Cisco IOS XE Intelligent Services, IOS XE Configuration Manual

Cisco IOS XE Intelligent Services Gateway Configuration
Release 2
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
Fax: 408 527-0883
Guide
THE SPECIFICATIONS AND INFORMATION REGA RDING THE P RODUCTS IN TH IS MA NUAL ARE SUBJECT TO CHAN GE W ITHOUT NOT ICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILIT Y FOR THEIR APPLICAT ION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED W ARRANTY FO R THE ACCOMPA NYING PRODUCT ARE SET FO RTH IN THE IN FORMAT ION P ACKET TH AT S
HIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compres
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DO CUMENT FILES AND SOFTWARE OF THESE SUPPL IERS ARE PROVIDED “AS IS” WITH
AL
L FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WA RRANTIES, EXPRESSE D OR IMPLIED, INCLUDING, WITHOUT
LIM
ITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRI NGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
W
ITHOUT LIMITATION, LOST P ROFITS OR LO SS OR DAMAGE TO DATA ARISIN G OUT OF THE USE OR INABILI TY TO USE THIS MA NUAL, EVEN I F CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SU CH DAMA GES. CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase, Cisco StackPower,
Cis
co StadiumVision, Cisco TelePresence, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Goo d, Fl Flip Video, Flip Video (Design), I nstant Broad band, and Welco me to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capital, Cis
co Capital (Design), Cisco:Financed (Stylized), Cisco Store, Flip Gift Card, and One Million Acts of G AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cis
co IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Co
ntinuum, EtherFast, EtherSwitch, Event Center, Explorer, Follow Me Browsing, GainMaker, iLYNX, IOS, iPhone, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design ), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet , Spectr um Expert, StackWise, WebEx, and t he WebEx logo are registered trade marks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the propert between Cisco and any other company. (0910R)
Any Internet Protocol (IP) addresses u sed in this d ocument are not i document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco IOS XE Intelligent Services Gateway Configuration Guide
© 2009 Cisco Systems, Inc. All rights reserved.
sion is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
ip Mino, Flipshare (Design), Flip Ultra,
reen are service marks; and Access Registrar, Aironet, AllTouch,
y of their respective owners. The use of the word partner does not imply a partnershi p relati onshi p
ntended to be actual addresses. Any examples, command display output, and figures included in the
About Cisco IOS XE Software Documentation
Last Updated: December 1, 2009
This document describes the objectives, audience, conventions, and organization used in Cisco IOS XE software documentation. Also included are resources for obtaining technical assistance, additional documentation, and other information from Cisco. This document is organized into the following sections:
Documentation Objectives, page i
Audience, page i
Documentation Conventions, page ii
Documentation Organization, page iii
Additional Resources and Documentation Feedback, page x
Documentation Objectives
Cisco IOS XE documentation describe the tasks and commands available to configure and maintain Cisco networking devices.
Audience
The Cisco IOS XE documentation set is intended for users who conf igure and maintain Cisco netw orking devices (such as routers and switches) but who may not be familiar with the configuration and maintenance tasks, the relationship among tasks, or the Cisco IOS commands necessary to perform particular tasks. The Cisco IOS XE documentation set is also intended for those users experienced with Cisco IOS XE software who need to know about new features, new configuration options, and new software characteristics in the current Cisco IOS XE release.
i
Documentation Conventions
Documentation Conventions
In Cisco IOS XE documentation, the term router may be used to refer to various Cisco products; for example, routers, access servers, and switches. These and other networking devices that support Cisco IOS XE software are shown interchangeably in examples and are used only for illustrative purposes. An example that shows one product does not necessarily mean that other products are not supported.
This section contains the following topics:
Typographic Conventions, page ii
Command Syntax Conventions, page ii
Software Conventions, page iii
Reader Alert Conventions, page iii
Typographic Conventions
Cisco IOS XE documentation uses the following typographic conventions:
About Cisco IOS XE Software Documentation
Convention Description
^ or Ctrl Both the ^ symbol and Ctrl represent the Control (Ctrl) key on a keyboard. For
example, the key combination ^D or Ctrl-D means that you hold down the Control key while you press the D key. (Keys are indicated in capital letters but are not case sensitive.)
string A string is a nonquoted set of characters shown in italics. For example, when
setting a Simple Network Management Protocol (SNMP) community string to public, do not use quotation marks around the string; otherwise, the string will include the quotation marks.
Command Syntax Conventions
Cisco IOS XE documentation uses the following command syntax conventions:
Convention Description
bold Bold text indicates commands and keywords that you enter as shown.
italic Italic text indicates arguments for which you supply values. [x] Square brackets enclose an optional keyword or argument. ... An ellipsis (three consecutive nonbolded periods without spaces) after a syntax
element indicates that the element can be repeated.
| A vertical line, called a pipe, indicates a choice within a set of keywords
or arguments.
[x | y] Square brackets enclosing keywords or arguments separated by a pipe indicate an
optional choice.
{x | y} Braces enclosing keywords or arguments separated by a pipe indicate a
required choice.
[x {y | z}] Braces and a pipe within square brackets indicate a required choice within an
optional element.
ii
About Cisco IOS XE Software Documentation
Software Conventions
Cisco IOS XE software uses the following conventions:
Convention Description
Courier font
Bold Courier font
< > Angle brackets enclose text that is not displayed, such as a password. Angle
! An exclamation point at the beginning of a line indicates that the text that follows
[ ] Square brackets enclose default responses to system prompt s.
Reader Alert Conventions
Documentation Organization
Courier font is used for information that is displayed on a PC or terminal screen. Bold Courier font indicates text that the user must enter.
brackets also are used in contexts in which the italic font style is not supported; for example, ASCII text.
is a comment, not a line of code. An exclamation point is also displayed by the Cisco IOS XE software for certain processes.
Cisco IOS XE documentation uses the following conventions for reader alerts:
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
manual.
Timesaver Means the described action saves time. You can save time by performing the action described in the
paragraph.
Documentation Organization
This section describes the Cisco IOS XE documentation set, ho w it i s or gan ized, and ho w to access it on Cisco.com. Listed are configuration guides, command references, and supplementary references and resources that comprise the documentation set.
