|
|
This chapter describes basic system startup and use. Information in this chapter will help you with these tasks:
The setup command facility enables you to start using your network server quickly and without extensive background knowledge. It does this by prompting you for the information required to perform basic configuration procedures. The setup command facility is available on all Cisco Systems internetworking products with Release 9.1 or later software.
Use the setup command facility both at initial system configuration and for basic changes at any time. In addition, use the facility as a teaching tool to become familiar with the expected command sequence as you step through the process. Because of these additional characteristics, Cisco refers to setup as a command facility rather than simply as a command.
Refer to the Router Products Getting Started publication for detailed information and a step-by-step description of the configuration procedure using the setup command facility.
Use the setup command facility to do the following:
Configure the following protocols with the setup command facility:
For more advanced applications, you need to enter a privileged configuration session, as described in the section "Entering Configuration Mode" later in this chapter.
The setup command facility operates automatically the first time you power on your network server and when you add new hardware components. To use setup on subsequent occasions, you must invoke it as you would any other command by typing setup at the EXEC prompt (described in the section "Entering Configuration Mode" later in this chapter).
Before you start using the setup command facility, you need to do the following:
Step 1: Attach an RS-232 ASCII terminal to the system console port located at the rear of the network server.
Refer to the appropriate hardware installation and maintenance publications for details about cabling considerations and establishing electrical connections.
Step 2: Configure the terminal to operate at 9600 baud, 8 data bits, no parity, 1 stop bit.
Step 3: Power on the network server and run the setup program.
In addition, you need to know the following before you start:
The streamlined setup command facility gives you an opportunity to continue booting your system even though there may be problems with the configuration file when you are attempting to netboot an image.
The router enters the streamlined setup command facility under the following circumstances:
The router enters the streamlined setup command facility if, in addition to any of the above-listed circumstances, your system has RXBOOT ROMs installed. For example, your system might be a Cisco 3000 with IGS-RXBOOT or a Cisco 4000 with XX-RXBOOT installed.
If any of the listed items apply to your router, you will see the following screen:
--- System Configuration Dialog ---
Refer to the 'Getting Started' Guide for additional help.
Default settings are in square brackets '[]'.
Configuring interface IP parameters for netbooting:
Configuring interface Ethernet0:
Is this interface in use? [yes]:
IP address for this interface: 131.108.169.23
Number of bits in subnet field [0]: 8
Class B network is 131.108.0.0, 8 subnet bits; mask is
255.255.255.0
Configuring interface Ethernet1:
Is this interface in use? [yes]:
IP address for this interface: 131.108.163.23
Number of bits in subnet field [8]:
Class B network is 131.108.0.0, 8 subnet bits; mask is
255.255.255.0
"Configuring interface IP parameters for netbooting" appears only if you are netbooting and your configuration has insufficient IP information.
You will be asked to provide an IP address and subnet mask bits. You can enter the subnet mask bits as a decimal value such as 8.
The configuration information you provide at this screen is temporary and is requested only to allow you to proceed with booting your system. Your original configuration is left intact. When you reload the system, that configuration will be used.
The setup command facility determines which interfaces are installed and prompts you for configuration information for each one. Once you complete one interface, the facility automatically starts over for the next, continuing until each interface has been configured.
When you first power on your console and network server, a script similar to the following will appear on the screen. The first section of the script displays the banner information, including the software version:
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
Cisco Systems, Inc.
1525 O'Brien Drive
Menlo Park, California 94026
GS Software (GS3-BFX), Version 9.1(1)
Copyright (c) 1986-1992 by Cisco Systems, Inc.
Compiled Fri 31-Jul-92 13:31
The next portion of the display is a list of the installed hardware. By reading the installed hardware, the system automatically presents the appropriate interfaces during the configuration process.
CSC3 (68020) processor with 4096K bytes of memory. X.25 software. Bridging software. 1 MCI controller. 1 Ethernet/IEEE 802.3 interface. 1 Token Ring interface. 1 Serial network interface. 1 FDDI interface. Environmental Controller. 64 Kbytes of multibus memory. 64 Kbytes of non-volatile memory.
The first two sections of the configuration script (the banner and the installed hardware) appear each time the system is started up.
At the first-time system startup, the System Configuration Dialog automatically appears, offering the prompts for which you'll provide the answers to configure your system.
--- System Configuration Dialog ---
At any point you may enter a question mark '?' for help.
