------------------------------------------------------------------------------44 carrier 5657.g945.04fa Up Up
2 carrier Gi0/2
Use the ping command to verify if Loopback Messages (LBM) and Loopback Replies (LBR) are
successfully sent and received between the routers:
Router1#ping ethernet mpid 44 domain carrier service carrier cos 5
Type escape sequence to abort.
Sending 5 Ethernet CFM loopback messages to 5657.a86c.fa92, timeout is 5 seconds:!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
Router1#
Use the traceroute command to send the Ethernet CFM traceroute messages:
Router#traceroute ethernet mpid 44 domain carrier service carrier
Type escape sequence to abort. TTL 64. Linktrace Timeout is 5 seconds
Tracing the route to 5657.a86c.fa92 on Domain carrier, Level 2, service carrier
Traceroute sent via Gi0/2
42
B = Intermediary Bridge
! = Target Destination
* = Per hop Timeout
------------------------------------------------------------------------------- MAC Ingress Ingr Action Relay Action
Hops Host Forwarded Egress Egr Action Previous Hop
Verifying the Ethernet CFM Configuration for Single-Tagged Packets
Use the following commands to verify Ethernet CFM configured for single-tagged packets:
• show ethernet cfm domain
• show ethernet cfm maintenance-points local
• show ethernet cfm maintenance-points remote
• show ethernet cfm error configuration
Use the show ethernet cfm domain command to display the maintenance point domains configured in
the network. In the following example, customer, enterprise, and carrier maintenance point domains are
configured:
Router#show ethernet cfm domain
Domain Name: customer
Level: 7
Total Services: 1
Services:
Type Id Dir CC CC-int Static-rmep Crosscheck MaxMEP Source MA-Name
Vlan 100 Dwn Y 10s Disabled Disabled 100 Static customer1101
Domain Name: enterprise
Level: 6
Total Services: 1
Services:
Type Id Dir CC CC-int Static-rmep Crosscheck MaxMEP Source MA-Name
Vlan 110 Dwn Y 10s Disabled Disabled 100 Static custservice
Domain Name: carrier
Level: 2
Total Services: 1
Services:
Type Id Dir CC CC-int Static-rmep Crosscheck MaxMEP Source MA-Name
Vlan 200 Dwn Y 10s Disabled Disabled 100 Static carrier
Router#
Use the show ethernet cfm maintenance-points local command to view the local MEPs. The following
is a sample output of the show ethernet cfm maintenance-points local command:
Router#show ethernet cfm maintenance-points local
-------------------------------------------------------------------------------MPID Domain Name Lvl MacAddress Type CC
Ofld Domain Id Dir Port Id
MA Name SrvcInst Source
EVC name
-------------------------------------------------------------------------------100 customer 7 70ca.9b4d.a400 Vlan Y
46
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
No customer Down Gi0/2 100
customer1101 N/A Static
N/A
400 enterprise 6 70ca.9b4d.a400 Vlan I
No enterprise Down Gi0/1 110
custservice N/A Static
N/A
44 carrier 2 70ca.9b4d.a400 Vlan N
No carrier Down Gi0/2 200
carrier N/A Static
N/A
Total Local MEPs: 3
Local MIPs: None
Router#
Use the show ethernet cfm maintenance-points remote command to display information about remote
maintenance point domains or levels.