Cisco IOS XE Documentation Set, page iv
Cisco IOS XE Documentation on Cisco.com, page iv
Configuration Guides, Command References, and Supplementary Resources, page v
iii
Documentation Organization
Cisco IOS XE Documentation Set
The Cisco IOS XE documentation set consists of the following:
Release notes and caveats provide information about platform, technology, and feature support for
a release and describe severi ty 1 (catastrophic), seve rity 2 (severe), and se verity 3 (moderat e) defects in released Cisco IOS XE software. Review release notes before other documents to learn whethe r updates have been made to a feature.
Sets of configuration guides and command references organized by technology and published for
each standard Cisco IOS XE release.
Configuration guides—Compilations of documents that provide conceptual and task-oriented descriptions of Cisco IOS XE features.
Command references—Alphabe tical compilations of command pages that provide detailed information about the commands used in the Cisco IOS XE features and the processes that comprise the related configuration guides. For each technology, there is a single command reference that covers all Cisco IOS XE releases and that is updated at each standard release.
Command reference book for debug commands.
Lists of all the commands in a specific release and all commands that are new, modified, removed,
or replaced in the release.
About Cisco IOS XE Software Documentation
Reference book for system messages for all Cisco IOS XE releases.
Cisco IOS XE Documentation on Cisco.com
The following sections describe the documentation organization and how to access various document types.
Use Cisco Feature Navigator to find information about Cisco IOS XE software image support. T o access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
New Features List
The New Features List for each release provides a list of all features in the release with hyperlinks to the feature guides in which they are documented.
Configuration Guides
Configuration guides are provided by technology and release and comprise a set of individual feature guides relevant to the release and technology.
Command References
Command reference books describe Cisco IOS XE commands that are supported in many different software releases and on many different platforms. The books are organized by technology. For information about all Cisco IOS XE commands, use the Command Lookup Tool at
http://tools.cisco.com/Support/CLILookup or the Cisco IOS Master Command List, All Releases, at http://www.cisco.com/en/US/docs/ios/mcl/allreleasemcl/all_book.html.
Cisco IOS XE Supplementary Documents and Resources
Supplementary documents and resources are listed in Table 2 on page x.
iv
About Cisco IOS XE Software Documentation
Documentation Organization
Configuration Guides, Command References, and Supplementary Resources
Ta ble 1 lists, in alphabetical order, Cisco IOS XE software configuration guides and
command references, including brief descriptions of the contents of the documents. The command references contain commands for both Cisco IOS software and Cisco IOS XE software, for all releases. The command references support many different software releases and platforms. Your Cisco IOS XE software release or platform may not support all these technologies.
Table 2 lists documents and resources that supplement the Cisco IOS XE software configuration guides
and command references. These supplementary resources include release notes and caveats; master command lists; new, modified, removed, and replaced command lists; system messages; and the debug command reference.
For additional information about configuring and operating specific networking devices, and to access Cisco IOS documentation, go to the Product/Technologies Support area of Cisco.com at the following location:
http://www.cisco.com/go/techdocs
Table 1 Cisco IOS XE Configuration Guides and Command References
Configuration Guide and Command Reference Titles Features/Protocols/Technologies
Cisco ASR 1000 Series Aggregation Services Routers
SIP and SPA Software Configuration Guide
Configuration and troubleshooting of SPA interface processors (SIPs) and shared port adapters (SP As) t hat are supported on t he Cisco ASR 1000 Series Router.
Cisco ASR 1000 Series Aggregation Services Routers
Software Configuration Guide
Cisco IOS XE Access Node Control Protocol
Configuration Guide
Cisco IOS Access Node Control Protocol
Overview of software functionality that is specific to the Cisco ASR 1000 Series Aggregation Services Routers.
Communication protocol between digital subscriber line access multiplexers (DSLAMs) and a broadband remote access server (BRAS).
Command Reference
Cisco IOS XE Asynchronous Transfer Mode
LAN ATM, multiprotocol over ATM (MPoA), and WAN ATM.
Configuration Guide
Cisco IOS Asynchronous Transfer Mode
Command Reference
Cisco IOS XE Broadband Access Aggr egation and DSL
PPP over Ethernet (PPPoE).
Configuration Guide
Cisco IOS Broadband Access Aggregation and DSL
Command Reference
Cisco IOS XE Carrier Ethernet Configuration Guide
Cisco IOS Carrier Ethernet Command Reference
IEEE 802.3ad Link Bundling; Link Aggregation Control Protocol (LACP) support for Eth ernet and Gigabit Ethernet links and EtherChannel bundles; LACP support for stateful switchover (SSO), in service software upgrade (ISSU), Cisco nonstop forwarding (NSF), and nonstop routing (NSR) on Gigabit EtherChannel bundles; and IEEE 802.3ad Link Aggregation MIB.
Cisco IOS XE Configuration Fundamentals
Configuration Guide
Cisco IOS Configuration Fundamentals
Autoinstall, Setup, Cisco IOS command- line inter face (CLI), Cisco IOS file system (IFS), Cisco IOS web browser user interface (UI), basic file transfer services, and file management.
Command Reference
v
About Cisco IOS XE Software Documentation
Documentation Organization
Table 1 Cisco IOS XE Configuration Guides and Command References (continued)
Configuration Guide and Command Reference Titles Features/Protocols/Technologies
Cisco IOS XE DECnet Configuration Guide
Cisco IOS DECnet Command Reference
Cisco IOS XE Dial Technologies Configuration Guide
Cisco IOS Dial Technologies Command Reference
Cisco IOS XE High Availability Configuration Guide
Cisco IOS High Availability Command Reference
Cisco IOS XE Intelligent Services Gateway
Configuration Guide
Cisco IOS Intelligent Services Gateway
Command Reference
Cisco IOS XE Interface and Hardware Component
Configuration Guide
Cisco IOS Interface and Hardware Component
Command Reference
Cisco IOS XE IP Addressing Services
Configuration Guide
Cisco IOS IP Addressing Services
Command Reference
Cisco IOS XE IP Application Services
Configuration Guide
Cisco IOS IP Application Services
Command Reference
Cisco IOS XE IP Multicast Configuration Guide
Cisco IOS IP Multicast Command Reference
Cisco IOS XE IP Routing: BFD Configuration Guide Bidirectional forwarding detection (BFD).
Cisco IOS XE IP Routing: BGP Configuration Guide
Cisco IOS IP Routing: BGP Command Reference
Cisco IOS XE IP Routing: EIGRP
Configuration Guide
DECnet protocol.
Asynchronous communications, dial backup, dial er technolog y, Multilink PPP (MLP), PPP, and virtual private dialup network (VPDN).