Refer to the 'Getting Started' Guide for additional help.
Default settings are in square brackets '[]'. Continue with
configuration dialog? [yes]:
At this point, you may choose not to continue with the System Configuration Dialog and exit by answering "no" to this prompt.
Answer "yes" to continue with the setup configuration dialog. The remainder of the script is the actual configuration process, with each prompt appearing automatically. Press the Return key to accept the default settings.
There is no default for the final prompt which asks you if you want to use this configuration; you must answer either "yes" or "no". Also note that the setup command only asks you to configure the protocols for each interface that you specified on a global basis. For instance, if you said "no" for XNS under the global parameters, the command does not prompt you to configure that protocol under the interface parameters.
Configuring global parameters: Enter host name [Router]: sandboxEnter enable password: shovelEnter virtual terminal password: pailConfigure SNMP Network Management? [no]:yesConfigure XRemote font servers? [no]:yesEnter a font server IP address or press RETURN to exit:121.78.1.1Enter a font server IP address or press RETURN to exit: Configure IP? [yes]: Configure IGRP routing? [yes]: Your IGRP autonomous system number [1]: Configure DECnet? [no]:yesYour area number [1]: Your node number [1]: Area (level 2) routing? [no]:yesConfigure XNS? [no]:yesConfigure Novell? [no]:yesConfigure AppleTalk? [no]:yesMultizone networks? [no]:yesConfigure CLNS? [yes]: CLNS router tag [area_1]: CLNS domain [49]: CLNS area [0001]: CLNS station id [0000.0C01.0D1D]: Configure Vines? [no]:yesConfigure bridging? [no]:yesConfiguring interface parameters: Configuring interface TokenRing0: Is this interface in use? [yes]: Tokenring ring speed (4 or 16) ? [16]: Configure IP on this interface? [no]:yesIP address for this interface:131.108.92.67Number of bits in subnet field [0]: Class B network is 131.108.0.0, 0 subnet bits; mask is 255.255.0.0 Configure DECnet on this interface? [yes]: DECnet cost [10]: Configure XNS on this interface? [no]:yesXNS network number [1]: Configure Novell on this interface? [no]:yesNovell network number [1]: Configure AppleTalk on this interface? [no]:yesAppleTalk starting cable range [0]:4172AppleTalk ending cable range [4172]: AppleTalk zone name [myzone]:twilightAppleTalk zone name:ozoneAppleTalk zone name: Configure CLNS on this interface? [yes]: Configure Vines on this interface? [yes]: Configure bridging on this interface? [yes]: Configuring interface Ethernet0: Is this interface in use? [yes]: Configure IP on this interface? [yes]: IP address for this interface:131.108.6.67Number of bits in subnet field [0]: Class B network is 131.108.0.0, 0 subnet bits; mask is 255.255.0.0 Configure DECnet on this interface? [yes]: DECnet cost [10]: Configure XNS on this interface? [yes]: XNS network number [2]: Configure Novell on this interface? [yes]: Novell network number [2]: Configure AppleTalk on this interface? [yes]: Extended AppleTalk network? [no]:yesAppleTalk starting cable range [4172]: AppleTalk ending cable range [4172]: AppleTalk zone name [twilight]: AppleTalk zone name [ozone]: AppleTalk zone name: Configure CLNS on this interface? [yes]: Configure Vines on this interface? [yes]: Configure bridging on this interface? [yes]: Configuring interface Serial0: Is this interface in use? [yes]: Configure IP on this interface? [yes]: IP address for this interface:131.108.97.67Number of bits in subnet field [0]: Class B network is 131.108.0.0, 0 subnet bits; mask is 255.255.0.0 Configure DECnet on this interface? [yes]:noConfigure XNS on this interface? [yes]:noConfigure Novell on this interface? [yes]:noConfigure AppleTalk on this interface? [yes]: Extended AppleTalk network? [no]: AppleTalk network number [1]: AppleTalk zone name [twilight]: Configure CLNS on this interface? [yes]: Configure Vines on this interface? [yes]: Configure bridging on this interface? [yes]: Configuring interface Fddi0: Is this interface in use? [yes]: Configure IP on this interface? [yes]:noConfigure DECnet on this interface? [yes]:noConfigure XNS on this interface? [yes]:noConfigure Novell on this interface? [yes]:noConfigure AppleTalk on this interface? [yes]: AppleTalk starting cable range [0]: Configure CLNS on this interface? [yes]:noConfigure Vines on this interface? [yes]:noConfigure bridging on this interface? [yes]:noThe following configuration command script was created: hostname sandbox enable-password shovel line vty 0 4 password pail snmp-server community xremote tftp host 121.78.1.1 ! ip routing decnet routing 1.1 decnet node-type area xns routing novell routing appletalk routing clns routing router iso-igrp area_1 net 49.0001.0000.0C01.0D1D.00 vines routing bridge 1 protocol dec ! ! ! interface TokenRing0 ip address 131.108.92.67 255.255.255.0 xns network 1 novell network 1 appletalk cable-range 4172-4172 appletalk zone twilight clns router iso-igrp area_1 vines metric bridge-group 1 ! interface Ethernet0 ip address 131.108.6.67 255.255.255.0 xns network 2 novell network 2 appletalk cable-range 4172-4172 appletalk discovery clns router iso-igrp area_1 vines metric bridge-group 1 ! interface Serial0 no shutdown no ip address appletalk address 50000.72 appletalk zone twilight clns router iso-igrp area_1 vines metric bridge-group 1 ! interface Fddi0 no ip address appletalk cable-range 0-0 0.0 appletalk discovery ! router igrp 109 network 131.108.0.0 ! end Use this configuration? [yes/no]:yes[OK] Use the enabled mode 'configure' command to modify this configuration. Press RETURN to get started!