The following example displays the continuity check messages exchanged between remote MEPs:
----------------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain Ingress
RDI MA Type Id SrvcInst
EVC Name Age
Local MEP Info
----------------------------------------------------------------------------------------110 customer 70ca.9b4d.a400 Up Up
7 customer Gi0/2
----------------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain Ingress
RDI MA Type Id SrvcInst
EVC Name Age
Local MEP Info
Use the show ethernet cfm error configuration command to view Ethernet CFM configuration errors
(if any). The following is a sample output of the show ethernet cfm error configuration command:
Router#show ethernet cfm error configuration
-------------------------------------------------------------------------------CFM Interface Type Id Level Error type
Verififying the Ethernet CFM Configuration for Double-Tagged Packets
Use the following commands to verify Ethernet CFM configured for double-tagged packets:
• show ethernet cfm maintenance-points local
• show ethernet cfm maintenance-points remote
• ping ethernet mpid mpid-value domain domain-name service service-name cos value
50
• traceroute ethernet mpid mpid-value domain domain-name service service-name
• show ethernet cfm error configuration
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Use the show ethernet cfm maintenance-points local command to view the local MEPs. The following
is a sample output of the show ethernet cfm maintenance-points local command:
Router#show ethernet cfm maintenance-points local
---------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain ID Ingress
RDI MA Name Type Id SrvcInst
EVC Name Age
Local MEP Info
---------------------------------------------------------------------------------100 customer 8843.e154.6f01 Up Up
7 customer Gi0/2.1101
Use the show ethernet cfm maintenance-points remote command to display the remote maintenance
point domains. In the following example, customer, carrier, and enterprise are the maintenance point
domains that are configured:
---------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain ID Ingress
RDI MA Name Type Id SrvcInst
EVC Name Age
Local MEP Info
---------------------------------------------------------------------------------110 customer 8843.e154.6f01 Up Up
7 customer Gi0/2.1101
---------------------------------------------------------------------------------MPID Domain Name MacAddress IfSt PtSt
Lvl Domain ID Ingress
RDI MA Name Type Id SrvcInst
EVC Name Age
Local MEP Info
Use the ping command to verify if Ethernet CFM loopback messages are successfully sent and received
between the routers:
Router#ping ethernet mpid 100 domain customer service customer1101 cos 5
Type escape sequence to abort.
Sending 5 Ethernet CFM loopback messages to 8843.e154.6f01, timeout is 5 seconds:!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms
Router#
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Use the traceroute command to send the Ethernet CFM traceroute messages:
Router#traceroute ethernet mpid 100 domain customer service customer1101
Type escape sequence to abort. TTL 64. Linktrace Timeout is 5 seconds
Tracing the route to 8843.e154.6f01 on Domain customer, Level 7, service customer1101,
vlan 100 inner-vlan 30
Traceroute sent via Gi0/2.1101
B = Intermediary Bridge
! = Target Destination
* = Per hop Timeout
MAC Ingress Ingr Action Relay Action
Hops Host Forwarded Egress Egr Action Previous Hop
-------------------------------------------------------------------------------! 1 8843.e154.6f01 Gi0/2.1101 IngOk RlyHit:MEP
Not Forwarded 5657.a86c.fa92
Use the show ethernet cfm error configuration command to view Ethernet CFM configuration errors
(if any). The following is a sample output of the show ethernet cfm error configuration command:
Router#show ethernet cfm error configuration
-------------------------------------------------------------------------------CFM Interface Type Id Level Error type
Table 3 lists the debug commands to troubleshoot issues pertaining to the Ethernet CFM configuration.
The Cisco IOS Master Command List at
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
52
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
http://www.cisco.com/en/US/docs/ios/mcl/allreleasemcl/all_book.html provides more information
about these commands.
CautionBecause debugging output is assigned high priority in the CPU process, it can diminish the performance
of the router or even render it unusable. For this reason, use debug commands only to troubleshoot
specific problems or during troubleshooting sessions with Cisco technical support staff.
NoteBefore you run any of the debug commands listed in the following table, ensure that you run the logging
buffered debugging command, and then turn off console debug logging using the no logging console
command.
Table 3debug Commands for Ethernet CFM Configuration
debug CommandPurpose
debug ethernet cfm allEnables all Ethernet CFM debug messages.
debug ethernet cfm diagnosticEnables low-level diagnostic debugging of Ethernet
CFM general events or packet-related events.
debug ethernet cfm errorEnables debugging of Ethernet CFM errors.
debug ethernet cfm packetsEnables debugging of Ethernet CFM message
packets.
debug ecfmpal allEnables debug messages for all Ethernet CFM
platform events.
debug ecfmpal apiDisplays debug messages for all Ethernet CFM
platform API events.
debug ecfmpal commonDisplays debug messages for all Ethernet CFM
platform common events.
debug ecfmpal ecfmpalEnables debugging of all Ethernet CFM platform
events.
debug ecfmpal eplEnables debugging of all Ethernet CFM platform
endpoint list (EPL) events.
debug ecfmpal isrEnables debugging of all Ethernet CFM platform
interrupt service request (ISR) events.