A variety of high availability (HA) features and technologies that are available for different network segments (from enterprise access to service provider core) to facilitate creation of end-to-end highly av ailable networks. Cisco IOS HA features and technologies can be categorized in three key areas: system-level resilienc y, network-level resiliency , an d embedded management for resiliency.
Subscriber identification, service and policy determination, session creation, session policy enforcement, session life-cycle management, accounting for access and service usage, and session state monitoring.
LAN interfaces, logical interfaces, serial interfaces, virtual interfaces, and interface configuration.
IP addressing, Address Resolution Protocol (ARP), Network Address Translation (NAT), Domain Name System (DNS), Dynamic Host Configuration Protocol (DHCP), and Next Hop Address Resolution Protocol (NHRP).
Enhanced Object Tracking (EOT), Gateway Load Balancing Protocol (GLBP), Hot Standby Router Protocol (HSRP), IP Services, TCP, Web Cache Communication Protocol (WCCP), User Datagram Protocol (UDP), and V irtual Router Redu ndancy Protocol (VRRP).
Protocol Independent Multicast (PIM) sparse mode (PIM-SM), bidirectional PIM (bidir-PIM), Source Specific Multicast (SSM), Multicast Source Discovery Protocol (MSDP), Internet Group Management Protocol (IGMP), and Multicast VPN (MVPN).
Border Gateway Protocol (BGP), multi protocol B GP, multiprotocol BGP extensions for IP multicast.
Enhanced Interior Gateway Routing Protocol (EIGRP).
Cisco IOS IP Routing: EIGRP Command Reference
Cisco IOS XE IP Routing: ISIS Configuration Guide
Cisco IOS IP Routing: ISIS Command Reference
vi
Intermediate System-to-Intermediate System (IS-IS).
About Cisco IOS XE Software Documentation
Table 1 Cisco IOS XE Configuration Guides and Command References (continued)
Configuration Guide and Command Reference Titles Features/Protocols/Technologies
Cisco IOS XE IP Routing: ODR Configuration Guide
Cisco IOS IP Routing: ODR Command Reference
Cisco IOS XE IP Routing: OSPF Configuration Guide
Cisco IOS IP Routing: OSPF Command Reference
Cisco IOS XE IP Routing: Protocol-Independent
Configuration Guide
Cisco IOS IP Routing: Protocol-Independent
Command Reference
Cisco IOS XE IP Routing: RIP Configuration Guide
Cisco IOS IP Routing: RIP Command Reference
Cisco IOS XE IP SLAs Configuration Guide
Cisco IOS IP SLAs Command Reference
Cisco IOS XE IP Switching Configuration Guide
Cisco IOS IP Switching Command Reference
Cisco IOS XE IPv6 Configuration Guide
Cisco IOS IPv6 Command Reference
Cisco IOS XE ISO CLNS Configuration Guide
Cisco IOS ISO CLNS Command Reference
Cisco IOS XE LAN Switching Configuration Guide
Cisco IOS LAN Switching Command Reference
Cisco IOS XE Multiprotocol Label Switching
Configuration Guide
Cisco IOS Multiprotocol Label Switching
Command Reference
Cisco IOS XE NetFlow Configuration Guide
Cisco IOS NetFlow Command Reference
Cisco IOS XE Network Management
Configuration Guide
Cisco IOS Network Management Command Reference
Cisco IOS XE Novell IPX Configuration Guide
On-Demand Routing (ODR).
Open Shortest Path First (OSPF).
IP routing protocol-independent features and commands. Generic policy-based routing (PBR) features and commands are included.
Routing Information Protocol (RIP).
Cisco IOS IP Service Level Agreements (IP SLAs).
Cisco Express Forwarding.
For a list of IPv6 features, protocols, and technolog ies, go to the IPv6 “Start Here” document at the following URL:
http://www.cisco.com/en/US/docs/ios/ios_xe/ipv6/configuratio n/guide/ip6-roadmap_xe.html
ISO Connectionless Network Service (CLNS).
VLANs and multilayer switching (MLS).
MPLS Label Distribution Protocol (LDP), MPLS Layer 2 VPNs, MPLS Layer 3 VPNs, MPLS Traffic Engineering (TE), and MPLS Embedded Management (EM) and MIBs.
Network traffic data analysis, aggregation caches, and export features.
Basic system management, system monitoring and logging, Cisco IOS Scripting with Tool Control Language (Tcl), Cisco networking services (CNS), Embedded Event Manager (EEM), Embedded Syslog Manager (ESM), HTTP, Remote Monitoring (RMON), and SNMP.
Novell Internetwork Packet Exchange (IPX) protocol.
Documentation Organization
Cisco IOS Novell IPX Command Reference
vii
About Cisco IOS XE Software Documentation
Documentation Organization
Table 1 Cisco IOS XE Configuration Guides and Command References (continued)
Configuration Guide and Command Reference Titles Features/Protocols/Technologies
Cisco IOS XE Quality of Service Solutions
Configuration Guide
Cisco IOS Quality of Service Solutions
Command Reference
Cisco IOS Security Command Reference Access control lists (ACLs); authentication, authorization, and
Cisco IOS XE Security Configuration Guide: Secure
Connectivity
Cisco IOS XE Security Configuration Guide: Securing
the Data Plane
Cisco IOS XE Security Configuration Guide: Securing
User Services
Cisco IOS XE Service Advertisement Framework
Configuration Guide
Class-based weighted fair queueing (CBWFQ), low latency queueing (LLQ), Modular Quality of Service (QoS) Command-Line Interface (CLI) (MQC), Network-Based Application Recognition (NBAR), priority queueing, Mult ilink PPP (MLP) for QoS, header compression, Resource Reservation Protocol (RSVP), weighted fair queueing (WFQ ), and weighted random early detection (WRED).
accounting (AAA); firewalls; IP security and encryption; neighbor router authentication; network access security; public key infrastructure (PKI); RADIUS; and TACACS+.
Internet Key Exchange (IKE) for IPsec VPNs; security for VPNs with IPsec; VPN availability features (reverse route injection, IPsec preferred peer, and real-time resolution for the IPsec tunnel peer); IPsec data plane features; IPsec management plane features; Public Key Infrastructure (PKI); Dynamic Multipoint VPN (DMVPN); Easy VPN; and Cisco Group Encrypted Transport VPN (GET VPN).