The server displays the system name (sandbox), followed by an angle bracket (>), which is the prompt of the system's command interpreter.
The command interpreter is called the EXEC. The EXEC interprets the commands you type and carries out the corresponding operations.
You can type commands when you see the system prompt, which is the system's host name ending with an angle bracket (>). Although the default system host name is Router>, this may have been changed during the initial configuration using the setup command, or with the hostname configuration command. The following sections describe how to use the EXEC.
The EXEC accepts commands typed in uppercase letters, lowercase letters, or both. You may also abbreviate commands and other keywords to the number of characters that cause the command to be a unique abbreviation. For example, you can abbreviate the show command to sh.
If you make a typing mistake, you can erase characters one at a time with the Delete or the Backspace key. Press either key to erase the last character typed. To erase the entire line, type Ctrl-U. (This notation means "Hold down the Ctrl key and press the U key.") The server acts on most commands after you press the Return key.
You can list available EXEC commands by typing a question mark (?). You also can enter a question mark to obtain more information about commands. For example, type terminal ? to obtain a list of terminal commands or show ? to obtain a list of show commands.
Certain EXEC commands produce multiple screens of output. At the end of each screen, the EXEC pauses and displays:
-More-
Type a space to continue the output; type anything else to return to the system command prompt.
For security purposes, the EXEC has two levels of access: user and privileged. The commands available at the user level are a subset of the commands available at the privileged level. Because many of the privileged commands set operating parameters, the privileged level should be password-protected to prevent its unauthorized use. The system prompt for the privileged level ends with a pound sign (#) instead of an angle bracket (>).
The EXEC enable command allows access to the privileged level, prompting for a password if one has been set with the enable password or enable-password configuration command. (For more information, see the section "Establishing Passwords and System Security" in "Configuring the System" chapter of this manual.
Type the ? (question mark) command at the user level to see a list of the user-level EXEC commands similar to the following:
Router> ? connect <host> Connect to host - same as typing just a host name disconnect <cn> Break the connection specified by name or number exit, quit Exit from the EXEC name-connection Give a connection a logical name resume Make the named connection be current show <cmd> Information commands, type "show ?" for list systat Show terminal lines and users telnet <host> Connect to host using telnet protocol terminal Change terminal's parameters, type "terminal ?" where Show open connections <cr> To resume connection
Type enable and enter the password to access the privileged command level. Type the ? (question mark) command to see a list of privileged-level EXEC commands similar to this example:
Router# ?
clear Reinitialization functions, type "clear ?" for list
configure Configure from terminal or over network
connect <host> Connect to host - same as typing just a host name
debug Enable debugging functions, type "debug ?" for list
disable Turn off privileged commands
disconnect <cn> Break the connection specified by name or number
enable Turn on privileged commands
exit, quit Exit from the EXEC
name-connection Give a connection a logical name
ping Send echo messages
reload Halt and reload system
resume Make the named connection be current
send <line>|* Send message to a terminal line or lines
setup Initialize system configuration
show <cmd> Information commands, type "show ?" for list
systat Show terminal lines and users
telnet <host> Connect to host using telnet protocol
terminal Change terminal's parameters, type "terminal ?"
test Run hardware tests, type "test ?"
trace <address> Trace route to <address>
undebug Disable debugging functions, type "undebug ?" for list
where Show open connections
write Write configuration memory, type "write ?" for list
<cr> To resume connection
To return to the user-level prompt, type disable at the EXEC prompt.