CFM Support on Routed Port and Port MEP
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
53
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Support for Y.1731 Performance Monitoring on a Routed Port (L3 Subinterface)
Support for Y.1731 Performance Monitoring on a Routed Port (L3
Subinterface)
Y.1731 Performance Monitoring (PM) provides a standard Ethernet PM function that includes
measurement of Ethernet frame delay, frame delay variation, frame loss, and frame throughput
measurements specified by the ITU-T Y-1731 standard and interpreted by the Metro Ethernet Forum
(MEF) standards group.
NoteThis feature is supported only if you have purchased the DATA technology package functionality
(datak9) licensing package. For more information about managing software activation licenses on the
Cisco ISR and Cisco ISR G2 platforms, see
Ethernet frame delay measurement is used to measure frame delay and frame delay variations. Ethernet
frame delay is measured using the Delay Measurement Message (DMM) method.
Restrictions for Configuring Two-Way Delay Measurement
Follow the guidelines and restrictions listed here when you configure two-way delay measurement:
• Y.1731 PM measurement works only for a point-to-point network topology.
• The granularity of the clock for delay measurement is in seconds and nanoseconds.
• CFM Y.1731 packets work with a maximum of two VLAN tags. The expected behavior is not
observed with more VLAN tags. Also, CFM Y.1731 packets do not work with untagged cases.
Configuring Two-Way Delay Measurement
The following steps show how to configure two-way delay measurement. Both single and double tagging
methods are included in the steps listed below.
SUMMARY STEPS
Step 1enable
Step 2configure terminal
Step 3ip sla operation number
Step 4ethernet y1731 delay DMM domain value vlan vlan-id mpid value cos value source mpid value
or
54
ethernet y1731 delay DMM domain value vlan vlan-id inner-vlan inner vlan-id mpid value cos value
source mpid value
Step 5aggregate interval seconds
Step 6exit
Step 7ip sla schedule operation number start-time {start time | now}
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Support for Y.1731 Performance Monitoring on a Routed Port (L3 Subinterface)
Step 8end
DETAILED STEPS
CommandPurpose
Step 1
enable
Enables the privileged EXEC mode.
Enter your password when prompted.
Example:
Router> enable
Step 2
configure terminal
Enters the global configuration mode.
Example:
Router# configure terminal
Step 3
ip sla operation number
Enables the IP SLA configuration.
operation-number—The IP SLA operation you want to
configure.
Configures a two-way delay measurement.
NoteBoth single tagging and double tagging are
Step 4
Example:
Router(config)# ip sla 1101
ethernet y1731 delay DMM domain value
vlan vlan-id mpid value cos value
source mpid value
or
The following are the parameters:
ethernet y1731 delay DMM domain value
vlan vlan-id inner-vlan inner vlan-id
mpid value cos value source mpid
value
• delay—Specifies the delay distribution parameter.