Access Control Lists (ACLs); Firewalls: Context-Based Access Control (CBAC) and Zone-Based Firew all; Cisco IOS Intrusio n Prevention System (IPS); Flexible Packet Matching; Unicast Reverse Path Forwarding (uRPF); Threat Information Distribution Protocol (TIDP) and TMS.
AAA (includes Network Admission Control [NAC]); Security Server Protocols (RADIUS and TACACS+); Secure Shell (SSH); Secure Access for Networking Devices (includes Autosecure and Role-Based CLI access); Lawful Intercept.
Cisco Service Advertisement Framework.
Cisco IOS Service Advertisement Framework
Command Reference
Cisco IOS XE VPDN Configuration Guide
Cisco IOS VPDN Command Reference
Cisco IOS XE Wide-Area Networking
Configuration Guide
Cisco IOS Wide-Area Networking
Command Reference
viii
Multihop by Dialed Number Identification Service (DNIS), timer and retry enhancements for L2TP and Layer 2 Forwarding (L2F), RADIUS Attribute 82 (tunnel assignment ID), shell-based authentication of VPDN users, and tunnel authentication via RADIUS on tunnel terminator.
Frame Relay; L2VPN Pseudowire Redundancy; and Media-Independent PPP and Multilink PPP.
About Cisco IOS XE Software Documentation
Table 1 Cisco IOS XE Configuration Guides and Command References (continued)
Configuration Guide and Command Reference Titles Features/Protocols/Technologies
Cisco Unified Border Element (Enterprise)
Configuration Guide
Cisco IOS Voice Command Reference
Cisco Unified Border Element (SP Edition)
Configuration Guide: Distributed Model
Cisco Unified Border Element (SP Edition)
Command Reference: Distributed Model
Cisco Unified Border Element (SP Edition)
Configuration Guide: Unified Model
Cisco Unified Border Element (SP Edition)
Command Reference: Unified Model
The Cisco Unified Border Element (Enterprise) on the Cisco ASR 1000 brings a scalable op tion for ente rprise customers. Running as a process on the Cisco ASR 1000 and utilizing the high-speed RTP packet processing path, the Cisco Unified Border Element (Enterprise) is used as an IP-to-IP gateway by enterprises and commercial cust omers to interconnect SIP and H.323 voice and video networks. The Cisco UBE (Enterprise) provides a network-to-network demarcation interface for signaling interworking, media interworking, address and port translations, billing, security, quality of service (QoS), and bandwidth management.
The Cisco Unified Border Element (SP Edit ion) is a sessi on border controller (SBC) that is VoIP-enabled and deployed at the edge of networks. For Cisco IOS XE Release 2.3 and earlier releases, Cisco Unified Border Element (SP Edition) is supported only in the distributed mode. Operating in the distributed mode, the SBC is a toolkit of functions that can be used to deploy and manage VoIP services, such as signaling interworking, network hiding, security, and quality of service.
The Cisco Unified Border Element (SP Edit ion) is a highly scalable, carrier-grade session border controller (SBC) that is designed for service providers and that is generally deployed at the border of the enterprise or SP networks to enable the easy deployment and management of VoIP services. Cisco Unified Border Element (SP Edition) is integrated into Cisco routing platforms and can use a large number of router functions to provide a very feature-rich and intelligent SBC application . Formerly known as Integrated Session Border Controller, Cisco Unified Border Element (SP Edition) provides a network-to-network demarcation interface for signaling interworking, media interworking, address and port translati ons, billing, security, quality of service, call admission control, and bandwidth manageme nt.
For Cisco IOS XE Release 2.4 and later releases, Cisco Unified Border Element (SP Edition) can operate in two modes or deployment models: unified and distributed. The configuration guide documents the features in the unified mode.
Documentation Organization
Table 2 lists documents and resources that supplement the Cisco IOS XE software configuration guides
and command references.
ix
About Cisco IOS XE Software Documentation
Additional Resources and Documentation Feedback
Table 2 Cisco IOS XE Software Supplementary Documents and Resources
Document Title or Resource Description
Cisco IOS Master Command List, All Releases Alphabetical list of all the commands documented in all
Cisco IOS XE software releases.
Cisco IOS Debug Command Reference Alphabetical list of debug commands including brief
descriptions of use, command syntax, and usage guidelines.
Cisco IOS XE system messages List of Cisco IOS XE system messages and descriptions. System
messages may indicate problems with your system, may be informational only, or may help diagnose problems with communications lines, internal hardware, or the system software.
Release notes and caveats Information about new and changed features, system
requirements, and other useful information about specific software releases; information about defects in specific Cisco IOS XE software releases.
MIBs Files used for network monitoring. To locate and download
MIBs for selected platforms, Cisco IOS XE software releases, and feature sets, use Cisco MIB Locator at the following URL:
http://www.cisco.com/go/mibs
RFCs Standards documents maintained by the Internet Engineering
T ask Force (IETF) that Ci sco IOS XE documentation references where applicable. The full text of referenced RFCs may be obtained at the following URL:
http://www.rfc-editor.org/
Additional Resources and Documentation Feedback
What’s New in Cisco Product Documentation is updated monthly and describes all new and revised
Cisco technical documentation. The What’s New in Cisco Product Documentation publication also provides information about obtaining the following resources:
Technical documentation
Cisco product security overview
Product alerts and field notices
Technical assistance
Cisco IOS XE software technical documentation includes embedd ed feedback forms where y ou can rate documents and provide suggestions for improvement. Your feedback helps us improve our documentation.
x
About Cisco IOS XE Software Documentation
CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase, Cisco StackPower, Cisco StadiumV ision, Cisco TelePresence, Cisco Unified Computing System, Cisco W e bEx, D CE, Flip Chann els, Fli p for Good, Flip Mino, Flipshare (Design), Flip Ultra, Fli p Video, Flip V i deo (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capit al, C isco Capit al (D esign), Cis co:Finan ced (Styl ized), Cisco Stor e, Flip Gift Card, and One Million Acts of Green are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting T o You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Cont inuum, E th erFast, EtherSwitch, Event Center, Explor er, Follow Me Browsi ng, Gain Mak er, iLYNX, IOS, iPhone, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet, Spectrum Expert, StackWise, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0910R)
Any Internet Protocol (IP) addresses an d ph one nu mbers u sed in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other fig ures included in the document are sho wn for illust rati v e purp oses only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2009 Cisco Systems, Inc. All rights reserved.