The EXEC command configure begins the configuration mode, where you enter the commands to configure your network server for its particular routing or bridging function. The following section describes the use of this command.
Use the privileged EXEC command configure to begin configuration of the network server.
Begin by entering the privileged level of the EXEC. This is done by entering the enable command at the EXEC prompt:
Router> enable
The EXEC then prompts you for a privileged-level password:
Password:
Type in the password. For security purposes, the password will not be displayed. (Also note that the password is case-sensitive.) When you enter the correct password, the system displays the privileged-mode system prompt:
Router#
To begin configuration mode, enter the configure command at the privileged-mode prompt:
Router# configure
When you enter this command, the EXEC prompts you for the source of the configuration subcommands.
Configuring from terminal, memory, or network [terminal]?
The default is to type in commands from the terminal console. Pressing the Return key begins this configuration method. Each configuration technique (terminal, memory, and network) is described in more detail later in this chapter.
The EXEC provides you with a simple editor for entering the configuration commands, and explains the editing functions:
Enter configuration commands, one per line. Edit with DELETE, CTRL/W, and CTRL/U;end with CTRL/Z
Table 1-1 lists the edit key functions and their meanings.
| Key | Meaning |
|---|---|
| Delete or Backspace | Erases one character. |
| Ctrl-W | Erases a word. |
| Ctrl-U | Erases a line. |
| Ctrl-R | Redisplays a line. |
| Return | Executes single-line commands. |
| Ctrl-Z | Ends configuration mode and returns to the EXEC. |
The configuration subcommands are categorized by these functions:
The command descriptions include the command types and give examples of their use.
As with EXEC commands, you can type configuration subcommands in uppercase letters, lowercase letters, or both. You can also shorten all commands and other keywords to unique abbreviations. You can add comments by preceding the line with an exclamation point (!). Comments do not affect command processing.
The network server does not display confirmation messages as it executes the commands. If the network server encounters a problem, it displays an error message on the console terminal.
In most cases, you can negate a configuration subcommand or restore a default by typing no before the subcommand keyword. You usually can omit the arguments of the subcommand when you negate it with no. The command descriptions note any exceptions to these rules.
The following examples of configuration files illustrate how to enter the configuration commands.
The EXEC accepts commands in uppercase and lowercase letters. Exclamation points are not parsed and serve as comment lines and delimiters between configuration commands.
Use global configuration commands to enable functions that affect the entire system rather than a particular line or interface, and can appear any place within the configuration file. An example of this is the global configuration command to define the host name, or the name of the router:
hostname router-1
Commands to enable a particular routing or bridging function are also global configuration commands. The following example illustrates how to enable the Xerox Network System (XNS) routing protocol:
xns routing 0123.4567.abcd
Once enabled, interface characteristics for XNS routing are specified using the interface command and XNS-specific interface subcommands. Command descriptions in the sections describing configuration will define the command type.
Interface subcommands modify the operation of an interface such as an Ethernet, FDDI, or serial port. Interface subcommands always follow an interface command, which defines the interface type.
The following example illustrates how to enable XNS network 1 on interface Ethernet 0:
interface ethernet 0 xns network 1
The following example illustrates how to configure the token rotation timer on interface FDDI 0:
interface FDDI 0 fddi token-rotation-timer 24000
If you forget to enter the interface command, the system displays the message "must specify a network interface."
Line subcommands modify the operation of a serial terminal line. Line subcommands always follow a line command, which defines the line number. If you forget to enter the line command, the system displays the message "must specify a line or range of lines."
The following example illustrates how to set the password on line 5:
line 5 password secretword
Router subcommands are used to configure IP routing protocol characteristics and always follow a router command. The following example illustrates how to set the maximum hop metric for the Cisco IGRP routing protocol:
router igrp metric maximum-hops 150
If you forget to enter the router command, the system displays the message "must specify a routing protocol."