router(config-sla-y1731-delay)#aggregate interval 30
router(config-sla-y1731-delay)#exit
router(config)#ip sla schedule 1101 life forever start-time now
router(config)#end
Verifying Two-Way Delay Measurement Configuration
Use the following commands to verify the performance-monitoring sessions:
• show run | sec ip sla
56
• show ip sla summary
• show ip sla statistics entry-number
• show ip sla configurationentry-number
• show ethernet cfm pm session summary
• show ethernet cfm pm session detail session-id
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Support for Y.1731 Performance Monitoring on a Routed Port (L3 Subinterface)
• show ethernet cfm pm session db session-id
The following are the sample outputs of the commands listed above:
Router#show run | sec ip sla
ip sla auto discovery
ip sla 1101
ethernet y1731 delay DMM domain customer vlan 100 inner-vlan 1101 mpid 3101 cos
1 source mpid 4101
ip sla schedule 1101 life forever start-time now
ID Type Destination Stats Return Last
(ms) Code Run
----------------------------------------------------------------------*1101 y1731-delay Domain:customer V - OK 27 seconds ag
lan:100 CVlan:110 o
1 Mpid:3101
Router#show ip sla statistics
IPSLAs Latest Operation Statistics
IPSLA operation id: 1101
Delay Statistics for Y1731 Operation 1101
Type of operation: Y1731 Delay Measurement
Latest operation start time: *10:43:12.930 UTC Mon Oct 21 2013
Latest operation return code: OK
Distribution Statistics:
Interval
Start time: *10:43:12.930 UTC Mon Oct 21 2013
Elapsed time: 15 seconds
Number of measurements initiated: 7
Number of measurements completed: 7
Flag: OK
Router#show ip sla configuration 1101
IP SLAs Infrastructure Engine-III
Entry number: 1101
Owner:
Tag:
Operation timeout (milliseconds): 5000
Ethernet Y1731 Delay Operation
Frame Type: DMM
Domain: customer
Vlan: 100
CVlan: 1101
Target Mpid: 3101
Source Mpid: 4101
CoS: 1
Max Delay: 5000
Request size (Padding portion): 64
Frame Interval: 1000
Clock: Not In Sync
Threshold (milliseconds): 5000
Schedule:
Operation frequency (seconds): 30 (not considered if randomly scheduled)
Next Scheduled Start Time: Start Time already passed
Group Scheduled : FALSE
Randomly Scheduled : FALSE
Life (seconds): Forever
Entry Ageout (seconds): never
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
57
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Support for Y.1731 Performance Monitoring on a Routed Port (L3 Subinterface)
Recurring (Starting Everyday): FALSE
Status of entry (SNMP RowStatus): Active
Statistics Parameters
Frame offset: 1
Distribution Delay Two-Way:
Number of Bins 10
Bin Boundaries: 5000,10000,15000,20000,25000,30000,35000,40000,45000,-1
Distribution Delay-Variation Two-Way:
Number of Bins 10
Bin Boundaries: 5000,10000,15000,20000,25000,30000,35000,40000,45000,-1
Aggregation Period: 30
History
Number of intervals: 2
Router#show ethernet cfm pm session summary
Number of Configured Session : 150
Number of Active Session: 2
Number of Inactive Session: 148
Router#
Router(config)#show ethernet cfm pm session detail 0
Session ID: 0
Sla Session ID: 1101
Level: 7
Service Type: S,C
Service Id: 100,1101
Direction: Down
Source Mac: 5352.a824.04fr
Destination Mac: 5067.a87c.fa92
Session Version: 0
Session Operation: Proactive
Session Status: Active
MPID: 4101
Tx active: yes
Rx active: yes
RP monitor Tx active: yes
RP monitor Rx active: yes
Timeout timer: stopped
Last clearing of counters: *00:00:00.000 UTC Mon Jan 1 1900
DMMs:
Transmitted: 117
DMRs:
Rcvd: 117
1DMs:
Transmitted: 0
Rcvd: 0
LMMs:
Transmitted: 0
LMRs:
Rcvd: 0
VSMs:
Transmitted: 0
VSRs:
Rcvd: 0
SLMs:
Transmitted: 0
SLRs:
Rcvd: 0
Test ID 0
Router1#
58
Router#show ethernet cfm pm session db 0
--------------------------------------------------------------------------- TX Time FWD RX Time FWD
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Support for Y.1731 Performance Monitoring on a Routed Port (L3 Subinterface)
TX Time BWD RX Time BWD Frame Delay
Sec:nSec Sec:nSec Sec:nSec
Table 4 lists the debug commands to troubleshoot issues pertaining to the two-way delay measurement
configuration. The Cisco IOS Master Command List at
http://www.cisco.com/en/US/docs/ios/mcl/allreleasemcl/all_book.html provides more information
about these commands.
CautionBecause debugging output is assigned high priority in the CPU process, it can diminish the performance
of the router or even render it unusable. For this reason, use debug commands only to troubleshoot
specific problems or during troubleshooting sessions with Cisco technical support staff.