Additional Resources and Documentation Feedback
xi
Additional Resources and Documentation Feedback
About Cisco IOS XE Software Documentation
xii
Using the Command-Line Interface in Cisco IOS XE Software
Last Updated: December 1, 2009
This document provides basic information about the command-line interface (CLI) in Cisco IOS XE software and how you can use some of the CLI features. This document contains the follo wing sections:
Initially Configuring a Device, page i
Using the CLI, page ii
Saving Changes to a Configuration, page xii
Additional Information, page xii
For more information about using the CLI, see “Part 1: Using the Cisco IOS Command-Line Interface (CLI)” of the Cisco IOS XE Configuration Fundamentals Configuration Guide.
For information about the software documentation set, see the “About Cisco IOS XE Software
Documentation” document.
Initially Configuring a Device
Initially configuring a device varies by platform. For information about performing an initial configuration, see the hardware installation documentation that is provided with the orig inal packaging of the product or go to the Product Support area of Cisco.com at http://www.cisco.com/go/techdocs.
After you have performed the initial configuration and connected the device to your network, you can configure the device b y using the console port or a remote access method, such as Telnet or Secure Shell (SSH), to access the CLI or by using the configuration method provided on the device, such as Security Device Manager.
i
Using the CLI
Changing the Default Settings for a Console or AUX Port
There are only two settings that you can change on a console port or an AUX port:
Change the port speed with the config-register 0x command. Changing the port speed is not
Change the behavior of the port; for example, by adding a password or changing the timeout value.
Note The AUX port on the Route Processor (RP) installed in a Cisco ASR 1000 series router does not serve
any useful customer purpose and should be accessed only under the advisement of a customer support representative.
Using the CLI
This section describes the following topics:
Understanding Command Modes, page ii
Using the Interactive Help Feature, page v
Using the Command-Line Interface in Cisco IOS XE Software
recommended. The well-known default speed is 9600.
Understanding Command Syntax, page vi
Understanding Enable and Enable Secret Passwords, page viii
Using the Command History Feature, page viii
Abbreviating Commands, page ix
Using Aliases for CLI Commands, page ix
Using the no and default Forms of Commands, page x
Using the debug Command, page x
Filtering Output Using Output Modifiers, page xi
Understanding CLI Error Messages, page xi
Understanding Command Modes
The CLI command mode structure is hierarchical, and each mode supports a se t of specific commands. This section describes the most common of the many modes that exist.
Ta bl e 1 lists common command modes with associated CLI prompts, access and exit methods, and a
brief description of how each mode is used.
ii
Using the Command-Line Interface in Cisco IOS XE Software
Table 1 CLI Command Modes
Using the CLI
Command
Access Method Prompt Exit Method Mode Usage
Mode
User EXEC Log in.
Privileged EXEC
From user EXEC mode, issue the enable command.
Global configuration
From privileged EXEC mode, issue the
configure terminal
command.
Interface configuration
From global configuration mode, issue the interface command.
Line configuration
From global configuration mode, issue the line vty or line console command.
Router>
Router#
Router(config)#
Router(config-if)#
Router(config-line)#
Issue the logout or exit command.
Issue the disable command or the exit command to return to user EXEC mode.
Issue the exit command or the end command to return to privileged EXEC mode.
Issue the exit command to return to global configuration mode or the end command to return to privileged EXEC mode.
Issue the exit command to return to global configuration mode or the end command to return to privileged EXEC mode.
Change terminal settings.
Perform basic tests.
Display device status.
Issue show and debug
commands.
Copy images to the
device.
Reload the device.
Manage device
configuration files.
Manage device file
systems.
Configure the device.
Configure individual interfaces.
Configure individual terminal lines.
iii
Using the CLI
Table 1 CLI Command Modes (continued)
Using the Command-Line Interface in Cisco IOS XE Software
Command
Access Method Prompt Exit Method Mode Usage
Mode
ROM monitor From privileged EXEC
mode, issue the reload command. Press the Break key during the first 60 seconds while the system is booting.
Diagnostic The router boots or
enters diagnostic mode in the following scenarios. When a Cisco IOS XE process or processes fail, in most scenarios the router will reload.
A user-configured
access policy was configured using the transport-map command, which directed the user into diagnostic mode.
The router was
accessed using an RP auxiliary port.
A break signal
(Ctrl-C, Ctrl-Shift-6, or the send break
command) was entered, and the router was configured to enter diagnostic mode when the break signal was received.
rommon # >
The # symbol represents the line number and increments at each prompt.
Router(diag)#
Issue the continue command.
If a Cisco IOS XE process failure is the reason for entering diagnostic mode, the failure must be resolved and the router must be rebooted to exit diagnostic mode.
If the router is in diagnostic mode because of a transport-map configuration, access the router through another port or use a method that is configured to connect to the Cisco IOS XE CLI.
If the RP auxiliary port was used to access the router, use another port for access. Accessing the router through the auxiliary port is not useful for customer purposes.
Run as the default
operating mode when a valid image cannot be loaded.
Access the fall-back
procedure for loading an image when the device lacks a valid image and cannot be booted.
Perform password
recovery when a CTRL-Break sequence is issued within 60 seconds of a power-on or reload event.
Inspect various states on
the router, including the Cisco IOS XE state.
Replace or roll back the
configuration.
Provide methods of
restarting the Cisco IOS XE software or other processes.
Reboot hardware, such as
the entire router, an RP, an ESP , a SIP, a SP A, or other hardware components.
Transfer files into or off
of the router using remote access methods such as FTP, TFTP, and SCP.
iv
Using the Command-Line Interface in Cisco IOS XE Software
EXEC commands are not saved when the soft war e reboots. Co mmands that you i ssue in a configuration mode can be saved to the startup configuration. If you save the running configuration to the startup configuration, these commands will execute when the software is rebooted. Global configuration mode is the highest level of configuration mode. From global configuration mode, you can enter a variety of other configuration modes, including prot ocol-speci fic modes.
ROM monitor mode is a separate mode that is used when the software cannot load properly. If a valid software image is not found when the software boots or if the configuration file is corrupted at startup, the software might enter ROM monitor mode. Use the question symbol (?) to view the commands that you can use while the device is in ROM monitor mode.
rommon 1 > ? alias set and display aliases command boot boot up an external process confreg configuration register utility cont continue executing a downloaded image context display the context of a loaded image cookie display contents of cookie PROM in hex . . . rommon 2 >
Using the CLI
The following example sho ws ho w the command prompt changes to indicate a different command mode:
Router> enable Router# configure terminal Router(config)# interface ethernet 1/1 Router(config-if)# ethernet Router(config-line)# exit Router(config)# end Router#
Note A keyboard alternative to the end command is Ctrl-Z.