Remember to type Ctrl-Z to end your configuration sessions and to use the disable command to leave the privileged mode.
If you used the setup facility's interactive dialog prompts to start your configuration file, it was saved in nonvolatile memory when you finished the prompts. If you chose not to create your configuration file this way, there are several options you now can choose from to create the configuration file.
The network server holds configuration information in two places--in running memory and in nonvolatile memory. Configuration information in running memory is temporary and will not be stored if power is shut off. Configuration information in nonvolatile memory is always available.
Use the EXEC command write memory to copy current (running) configuration information to nonvolatile memory. This command stores all nondefault configuration information as configuration commands in text format. The command also records a checksum for the information to protect against data corruption.
The EXEC command show configuration displays information stored in nonvolatile memory. You can use this command and the write terminal command to find differences between the current configuration (that in running memory) and that stored in nonvolatile memory. Use the EXEC command write erase to clear the contents of nonvolatile memory.
The write commands create their output by examining the state of the system currently running. The output produced by the write commands is generated by the software, and will not necessarily match the text the user entered to create the current configuration.
The network server also allows you to store the configuration file on a network host. (This allows you to use an editor on the host to edit and create the configuration file.) Use the EXEC command write network to copy the current configuration information to a server host on the network. Use of this command is described later in this section.
To issue configuration commands from the console terminal, enter the EXEC command configure at the privileged-level EXEC prompt and enter configuration mode.
The network server responds with this prompt asking you to specify the terminal, a file, or nonvolatile memory as the source of configuration commands:
Configuring from terminal, memory, or network [terminal]?
To begin configuration, type terminal at the prompt or press Return (since terminal is the default) to start command collection. (See the section "Entering Configuration Mode" in this chapter for more information.)
During command collection, the network server accepts one configuration command per line. You can enter as many configuration subcommands as you want.
Type Ctrl-Z when you finish entering configuration commands. This returns you to the EXEC, where you can test your configuration or write the configuration commands to memory.
At periodic intervals, you will want to write the configuration information into nonvolatile memory or to a configuration file stored on a remote host. This will make checking, adding information to, and booting the configuration file an easier task. The procedures for writing information to nonvolatile memory are described next.
After you enter the desired configuration information at the console terminal, use the privileged EXEC command write memory to make a copy of the configuration information in the nonvolatile memory. Nonvolatile memory stores the current configuration information in text format as configuration commands, recording only nondefault settings. The memory is checksummed to guard against corrupted data.
As part of its startup sequence, the network server startup software always checks for configuration information in the nonvolatile memory. If the nonvolatile memory holds valid configuration commands, the network server executes the commands automatically at startup. If the network server detects a problem with the nonvolatile memory or the configuration information it contains, the network server may enter the setup mode, prompting for configuration information. Problems can include a bad checksum for the information in the nonvolatile memory and the absence of critical information.
To display the configuration information stored in the nonvolatile memory, enter the show configuration EXEC command at the privileged-mode EXEC prompt.
To clear the contents of the nonvolatile memory, enter the write erase EXEC command at the privileged level EXEC prompt.
To re-execute the configuration commands stored in nonvolatile memory, enter memory at the configure mode prompt:
Configuring from terminal, memory, or network [terminal]? memory
To store configuration information on a remote host, enter the privileged EXEC command write network. This command sends a copy of the current configuration information to a remote host. The command will prompt you for the destination host's address and a file name, as the following example illustrates.
Tokyo#write networkRemote host [131.108.2.155]? Name of configuration file to write [tokyo-confg]? Write file tokyo-confg on host 131.108.2.155? [confirm]yWriting tokyo-confg... [OK]
To retrieve and/or add to the configuration information stored on a host file on a device on your network, enter network at the configure mode prompt (see the section "Entering Configuration Mode" in this chapter for more information):
Configuring from terminal, memory, or network [terminal]? network
The system will ask you to select a host or network configuration file, for the address of the host, and for a file name. The following example illustrates this process.
Host or network configuration file [host]?
IP address of remote host [255.255.255.255]? 131.108.2.155
Name of configuration file [tokyo-confg]?