NoteBefore you run any of the debug commands listed in the following table, ensure that you run the logging
buffered debugging command, and then turn off console debug logging using the no logging console
command.
Table 4debug Commands for Two-Way Delay Measurement Configuration
debug CommandPurpose
debug epmpal allEnables debugging of all Ethernet performance
monitoring (PM) events.
debug epmpal apiEnables debugging of Ethernet PM API events.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
59
Chapter Configuring Ethernet CFM and Y.1731 Performance Monitoring on Layer 3 Interfaces
Support for Y.1731 Performance Monitoring on a Routed Port (L3 Subinterface)
Table 4debug Commands for Two-Way Delay Measurement Configuration (continued)
debug CommandPurpose
debug epmpal rxEnables debugging of Ethernet PM packet-receive
debug epmpal txEnables debugging of Ethernet PM packet-transmit
events.
events.
60
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Ethernet virtual connection (EVC) infrastructure is a Layer 2 platform-independent bridging
architecture that supports Ethernet services. This chapter provides procedures for configuring EVC
Bridge Domain (BD) and the features it supports on the Cisco Integrated Services Routers (ISR) G2.
• Configuring EVCs on Cisco ISR G2 Router, page 61
• Ethernet Data Plane Loopback, page 64
• Connectivity Fault Management (CFM) over EVC BD, page 68
• Support for Y.1731 Performance Monitoring for EVC BD, page 87
• Support for Switch Virtual Interfaces (SVI) on ISR G2 Metro Ethernet BD, page 90
• EVC Quality of Service (QoS), page 92
Configuring EVCs on Cisco ISR G2 Router
Configuring an EFP and a BD on the Cisco ISR G2 Router
Configuring a service instance on a Layer 2 port creates an EFP on which you can configure EVC
features.
Note• You cannot use the same VLAN ID for encapsulating on a Layer 3 sub-interface and an EFP (service
instance) on a WAN interface.
• If there is a sub-interface and service-instance both configured on a WAN interface for untagged
traffic, then the traffic will always go to the main interface and the service-instance with untagged
traffic will not work.
Perform this task to configure an EFP.
SUMMARY STEPS
Step 1enable
Step 2configure terminal
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
61
Configuring EVCs on Cisco ISR G2 Router
Step 3interface type number
Step 4service instance idethernet
Step 5encapsulation encapsulation-type vlan-id
Step 6rewrite ingress tag translate 1-to-1 dot1q vlan-idsymmetric
rewrite ingress tag translate 1-to-1
dot1q vlan-id symmetric
Example:
Router(config-if-srv)# rewrite
ingress tag translate 1-to-1 dot1q 1
symmetric
Enters interface configuration mode.
• The example shows how to configure Gigabit
Ethernet interface 0/1 and enter interface
configuration mode.
Configures an Ethernet service instance on an interface
and enters Ethernet service configuration mode.
• The example shows how to configure Ethernet
service instance 1.
Defines the encapsulation type.
• The example shows how to define dot1q as the
encapsulation type.
(Optional) Specifies the encapsulation adjustment to be
performed on a frame ingressing a service instance.
• The example shows how to specify translating a
single tag defined by the encapsulation command to
a single tag defined in the rewrite ingress tag
command with reciprocal adjustment to be done in
the egress direction.
62
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
• The example shows how to configure bridge domain
1.
Returns to privileged EXEC mode.
Example:
router(config-if-srv)# end
Configuration Examples for EVCs on the Cisco ISR G2 Router
When a WAN interface is configured with both an EFP and a subinterface, and the dot1q encapsulation
with the same VLAN ID is used, the traffic on the subinterface gets a higher priority than the traffic on
an EFP.
Note the following configuration order before you configure EVC:
Order 1: If you configure the subinterface with the same VLAN ID first, then the configuration of EFP
using the same VLAN ID is blocked as shown below:
router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
router(config)#int gi0/0
irouter(config-if)# service instance 2 ethernet evc1
router(config-if-srv)# encapsulation dot1q 102
Invalid configuration on ServInst 2(Gi0/0). The VLAN ID (102) has already been configured
on interface GigabitEthernet0/0.102
Configuring EVCs on Cisco ISR G2 Router
Order 2: If you configure EFP first using the same VLAN ID, then you can still configure the
subinterface using the same VLAN ID. However, traffic will flow on the subinterface with higher
priority and not on the EFP.