Using the Interactive Help Feature
The CLI includes an interactive Help feature. Table 2 describes how to use the Help feature.
Table 2 CLI Interactive Help Commands
Command Purpose
help Provides a brief description of the Help feature in any command mode. ? Lists all commands available for a particular command mode.
partial command? Provides a list of commands that begin with the character string (no
partial command<Tab> Completes a partial command name (no space between the command
command ? Lists the keywords, arguments, or both associated with the command
command keyword ? Lists the arguments that are associated with the keyword (space between
space between the command and the question mark).
and <Tab>).
(space between the command and the question mark).
the keyword and the question mark).
v
Using the CLI
Using the Command-Line Interface in Cisco IOS XE Software
The following examples show how to use the help commands:
help
Router> help Help may be requested at any point in a comma nd by entering a question mark '?'. If nothing
matches, the help list wil l be empty and you must backup unti l ent ering a '?' shows the available options.
Two styles of help are provided:
1. Full help is available wh en you are re ady to enter a c ommand argume nt (e.g. 'show ? ') and describes each possible argument.
2. Partial help is provided when an abbreviated argum ent is entered and you w ant to know what arguments match the input (e.g. 'show pr?'.)
?
Router# ? Exec commands: access-enable Create a temporary access-List entry access-profile Apply user-profile to interface access-template Create a temporary access-List entry alps ALPS exec commands archive manage archive files <snip>
partial command?
Router(config)# zo? zone zone-pair
partial command<Tab>
Router(config)# we<Tab> webvpn
command ?
Router(config-if)# pppoe ? enable Enable pppoe max-sessions Maximum PPPOE sessions
command keyword ?
Router(config-if)# pppoe enable ? group attach a BBA group <cr>
Understanding Command Syntax
Command syntax is the format in which a command should be entered in the CLI. Commands include the name of the command, keywords, and arguments. Keywords are alphanumeric strings that are used literally. Arguments are placeholders for values that a user must supply. Keywords and arguments may be required or optional.
Specific conventions convey information about syntax and command elements. Table 3 des cribes these conventions.
vi
Using the Command-Line Interface in Cisco IOS XE Software
Table 3 CLI Syntax Conventions
Symbol/Text Function Notes
< > (angle brackets) Indicate that the option is an
A.B.C.D. Indicates that you must enter a
WORD (all capital letters) Indicates that you must enter
LINE (all capital letters) Indicates that you must enter
<cr> (carriage return) Indicates the e n d o f t h e l i s t of
argument.
dotted decimal IP address.
one word.
more than one word.
available keywords and arguments, and also indicates when keywords and arguments are optional. When <cr> is the only option, you have reached the end of the branch or the end of the command if the command has only one branch.
Using the CLI
Sometimes arguments are disp laye d without angle brackets.
Angle brackets (< >) are not always used to indicate that an IP address is an argument.
Angle brackets (< >) are not always used to indicate that a WORD is an argument.
Angle brackets (< >) are not always used to indicate that a LINE is an argument.
The following examples show syntax conventions:
Router(config)# ethernet cfm domain ? WORD domain name
Router(config)# ethernet cfm domain dname ? level
Router(config)# ethernet cfm domain dname level ? <0-7> maintenance level number
Router(config)# ethernet cfm domain dname level 7 ? <cr>
Router(config)# snmp-server file-transfer access-group 10 ? protocol protocol options <cr>
Router(config)# logging host ? Hostname or A.B.C.D IP address of the syslog server ipv6 Configure IPv6 syslog server
vii
Using the Command-Line Interface in Cisco IOS XE Software
Using the CLI
Understanding Enable and Enable Secret Passwords
Some privileged EXEC commands are used for actions that impact the system, and it is recommended that you set a password for these commands to pre vent unauthorized use. Two types of passwords, enable (not encrypted) and enable secret (encrypted), can be set. The following commands set these passwords and are issued in global configuration mo de:
enable password
enable secret password
Using an enable secret password is recommended because it is encrypted and more secure than the enable password. When you use an enable secret password, text is encrypted (unreadable) before it is written to the config.text f ile. When you use an enable password, the text is written as entered (readable) to the config.text file.
Each type of password is case sensitiv e, can contai n from 1 to 25 uppercase and lo wercase alphanumeric characters, and can start with a number. Spaces are also valid password characters; for example, “two words” is a valid password. Leading spaces are ignored, but trailing spaces are recognized.
Note Both password commands have numeric keyw ords that are single inte ger v alues. If you choose a numb er
for the first character of your password follo wed by a space, the system will read the number as if it were the numeric keyword and not as part of your password.
When both passwords are set, the enable secret password takes precedence over the enable password. To remove a password, use the no form of the commands: no enable password or
no enable secret password. For more information about password recovery procedures for Cisco products, see
http://www.cisco.com/en/US/products/sw/iosswrel/ps1831/ products_tech_note09186a00801746e6.shtml.
Using the Command History Feature
The command history feature saves the commands that you enter during a session in a comman d history buffer. The default number of commands saved is 10, b ut the nu mber is configurable within the range of 0 to 256. This command history feature is particularly useful for recalling long or complex commands.
To change the number of commands saved in the history buffer for a terminal session, issue the terminal history size command:
Router# terminal history size num
A command history buffer is also available in line configuration mode with the same default and configuration options. To set the command history buffer size for a terminal session in line configuration mode, issue the history command:
Router(config-line)# history [size num]
viii
Using the Command-Line Interface in Cisco IOS XE Software
To recall commands from the history buffer, use the following methods:
Press Ctrl-P or the Up Arrow key—Recalls commands beginning with the most recent command.
Repeat the key sequence to recall successively older commands.
Press Ctrl-N or the Down Arrow key—Recalls the most recent commands in the history buf fer aft er
they have been recalled using Ctrl-P or the Up Arrow key. Repeat the key sequence to recall successively more recent commands.
Note The arrow keys function only on ANSI-compatible terminals such as the VT100.