Configure using tokyo-confg from 131.108.2.155? [confirm] y
Booting tokyo-confg from 131.108.2.155: !! [OK - 874/16000 bytes]
The network server may be configured to automatically load additional configuration information from a network host. You may want to keep an up-to-date version of configuration information on another host, where you can change it as necessary, and use the nonvolatile memory as a bootstrap or backup mechanism. You can instruct the network server to load configuration information over the network by entering the service config subcommand and then writing the information to nonvolatile memory using the write memory command. Loading configuration information over the network is the default if nonvolatile memory is not installed. (The service configuration subcommand is described in the section "Tailoring Use of Network Services" in the "Configuring the System" chapter of this manual.)
After loading configuration information from the nonvolatile memory, the network server will attempt to load two configuration files from remote hosts. The first is the network configuration file, which contains commands that apply to all network servers and terminal servers on a network. The second is the host configuration file, which contains commands that apply to one network server in particular.
The network server uses the Trivial File Transfer Protocol (TFTP) to load and save system images and configuration files.
The default name of the network configuration file is network-confg. The default name for the host configuration file is taken from the host name. The host name can be specified by the hostname configuration subcommand or can be derived from the Domain Name System (DNS); see the section "Setting the Host Name" in the "Configuring the System" chapter of this manual for more information. To form the host configuration file name, the network server converts the host name to lowercase, stripped of any DNS information, and appends "-confg." If no host name information is available, the default host configuration file name is router-confg. Other names for these configuration files can be set using the boot command, which is described in the section "Setting Configuration File Specifications" in the "Configuring the System" chapter of this manual.
By default, network configuration files are loaded when the router is rebooted. Use the no version of this command to disable the loading of these files.
If the network server fails to load a configuration file during startup, it tries again every ten minutes (default setting) until a host provides the requested files. With each failed attempt, the network server displays a message on the console terminal.
If the network server is unable to load the file named network-confg, it displays the following message:
Booting network-confg... [timed out]
As configured at the factory, the operating system software executes instructions in the onboard EPROM. You need not change the system EPROMs with each software update. Instead, you can download the latest software over the network. This process is called
netbooting.
Netbooting works as follows: when you power on your network server product for the first time, it checks the processor configuration register or the nonvolatile memory for special netbooting instructions. If the system finds no special instructions, it executes the default EPROM software.
If the system finds netbooting instructions, it determines its interface address and then runs a special process to TFTP-load the new software into memory.
You can specify boot loading in two ways. The first way involves setting the low four bits of the processor configuration register; see the appropriate hardware installation and maintenance publication for details. If no bits are set, you must manually boot the system using the System Bootstrap program. If only the low bit is set, the system runs the default software. The system interprets any other binary bit combination as an octal number for use in forming the boot file name. The system forms the boot file name by starting with the word "cisco" and then appending the octal number, a hyphen, and the processor type name. The System Bootstrap program displays the processor type name at system startup.
For example, if bit one in the four-bit field is set and the processor type is CSC/3, the boot file name formed is cisco2-csc3. Assuming no other information is available, the system would try to TFTP-load the file cisco2-csc3 by first sending a broadcast TFTP read request to determine which server host had the file.
The second way to specify netbooting uses the nonvolatile memory option, which enables you to provide more detailed instructions for software downloading. You can use the boot configuration command to specify both the boot file name and the IP address of the server host. You must still set the bottom four bits of the configuration register to a netbooting value.
By default, the router uses an Internet address of all ones (255.255.255.255) to broadcast TFTP Read Request message. However, many hosts use an old style of broadcast address consisting of all zeros. You can change the operation of the router to accommodate hosts using the old style of broadcast address by using the ip broadcast-address command described in the "Routing IP" chapter of this manual.
The TFTP session can sometimes fail. To help determine why a TFTP session failed, TFTP generates a "E" character if it receives an erroneous packet, and an "O" if it receives an out-of-sequence packet. A period (.) indicates a timeout. The transfer session may still succeed even if TFTP generates these characters, but the output is useful for diagnosing the transfer failure.
With a CSC-MC+ Flash Memory Card and either a CSC-MCI or CSC-ENVM controller and appropriate cables, system software images can be written to Flash memory for booting. The Flash Memory Card is available for the AGS+, AGS, MGS, and CGS chassis. Refer to the section "Storing and Booting System Software Using the Flash Memory Card" in the "Configuring the System" chapter of this manual for a description of the Flash commands. Refer to the Modular Products Hardware Installation and Reference publication for hardware installation instructions.
You can boot the system software from compressed images by entering the following command:
boot [filename.z] [server-address]The filename argument is the name of the compressed file. Many compressed files have a .Z suffixed to their names. However, older versions of Cisco ROMs cannot recognize uppercase letters. Therefore, you should rename any files whose names contain uppercase letters.