Configuring an EFP and a subinterface using the same VLAN ID for dot1q encapsulation is allowed and
configurable as show in order 2. However, the use of an EFP and subinterface is mutually exclusive.
There will not be any traffic through the EFP. Traffic only goes through the subinterface because
untagged packets have high priority than tagged packets.
Example Configuring EFPs on a Gigabit Ethernet Interface
interface GigabitEthernet0/1
no ip address
negotiation auto
service instance 1 ethernet
encapsulation dot1q 201
rewrite ingress tag translate 1-to-1 dot1q 300 symmetric
bridge-domain 1
!
service instance 2 ethernet
encapsulation default
bridge-domain 1
!
service instance 3 ethernet
encapsulation priority-tagged
bridge-domain 2
!
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
63
Ethernet Data Plane Loopback
Ethernet Data Plane Loopback
The Ethernet Data Plane Loopback feature allows you to test services and throughput of an Ethernet port
or a device using a test generator. You can verify the maximum rate of frame transmission with no frame
loss. This feature allows bidirectional throughput measurement, and on-demand or out-of-service
(intrusive) operation during service turn-ups. This feature is used for testing during service turn-ups and
troubleshooting of services after a turn-up.
If you need to test a service while it is live, you do this without disrupting any of the live data traffic. To
achieve this, you use test traffic that differs from live data traffic. For example, the traffic from a test
generator contain the source MAC address of the test generator, or test traffic is assigned a particular
Class of Service (Cos). Irrespective of the method used, the device looping back the traffic must be able
to filter out the test traffic and leave the data traffic untouched.
NoteConfiguring Ethernet Data Plane Loopback on a device does not indicate the start of an actual session.
Features Supported for Ethernet Data Plane Loopback
Configures ethernet loopback externally or internally on
an interface. External loopback allows loopback of traffic
from wire. Internal loopback allows loopback of traffic
from the bridge domain.
Saves configuration changes.
• When you issue the end command, the system
prompts you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
– Entering yes saves configuration changes to the running
configuration file, exits the configuration session, and
returns the router to EXEC mode.
– Entering no exits the configuration session and returns
the router to EXEC mode without committing the
configuration changes.
– Entering cancel leaves the router in the current
configuration session without exiting or committing the
configuration changes.
• Use the commit command to save the configuration
Configuration Examples for Ethernet Data Plane Loopback
This example shows how to configure Ethernet Data Plane Loopback:
Use the show ethernet loopback active command to view active sessions:
Router# show ethernet loopback active interface GigabitEthernet 0/1.200
Local: GigabitEthernet0/1.200, ID 1
-------------------------------------------------------------------------------Direction: Internal
Time out: 2 hours
Time left: 00:01:17
Status: Active
Filters:
Dot1ad: 100-200
Dot1q: Any
Source MAC Address: aaaa.bbbb.cccc
Destination MAC Address: Any
Ethertype: 0x8902
Class of Service: Any
LLC-OUI: Any
Local: GigabitEthernet0/1.200, ID 2
-------------------------------------------------------------------------------Direction: External
Time out: 10 minutes
Time left: 00:00:00
Status: Stopping
Filters:
Dot1q: 500
Second-dot1q: 200
Source MAC Address: Any
Destination MAC Address: Any
Ethertype: Any
Class of Service: 4
LLC-OUI: Any
Ethernet Data Plane Loopback
For each loopback session listed, this information is displayed:
• Header containing the Interface name and session ID, which uniquely identify the local loopback
session,
• Direction which specifies the direction of the loopback,
• Time out – the time out period specified when the loopback was started,
• Time left – the amount of time left until the loopback session is automatically stopped,
• Status – the status of the loopback session,
• Filters – details of the filters specified when the loopback session was started. Similar to the start
CLI, only the filters supported by the platform are displayed.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
IEEE CFM is an end-to-end per-service Ethernet-layer Operations, Administration, and Maintenance
(OAM) protocol. CFM includes proactive connectivity monitoring, fault verification, and fault isolation
for large Ethernet metropolitan-area networks (MANs) and WANs.