Issue the show history command in user EXEC or privileged EXEC mode—Lists the most recent
commands that you entered. The number of commands that are displayed is determined by the setting of the terminal history size and history commands.
The command history feature is enabled by default. To disable this feature for a terminal session, issue the terminal no history command in user EXEC or privileged EXEC mode or the no history command in line configuration mode.
Using the CLI
Abbreviating Commands
Typing a complete command name is not always required for the command to execute. The CLI recognizes an abbreviated command when the abbreviation contains enough characters to uniquely identify the command. For example, the show version command can be abbreviated as sh ver. It cannot be abbreviated as s ver because s could mean show, set, or systat. The sh v abbreviation also is not valid because the show command has vrrp as a keyword in addition to ve rsion.
Using Aliases for CLI Commands
To save time and the repetition of entering the same command multiple times, you can use a command alias. An alias can be configured to do anything that can be done at the command line, but an alias cannot move between modes, type in passwords, or perform any interactive functions.
Ta ble 4 shows the default command aliases.
Table 4 Default Command Aliases
Command Alias Original Command
h help lo logout p ping s show u or un undebug w where
ix
Using the CLI
To create a command alias, issue the alias command in global configuration mode. The syntax of the command is alias mode command-alias original-command. Following are some examples:
Router(config)# alias exec prt partition—privileged EXEC mode
Router(config)# alias configure sb source-bridge—global configuration mode
Router(config)# alias interface rl rate-limit—interface configuration mode
To view both default and user-created aliases, issue the show alias command. For more information about the alias command, see
http://www.cisco.com/en/US/docs/ios/fundamentals/command/reference/cf_book.html.
Using the no and default Forms of Commands
Most configuration commands have a no form that is used to reset a command to its default value or disable a feature or function. For example, the ip routing command is enabled b y default. To disable this command, you would issue the no ip routing command. To re-enable IP routing, you would issue the ip routing command.
Configuration commands may also have a default form, which returns the command settings to their default values. For commands that are disabled b y def ault, u sing the default form has the same ef fect as using the no form of the command. For commands that are enabled by default and have default settings, the default form enables the command and returns the settings to their default values.
The no form is documented in the command pages of command references. The default form is generally documented in the command pages only when the default form performs a different function than the plain and no forms of the command. To see what default commands are available on your system, enter default ? in the appropriate command mode.
Using the Command-Line Interface in Cisco IOS XE Software
Using the debug Command
A debug command produces extensive output that helps you troubleshoot problems in your network. These commands are available for many features and functions within Cisco IOS XE software. Some debug commands are debug all, debug aaa accounting, and debug mpls packets. To use debug commands during a Telnet session with a device, you must first enter the terminal monitor command. To turn off debugging completely, you must enter the undebug all command.
For more information about debug commands, see the Cisco IOS Debug Command Reference at
http://www.cisco.com/en/US/docs/ios/debug/command/reference/db_book.html.
Caution Debugging is a high priority and high CPU utilization process that can render your dev ice unusable. Use
debug commands only to troubleshoot specific problems. The best times to run debugging are during periods of low network traffic and when few users are interacting with the network. Debugging during these periods decreases the likelihood that the debug command processing overhead will af fect network performance or user access or response times.
x
Using the Command-Line Interface in Cisco IOS XE Software
Filtering Output Using Output Modifiers
Many commands produce lengthy output that may use several screens to display. You can use output modifiers to filter this output to show only the information that you want to see.
The following three output modifiers are available:
begin regular-expression—Displays the first line in which a match of the regular e xpression is found
and all lines that follow.
include regular-expression—Displays all lines in which a match of the regular expression is found.
exclude regular-expression—Displays all lines except those in which a match of the regular
expression is found.
To use one of these output modifiers, type the command followed by the pipe symbol (|), the modifier, and the regular expression that you want to search for or filter. A regular expression is a case-sensitive alphanumeric pattern. It can be a single character or number, a phrase, or a more complex string.
The following example illustrates how to filter output of the show interface command to display only lines that include the expression “protocol.”
Router# show interface | include protocol
Using the CLI
FastEthernet0/0 is up, line protocol is up Serial4/0 is up, line protocol is up Serial4/1 is up, line protocol is up Serial4/2 is administratively down, line protocol is down Serial4/3 is administratively down, line protocol is down
Understanding CLI Error Messages
You may encounter some error messages while using the CLI. Table 5 shows the common CLI error messages.
Table 5 Common CLI Error Messages
Error Message Meaning How to Get Help
% Ambiguous command: “show con”
% Incomplete command. You did not enter all the
% Inv alid input detected at “^” marker.
You did not enter enough characters for the command to be recognized.
keywords or values required by the command.
You entered the command incorrectly. The caret (^) marks the point of the error.
Reenter the command followed by a space and a question mark (?). The keywords that you are allowed to enter for the command appear.
Reenter the command followed by a space and a question mark (?). The keywords that you are allowed to enter for the command appear.
Enter a question mark (?) to display all the commands that are available in this command mode. The keywords that you are allowed to enter for the command appear.
For more system error messages, see the System Messages for Cisco IOS XE document.
xi
Saving Changes to a Configuration
Saving Changes to a Configuration
T o sa ve changes that you made to the confi guration of a de vice, you must i ssue the copy running-conf ig startup-config command or the copy system:running-config nvram:startup-config comma nd. When
you issue these commands, the configuration changes that you made are saved to the startup configuration and saved when the software reloads or power to the device is turned off or interrupted. The following example shows the syntax of the copy running-config startup-config command:
Router# copy running-config startup-config Destination filename [startup-config]?
You press Enter to accept the startup-config filename (the default), or type a n ew f ilename and then press Enter to accept that name. The following outpu t is displayed indicating that the conf igurat ion was sa v ed:
Building configuration... [OK] Router#
On most platforms, the configuration is sa ved to NVRAM. On platforms with a Class A flash file system, the configuration is saved to the location specified by the CONFIG_FILE environment variable. The CONFIG_FILE variable defaults to NVRAM.
Using the Command-Line Interface in Cisco IOS XE Software
Additional Information
“Part 1: Using the Cisco IOS Command-Line Interface (CLI)” of the Cisco IOS XE Configuration
Fundamentals Configuration Guide
http://www.cisco.com/en/US/docs/ios/ios_xe/fundamentals/configuration/guide/2_xe/cf_xe_book. html
or “Using Cisco IOS XE Software” chapter of the Cisco ASR 1000 Series Aggregation Services Routers
Software Configuration Guide
http://www.cisco.com/en/US/docs/routers/asr1000/configuration/guide/chassis/Using_CLI.html
Cisco Product Support Resources
http://www.cisco.com/go/techdocs
Support area on Cisco.com (also search for documentation by task or product)
http://www.cisco.com/en/US/support/index.html
Software Download Center (downloads; tools; licensing, registration, advisory, and general
information) (requires Cisco.com user ID and password)
http://www.cisco.com/kobayashi/sw-center/
Error Message Decoder, a tool to help you research and resolve error messages for
Cisco IOS XE software
http://www.cisco.com/pcgi-bin/Support/Errordecoder/index.cgi
xii
Using the Command-Line Interface in Cisco IOS XE Software
Command Lookup Tool, a tool to help you find detailed descriptions of Cisco IOS XE commands
(requires Cisco.com user ID and password)
http://tools.cisco.com/Support/CLILookup
Output Interpreter, a troubleshooting tool that analyzes command output of supported
show commands
https://www.cisco.com/pcgi-bin/Support/OutputInterpreter/home.pl\
CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Nurse Connect, Cisco Pulse, Cisco SensorBase, Cisco StackPower, Cisco StadiumV ision, Cisco TelePresence, Cisco Unified Computing System, Cisco W e bEx, D CE, Flip Chann els, Fli p for Good, Flip Mino, Flipshare (Design), Flip Ultra, Fli p Video, Flip V i deo (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capit al, C isco Capit al (D esign), Cis co:Finan ced (Styl ized), Cisco Stor e, Flip Gift Card, and One Million Acts of Green are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting T o You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Lumin, Cisco Nexus, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Cont inuum, E th erFast, EtherSwitch, Event Center, Explor er, Follow Me Browsi ng, Gain Mak er, iLYNX, IOS, iPhone, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, SenderBase, SMARTnet, Spectrum Expert, StackWise, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0910R)
Any Internet Protocol (IP) addresses an d ph one nu mbers u sed in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other fig ures included in the document are sho wn for illust rati v e purp oses only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.
© 2009 Cisco Systems, Inc. All rights reserved.
Additional Information
xiii
Additional Information
Using the Command-Line Interface in Cisco IOS XE Software
xiv
Intelligent Services Gateway Features Roadmap
First Published: March 20, 2006 Last Updated: November 25, 2009
This feature roadmap lists the Cisco IOS XE features documented in the Cisco IOS XE Intelligent Services Gateway Configuration Guide and maps them to the documents in which they appear. The
roadmap is organized so that you can select your release train and see the features in that release. Find the feature name you are searching for and click on the URL in the “Where Documented” column to access the document containing that feature.
Feature and Release Support
Table 1 lists ISG feature support for Cisco IOS XE Release 2. Use Cisco Feature Navigator to find
information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS XE software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 1 lists only the Cisco IOS XE software release that introduced support for a given feature in a
given Cisco IOS XE software release train. Unless noted otherwise, subsequent re leases of t hat Cisco IOS software release train also support that feature.
Table 1 lists the most recent release of the software train first and the features in alphabetical order
within the release.
Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
Intelligent Services Gateway Features Roadmap
Table 1 Supported ISG Features in Cisco IOS XE Release 2
Release Feature Name Feature Description Where Documented
Cisco IOS XE Release 2.5
ISG:Session: Creation: Interface IP Session: L2
ISG IP interface sessions include all IP traffic received on a specific physical or virtual interface. IP interface sessions are provisioned through the CLI; that is, a
Configuring ISG Access for IP Subscriber
Sessions
session is created when the IP interface session commands are entered.
Cisco IOS XE Release 2.5
ISG:Session: Creation: Interface IP Session: L3
ISG IP interface sessions include all IP traffic received on a specific physical or virtual interface. IP interface sessions are provisioned through the CLI; that is, a
Configuring ISG Access
for IP Subscriber
Sessions
session is created when the IP interface session commands are entered.
Cisco IOS XE Release 2.5
ISG:Session: Multicast: Coexistence
This feature introduces the ability to host all the subscribers and services (data and multicast) on the same VLAN by enabling multicast and IP sessions to
Configuring ISG Access
for IP Subscriber
Sessions
coexist on the same subinterface.
Cisco IOS XE Release 2.5
ISG:Session: Static Session Creation
This feature enables administrator-initiated static IP sessions.
Configuring ISG Access
for IP Subscriber
Sessions
Cisco IOS XE Release 2.5
ISG:Instrumentation: DHCP Lease Query Support
The DHCP Lease Query transaction is a DHCP transaction with special message types that enable, among other things, clients to query DHCP servers
Configuring ISG Access
for IP Subscriber
Sessions
regarding the owner and th e lease-expiration-t ime of an IP address.
Cisco IOS XE Release 2.5
ISG:AAA Wireless Enhancements
This feature enhances ISG RADIUS proxy functionality to provide additional support for mobile
Configuring ISG as a
RADIUS Proxy
wireless environments. It includes changes to RADIUS attribute 31 processing.
Cisco IOS XE Release 2.5
ISG:Authentication: Radius Proxy WiMax
RADIUS proxy enhancements provide additional support for WiMax broadband environments.
Configuring ISG as a
RADIUS Proxy
Enhancements
Cisco IOS XE Release 2.5
Cisco IOS XE Release 2.5
ISG:Policy Control: Differentiated Initial Policy Control
This feature provides minimal or temporary network access to the subscribers when the RADIUS servers are down or cannot be accessed because of network issues.
ISG:Accounting: Prepaid ISG prepaid billing support allows ISG to check a
subscriber's available credit to determine whether to allow the subscriber access to a service and how long
Configuring ISG Control
Policies
Configuring ISG
Support for Prepaid
Billing
the access can last. ISG supports volume-based and time-based prepaid billing.
Cisco IOS XE Release 2.2
Cisco IOS XE Release 2.2
IP Subscriber Session CLI Updates
ISG:Accounting: Per Session, Service, and Flow
Some of the commands that are used to configure ISG IP subscriber sessions were modifi ed or replaced in this release.
ISG accounting provides a means to bill for account or service usage. ISG accounting uses the RADIUS protocol to facilitate interactio n between ISG and an
Configuring ISG Access
for IP Subscriber
Sessions
Configuring ISG
Accounting
external RADIUS-based AAA or mediation server.
2
Loading...
+ 328 hidden pages