The server-address argument is the address of the server on which the compressed image file resides. If omitted, this defaults to the broadcast address.
Use the following EXEC command to halt and restart the network server:
reloadIf the system is set to restart on error, it reboots itself.
This section provides information about AutoInstall, a procedure that enables you to configure a new router automatically and dynamically. The AutoInstall procedure involves connecting a new router to a network on which there is an existing preconfigured router, turning on the new router, and having it immediately enabled with a configuration file that is automatically downloaded from the existing router.
The following sections provide the requirements for AutoInstall and present an overview of how the procedure works. To start the procedure, go to "Perform the AutoInstall Procedure" later in this chapter.
For the AutoInstall procedure to work, the following requirements must be met:
Once the requirements described in the preceding section are met, the dynamic configuration of the new router occurs in the following order:
The new router (newrouter) resolves its interface's IP addresses by one of the following means:
The existing router responds in one of the following ways depending upon the request type:
As soon as one interface resolves its IP address, the router will move on to resolve its hostname. Therefore, only one IP address needs to be set up using either SLARP or BootP/RARP.
The new router resolves its IP address-to-hostname mapping as illustrated in Figure 1-3. It first sends a TFTP broadcast requesting the file network-confg.
The network-confg file is a configuration file generally shared between several routers. In this case, it should be used to provide the mapping between IP addresses and host names, specifically for the IP address that newrouter has just obtained dynamically. The file network-confg must reside on a reachable TFTP server and must be globally readable.
In the following example of a network-confg file, newrouter's IP address is 131.108.10.2. This address was learned via SLARP and is based on existing's IP address of 131.108.10.1. The server's address is 131.108.20.5.
ip host newrouter 131.108.10.2
ip host existing 131.108.10.1 131.108.20.1
ip host server 131.108.20.5
If newrouter does not receive a network-confg file, or if the IP address-to-hostname mapping does not match the newly acquired IP address, then newrouter sends a domain name service (DNS) broadcast. If DNS is configured and has an entry mapping newrouter's SLARP or BootP/RARP-acquired IP address to its name, then newrouter will successfully resolve its name.
If DNS does not have an entry mapping newrouter's SLARP or BootP/RARP-acquired address to its name, the new router cannot resolve its hostname and will enter setup mode. Setup mode prompts for manual configuration of the router via the console. The new router will continue to issue broadcasts to attempt to learn its host name and obtain any unresolved interface addresses. The broadcast frequency will dwindle to every ten minutes after several attempts. Refer to the Router Products Getting Started Guide for details on the setup command.
After the router successfully resolves its host name, newrouter sends a TFTP broadcast requesting the file newrouter-confg.The file is downloaded to newrouter where the configuration commands take effect immediately. If newrouter still has not obtained the IP addresses of all its interfaces, and those addresses are not contained in the newrouter-confg file, then newrouter enters setup mode.
Otherwise, assuming the configuration file is complete, newrouter should be fully operational. Enter the enable command (with the system administrator password) at the system prompt on newrouter. Then issue the write memory command to save the information in the recently obtained configuration file into NVRAM. If a reload should occur, newrouter will simply load its configuration file from NVRAM.
The following sections describe the steps to perform the AutoInstall procedure.
To dynamically configure a new router using AutoInstall, complete the following tasks. Steps 1, 2, and 3 are completed by the central administrator. Step 4 is completed by the person at the remote site.
Step 1: Modify the existing router's configuration to support the AutoInstall procedure.
Step 2: Set up the TFTP server to support the AutoInstall procedure.
Step 3: Set up BootP or RARP server (required for AutoInstall via an Ethernet, Token Ring, or FDDI interface; not required for AutoInstall via an HDLC-encapsulated serial interface).
Step 4: Connect the new router to the network.
The interface used to set up AutoInstall can be either of the following types:
To set up AutoInstall via an Ethernet, Token Ring, or FDDI interface, complete the following tasks to configure the existing router:
In the following example, the existing router's configuration file contains the commands needed to configure the router for AutoInstall on an Ethernet interface:
router1#configure terminalrouter1(config)#interface Ethernet 0router1(config-if)#ip address 131.108.10.1 255.255.255.0router1(config-if)#ip helper-address 131.108.20.5[Ctrl-Z] router1#write memory
To set up AutoInstall via a serial line with HDLC encapsulation (the default), complete the following tasks to configure the existing router:
A DTE interface must be used on the new router because there is no default clock rate for a DCE interface.