CFM over EVC BD (Up mep) and CFM over EVC BD (Down mep) features are supported on CFM over
EVC BD.
CFM over Xconnect (Up mep) and CFM over Xconnect (Down mep) features are not supported on CFM
over EVC BD.
The benefits of Ethernet CFM are:
• End-to-end service-level OAM technology
• Reduced operating expense for service provider Ethernet networks
• Competitive advantage for service providers
NoteThis feature is supported only if you have purchased the appxk9 licensing package. CFM over EVC BD
is available only on the Cisco 890 series ISR and ISRG2 platforms. For more information about
managing software activation licenses on the Cisco ISR and Cisco ISR G2 platforms, see
Enables SNMP trap generation for Ethernet CFM
continuity check events.
Enables SNMP trap generation for Ethernet CFM
continuity check events in relation to the cross-check
operation between statically configured MEPs and those
learned via CCMs.
Returns the router to the privileged EXEC mode.
Provisioning the Network (CE-B)
Complete these steps to configure provisioning the network (CE-B):
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Sets the amount of time that CFM traceroute cache entries
are retained.
Enables SNMP trap generation for Ethernet CFM
continuity check events.
Enables SNMP trap generation for Ethernet CFM
continuity check events in relation to the cross-check
operation between statically configured MEPs and those
learned via CCMs.
Returns the router to the privileged EXEC mode.
72
Example:
Router(config)# end
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Perform this task to set up service for Ethernet CFM. Optionally, when this task is completed, you may
configure and enable the cross-check function. To perform this optional task, see "Configuring and
Enabling the Cross-Check Function (CE-A)".
Defines a CFM maintenance domain at a particular
maintenance level and enters Ethernet CFM configuration
mode.
Configures an MA within a maintenance domain and
enters CFM service configuration mode.
• If a service is already configured and you configure a
new MA name and also specify the direction down
keyword, a second service is added that maps to the
same VLAN. If you configure a new MA name and
do not specify the direction down keyword, the
service is renamed to the new MA name.
Enables the transmission of CCMs.
Step 6
Step 7
Step 8
Step 9
Step 10
Example:
Router(config-ecfm-srv)#
continuity-check
continuity-check [interval time |
loss-threshold threshold | static
rmep]
Configures the time period between CCM transmissions.
• The values supported are platform dependent.
Sets the number of CCMs that should be missed before
declaring that a remote MEP is down.
Returns the device to Ethernet CFM configuration mode.
Sets the amount of time that data from a missing MEP is
kept in the continuity check database or that entries are
held in the error database before they are purged.
Returns the device to global configuration mode.
74
Example:
Router(config-ecfm)# exit
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Router(config-ecfm)# service
Customer1 vlan 101 direction down
Step 6
continuity-check [interval time |
loss-threshold threshold | static
rmep]
Connectivity Fault Management (CFM) over EVC BD
Sets the amount of time that data from a missing MEP is
kept in the continuity check database or that entries are
held in the error database before they are purged.
Configures an MA within a maintenance domain and
enters CFM service configuration mode.
• If a service is already configured and you configure a
new MA name and also specify the direction down
keyword, a second service is added that maps to the
same VLAN. If you configure a new MA name and
do not specify the direction down keyword, the
service is renamed to the new MA name.
Enables the transmission of CCMs.
Step 7
Step 8
Step 9
Step 10
Example:
Router(config-ecfm-srv)#
continuity-check
continuity-check [interval time |
loss-threshold threshold | static
rmep]
Specifies an interface and enters interface configuration
mode.
Provisions an interface as a domain boundary.
Returns the router to the privileged EXEC mode.