In the following example, the existing router's configuration file contains the commands needed to configure the router for AutoInstall on a serial line:
router1#configure terminalrouter1(config)#interface serial 0router1(config)#ip address 131.108.10.1 255.255.255.0router1(config)#ip helper-address 131.108.20.5router1(config)#clockrate 200000[Ctrl-Z] router1#write memory
If the new router is connected to the existing router via an Ethernet, Token Ring, or FDDI interface, you must configure a BootP or RARP server to map the new router's MAC address to its IP address. If the new router is connected to the existing router via a serial line with HDLC encapsulation, the steps in this section are not required.
To configure a BootP or RARP server, complete the following tasks:
| Task | Command |
|---|---|
| Step 1 If BootP is to be used to resolve the new router's IP address, configure your BootP server. | Refer to the UNIX manual pages and to RFCs 951 and 1084 |
| Step 2 If RARP is to be used to resolve the new router's IP address, configure your RARP server. | Refer to the UNIX manual pages and to RFC 903 |
For AutoInstall to work correctly, the new router must be able to download a <name>-confg file from a TFTP server. It must also be able to resolve its hostname. The new router can resolve its hostname by using a network-confg file downloaded from a TFTP server, or by using the Domain Name System (DNS).
To set up a TFTP server to support AutoInstall, complete the following tasks. Steps 2 and 3 are different ways to resolve the new router's hostname. Perform step 2 if you want to use a network-confg file to resolve the new router's hostname. Perform step 3 if you want to use the DNS to resolve the new router's hostname.
| Task | Command |
|---|---|
| Step 1 Enable TFTP on a server. | Consult the UNIX manual pages and RFCs 906 and 783. |
| Step 2 If you want to use a network-confg file to resolve the new router's name, create the file network-confg containing an IP address-to-hostname mapping for the new router. The IP address must match the IP address that is to be dynamically obtained by the new router. | ip host hostname address |
| Step 3 If you want to use the DNS to resolve the new router's name, create an address-to-name mapping entry for the new router in the DNS database. The IP address must match the IP address that is to be dynamically obtained by the new router. | Contact the DNS administrator or refer to RFCs 1101 and 1183. |
| Step 4 Create the file <name>-confg. The <name> part of <name>-confg must match the hostname you assigned for the new router in the previous step. Enter into this file configuration commands for the new router. | See the appropriate chapter in this publication for specific commands. |
The <name>-confg file must contain IP addresses for all the new router's interfaces. You can use the write memory command to save an existing configuration file to the TFTP server, then modify the address and name, and rename the file to <name>-confg.
In the following example, the new router's configuration file, newrouter-confg, contains the minimum commands needed for AutoInstall:
int ethernet 0
ip address 131.108.10.2
int serial 0
no ip address
In the following example of a network-confg file, the new router's IP address, 131.108.10.2, is mapped to the hostname newrouter. The new router's address was learned via SLARP and is based on existing's IP address of 131.108.10.1. The server's address is 131.108.20.5.
ip host newrouter 131.108.10.2
ip host existing 131.108.10.1 131.108.20.1
ip host server 131.108.20.5
Connect the new router to the network via an HDLC-encapsulated serial interface, or an Ethernet, Token Ring, or FDDI interface. After the router successfully resolved its host name, newrouter sends a TFTP broadcast requesting the file <name>-confg.The file is then downloaded to the new router where the configuration commands will take effect immediately. Assuming a complete configuration file, the new router should now be fully operational.
| Task | Command |
|---|---|
| Step 1 Enter privileged mode at the system prompt on the new router. | enable password |
| Step 2 Save the information from the <name>-config file into NVRAM. | write memory |
| **before**Verify that the existing and new routers are connected before entering the write memory EXEC command saving these configuration changes. Use the ping EXEC command to verify connectivity. If an incorrect configuration file is downloaded, the new router will load NVRAM configuration information before being able to enter AutoInstall mode.@@before@@ | Caution **after**Verify that the existing and new routers are connected before entering the write memory EXEC command saving these configuration changes. Use the ping EXEC command to verify connectivity. If an incorrect configuration file is downloaded, the new router will load NVRAM configuration information before being able to enter AutoInstall mode.@@after@@ |
|
|