Configuring and Enabling the Cross-Check Function (CE-A)
Perform this task to configure and enable cross-checking for a down MEP. This task requires you to
configure and enable cross-checking on two devices. This task is optional.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Configuration Examples for Configuring Ethernet CFM for the Cisco ISR G2 Routers
The following two examples show configurations for a network. Configurations are shown not only for
the Carrier Ethernet Cisco ISR G2 Routers, but also for the devices used at the access and core of the
service provider’s network.
• Example: Provisioning a Network, page 81
• Example: Provisioning Service, page 84
Example: Provisioning a Network
This configuration example shows only CFM-related commands. All commands that are required to set
up the data path and configure the VLANs on the device are not shown. However, it should be noted that
CFM traffic will not flow into or out of the device if the VLANs are not properly configured.
CE-A Configuration
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Support for Y.1731 Performance Monitoring for EVC BD
Support for Y.1731 Performance Monitoring for EVC BD
Y.1731 Performance Monitoring (PM) provides a standard Ethernet PM function that includes
measurement of Ethernet frame delay, frame delay variation, frame loss, and frame throughput
measurements specified by the ITU-T Y-1731 standard and interpreted by the Metro Ethernet Forum
(MEF) standards group.ITU-T Y.1731 feature supports key operation and maintenance standards that
provide for automated end-to-end management and monitoring of Ethernet service by service providers.
NoteThis feature is supported only if you have purchased the DATA technology package functionality
(datak9) licensing package. For more information about managing software activation licenses on the
Cisco ISR and Cisco ISR G2 platforms, see
Configuring a Sender MEP for a Single-Ended Ethernet Delay or Delay Variation Operation
Perform this task to configure a sender MEP on the source device.
Before You Begin
Time synchronization is required between the source and destination devices in order to provide accurate
one-way delay (latency) or delay-variation measurements. Configure either Precision Time Protocol
(PTP) or Network Time Pprotocol (NTP) on both the source and destination devices.
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
87
Support for Y.1731 Performance Monitoring for EVC BD
NoteTo display information about remote (target) MEPs on destination devices, use the show ethernet cfm
(Optional) Sets the number of statistics distributions kept
during the lifetime of an IP SLAs Ethernet operation.
(Optional) Sets the amount of time an MEP waits for a
frame.
(Optional) Configures the owner of an IP SLAs operation.
Exits to privileged EXEC mode.
Example:
Router(config-sla-y1731-delay)# end
What to Do Next
To add proactive threshold conditions and reactive triggering for generating traps, see the “Configuring
Proactive Threshold Monitoring" module of the IP SLAs Configuration Guide.
When you are finished configuring proactive threshold monitoring for this operation, see the
"Scheduling IP SLAs Operations" section to schedule the operation.
Support for Switch Virtual Interfaces (SVI) on ISR G2 Metro
Ethernet BD
You can connect a SVI with a Metro Ethernet BD to re-direct the traffic from a switch port onto the BD
and vice versa, as shown in Figure 1.
90
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Figure 1Re-directing the traffic from a SV1 onto the BD and vice versa
Bridge-Domain
SVI
Switch
Support for Switch Virtual Interfaces (SVI) on ISR G2 Metro Ethernet BD
EVC
EVCEVC
Once the SV1 is connected, packets coming into a switch port is re-directed to the SVI and onto the BD.
On entering the BD, the source MAC address is learned and the packet is bridged. In the opposite
direction, packets coming onto the BD from an EVC via the switch port are directed out the SVI.
Restrictions for SVI support on BDs
• Only one SVI may be associated with a BD.
• There is no EVC (i.e. service instance) configuration on an SVI.
• All packets on the BD, including those from EVCs, should be tagged, with the VLAN tag specifying
the VLAN id of the SVI.
• Only access port configurations are supported.
Configuring SVI as Access Port
First you configure the switch port to add an access port SVI to a BD. After this you need to define the
associated VLAN interface.
NoteThe BD id does not have to match the VLAN id in the dot1q tag, but all packets on the BD must be tagged
with that VLAN number. So an EVC could be configured in which the BD id matches the VLAN id.
364528
Configuration Examples to add an Access Port SVI to a BD
This example shows how to add an Access Port SVI to a BD: