cc/td/doc/product/dsl_prod/ios_dsl/rel122
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

N Through shdsl Commands for Cisco DSLAMs with NI-2

neighbor activate

network (DHCP)

option

payload-scrambling

peer default ip address

ppp authentication

ppp chap hostname

protocol

radius-server attribute nas-port format

radius-server challenge-noecho

radius-server configure-nas

radius-server deadtime

radius-server directed-request

radius-server host

radius-server host non-standard

radius-server key

radius-server optional passwords

radius-server retransmit

radius-server timeout

radius-server vsa send

rbe nasip

rd

redundancy reload-peer

redundancy reload-shelf

redundancy switch-activity

request-dialin

route-target

scrambling

sdsl bitrate

secondary sync bootflash

secondary sync config

secondary sync flash

secondary sync running-config

service dhcp

set temperature-rating

shdsl annex

shdsl bitrate

shdsl margin

shdsl masktype

shdsl ratemode

shdsl set bitrate masktype annex


N Through shdsl Commands for Cisco DSLAMs with NI-2


This chapter documents commands that you use to configure Cisco DSLAMs with NI-2. Commands in this chapter are listed alphabetically. For information on how to configure DSL features, refer to the Configuration Guide for Cisco DSLAMs with NI-2.


Note Commands that are identical to those documented in the Cisco IOS Configuration Fundamentals Command Reference and the ATM and Layer 3 Switch Router Command Reference have been removed from this chapter.


This chapter discusses the following commands:

neighbor activate

network (DHCP)

option

payload-scrambling

peer default ip address

ppp authentication

ppp chap hostname

protocol

radius-server attribute nas-port format

radius-server challenge-noecho

radius-server configure-nas

radius-server deadtime

radius-server directed-request

radius-server host

radius-server host non-standard

radius-server key

radius-server optional passwords

radius-server retransmit

radius-server timeout

radius-server vsa send

rbe nasip

rd

redundancy reload-peer

redundancy reload-shelf

redundancy switch-activity

request-dialin

route-target

scrambling

sdsl bitrate

secondary sync bootflash

secondary sync config

secondary sync flash

secondary sync running-config

service dhcp

set temperature-rating

shdsl annex

shdsl bitrate

shdsl margin

shdsl masktype

shdsl ratemode

shdsl set bitrate masktype annex

neighbor activate

To enable the exchange of information with a BGP neighboring router, use the neighbor activate router configuration command. To disable the exchange of an address with a neighboring router, use the no form of this command.

neighbor {ip-address | peer-group-name} activate

no neighbor {ip-address | peer-group-name} activate

Syntax Description

ip-address

IP address of the neighboring router.

peer-group-name

Name of BGP peer group.


Defaults

The exchange of addresses with neighbors is enabled by default for the VPN IPv4 address family. You can disable IPv4 address exchange using the general command no default bgp ipv4 activate, or you can disable it for a particular neighbor using the no form of this command.

For all other address families, address exchange is disabled by default. You can explicitly activate the default command using the appropriate address family submode.

Command Modes

Router configuration

Command History

Release
Modification

12.1(4)DA

This command was introduced.


Usage Guidelines

Use this command to enable or disable the exchange of addresses with a neighboring router.

Examples

In the following example, a BGP router activates the exchange of a customer's IP address 10.15.0.15 to a neighboring router:

DSLAM(config)# router bgp 100 DSLAM(config-router)# neighbor 10.15.0.15 remote-as 100 DSLAM(config-router)# neighbor 10.15.0.15 update-source loopback0 DSLAM(config-router)# address-family vpnv4 unicast DSLAM(config-router-af)# neighbor 10.15.0.15 activate DSLAM(config-router-af)# exit-address-family

Related Commands

Command
Description

address-family

Enters the address-family submode.

exit-address-family

Exits the address-family submode.


network (DHCP)

To configure the subnet number and mask for a Dynamic Host Configuration Protocol (DHCP) address pool on a Cisco IOS DHCP server, use the network DHCP pool configuration command. Use the no form of this command to remove the subnet number and mask.

network network-number [mask | /prefix-length]

no network

Syntax Description

network-number

The IP address of the DHCP address pool.

mask

(Optional) The bit combination that determines which portion of the address of the DHCP address pool refers to the network or subnet and which part refers to the host.

/prefix-length

(Optional) Specifies the number of bits that make up the address prefix. The prefix is an alternative way to specify the network mask of the client. Precede the prefix length by a forward slash (/).


Defaults

No default behavior or values.

Command Modes

DHCP pool configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

This command is valid only for DHCP subnetwork address pools. If you do not specify the mask or prefix length, the software uses the class A, B, or C natural mask. The DHCP server acts as if all host addresses are available. The system administrator can exclude subsets of the address space by using the ip dhcp excluded-address command.

Examples

The following example configures 172.16.0.0/16 as the DHCP pool subnetwork number and mask:

DSLAM# configure terminal DSLAM(config)# ip dhcp pool 1 DSLAM(dhcp-config)# network 172.16.0.0 /16

Related Commands

Command
Description

host

Specifies the IP address and network mask for a manual binding to a DHCP client.

ip dhcp excluded-address

Specifies IP addresses that a Cisco IOS DHCP server should not assign to DHCP clients.

ip dhcp pool

Configures a DHCP address pool on a Cisco IOS DHCP server and enters DHCP pool configuration mode.


option

To configure Cisco IOS Dynamic Host Configuration Protocol (DHCP) server options, use the option DHCP pool configuration command. Use the no form of this command to remove the options.

option code [instance number] {ascii string | hex string | ip address}

no option code [instance number]

Syntax Description

code

Specifies the DHCP option code.

instance number

(Optional) Specifies a number from 0 to 255.

ascii string

Specifies an NVT ASCII character string. Delineate ASCII character strings that contain white space by quotation marks.

hex string

Specifies dotted-hexadecimal data. Each byte in hexadecimal character strings is two hexadecimal digits—separate each byte with a period, colon, or white space.

ip address

Specifies an IP address.


Defaults

The default instance number is 0.

Command Modes

DHCP pool configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

DHCP provides a framework for passing configuration information to hosts on a TCP/IP network. Configuration parameters and other control information are carried in tagged data items that you store in the options field of the DHCP message. The data items themselves are also called options. The current set of DHCP options is documented in RFC 2131, Dynamic Host Configuration Protocol.

Examples

The following example configures DHCP option 19, which specifies whether the client should configure its IP layer for packet forwarding. A value of 0 means disable IP forwarding; a value of 1 means enable IP forwarding. IP forwarding is enabled in the following example:

DSLAM# configure terminal DSLAM(config)# ip dhcp pool 1 DSLAM(dhcp-config)# option 19 hex 01

The following example configures DHCP option 72, which specifies the World Wide Web servers for DHCP clients. World Wide Web servers 172.16.3.252 and 172.16.3.253 are configured in the following example:

DSLAM# configure terminal DSLAM(config)# ip dhcp pool 1 DSLAM(dhcp-config)# option 72 ip 172.16.3.252 172.16.3.253

Related Commands

Command
Description

ip dhcp pool

Configures a DHCP address pool on a Cisco IOS DHCP server and enters DHCP pool configuration mode.


payload-scrambling

To enable ATM cell payload scrambling on a DSL subscriber port, use the payload-scrambling profile configuration command. To disable payload scrambling, use the no form of the command.

payload-scrambling

no payload-scrambling

Syntax Description

This command has no keywords or arguments.

Defaults

No default behavior or values.

Command Modes

Profile configuration

Command History

Release
Modification

12.1(1)DA

This command was introduced.


Usage Guidelines

The two ends of a connection must have the same payload scrambling value—that is, payload scrambling must be enabled at both ends or disabled at both ends. The line trains if you enable payload scrambling at one end and disable it at the other end, but all AAL5 frames will have cyclic redundancy checks.

If you enable or disable payload scrambling, the port does not untrain or retrain.

Examples

This command disables payload scrambling for the default DSL profile:

DSLAM# configure terminal DSLAM(config)# dsl-profile default DSLAM(cfg-dsl-profile)# no payload-scrambling

Related Commands

Command
Description

show dsl profile

Displays a specific DSL profile.

show dsl interface atm slot#/port#

Displays the DSL and ATM status for a port.


peer default ip address

Use the peer default ip address command to specify an IP address, an address from a specific IP address pool, or an address from the DHCP mechanism that is to be returned to a remote peer connecting to this interface. Use the no form of the command to disable a prior peer IP address pooling configuration on an interface.

peer default ip address {ip-address | dhcp | pool [poolname]}

no peer default ip address

Syntax Description

ip-address

Specific IP address to be assigned to a remote peer that dials in to the interface. To prevent an IP addresse from being assigned on more than one interface, you cannot apply this command argument to a dialer rotary group or to an ISDN interface.

dhcp

Retrieve an IP address from the DHCP server.

pool

Use the Global Default Mechanism as defined by the ip address-pool command unless the optional poolname argument is supplied.

poolname

(Optional) Name of a local address pool created using the ip local pool command. Retrieve an address from this pool regardless of the Global Default Mechanism setting.


Defaults

pool

Command Modes

Interface configuration

Usage Guidelines

This command applies to point-to-point interfaces that support the PPP or SLIP encapsulation.

This command allows an administrator to configure all possible address pooling mechanisms on a interface-by-interface basis.

The peer default ip address command can override the Global Default Mechanism defined by the ip address-pool command on an interface-by-interface basis.

For all interfaces that are not configured with a peer default IP address mechanism (equivalent to selecting the peer default ip address pool command), the router uses the Global Default Mechanism that is defined by the ip address-pool command.

If you select the peer default ip address pool poolname form of this command, the router uses the locally configured pool on this interface and does not follow the Global Default Mechanism.

If you select the peer default ip address ip-address form of this command, the specified IP address is assigned to any peer that connects to this interface and any Global Default Mechanism is overridden for this interface.

If you select the peer default ip address dhcp form of this command, the software uses the DHCP proxy-client mechanism by default on this interface and overrides any Global Default Mechanism for this interface.

Examples

The following command specifies that this interface will use a local IP address pool called pool1:

DSLAM(config)# interface virtual-template 1 DSLAM(config-if)# peer default ip address pool pool1

The following command specifies that this interface will use the IP address 172.140.34.21:

DSLAM(config-if)# peer default ip address dhcp

The following command reenables the Global Default Mechanism that this interface will use:

DSLAM(config-if)# peer default ip address pool

Related Commands

Command
Description

encapsulation

Sets the encapsulation method used by the interface.

ppp authentication

Enables Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) and enables an AAA authentication method on an interface.


ppp authentication

To enable Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) and to enable an AAA authentication method on an interface, use the ppp authentication interface configuration command. Use the no form of this command to disable this authentication.

ppp authentication {chap | pap} [if-needed] [list-name]

no ppp authentication


Caution If you use a list-name value that was not configured with the aaa authentication ppp command, you disable PPP on this interface.

Syntax Description

chap

Enables CHAP on a serial interface.

pap

Enables PAP on a serial interface.

if-needed

(Optional) Used with TACACS and extended TACACS. Does not perform CHAP or PAP authentication if the user has already provided authentication. This option is available only on asynchronous interfaces.

list-name

(Optional) Used with AAA. Specifies the name of a list of AAA methods of authentication to use. If you do not specify a listname, the system uses the default. You create lists and defaults with the aaa authentication ppp command.


Defaults

PPP authentication is not enabled.

Command Modes

Interface configuration

Command History

Command
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

When you enable CHAP or PAP, the local router requires a password from remote devices. If the remote device does not support CHAP or PAP, no traffic is passed to that device.

If you use autoselect on a TTY line, you will probably want to use the ppp authentication command to turn on PPP authentication for the corresponding interface.

If you specify the if-needed option, the software does not require PPP authentication when you have already provided authentication. This option is useful if you specify the autoselect command, but you cannot use it with AAA.

You can use the list-name argument only when AAA is initialized; you cannot use it with the if-needed argument.

Examples

The following example enables CHAP on asynchronous interface 1, and uses the authentication list MIS-access:

DSLAM(config)# interface async 1 DSLAM(config-if)# encapsulation ppp DSLAM(config-if)# ppp authentication chap MIS-access

Related Commands

Command
Description

aaa authentication ppp

Specifies one or more AAA authentication methods for use on serial interfaces running PPP.

aaa new-model

Enables the AAA access control model.

encapsulation ppp

Sets the encapsulation method that the interface uses.


ppp chap hostname

To create a pool of dialup routers that all appear to be the same host when you are authenticating with CHAP, use the ppp chap hostname interface configuration command. To disable this function, use the no form of the command.

ppp chap hostname hostname

no ppp chap hostname hostname

Syntax Description

hostname

The name sent in the CHAP challenge.


Defaults

Disabled. The router name is sent in any CHAP challenges.

Command Modes

Interface configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

Currently, a router that dials a pool of access routers requires a username entry for each possible router in the pool because each router challenges with its hostname. If you add a router to the dialup rotary pool, you must update all connecting routers. The ppp chap hostname command allows you to specify a common alias for all routers in a rotary group so that you must configure only one username on the dialing routers.

You normally use this command with local CHAP authentication (when the router authenticates to the peer), but you can also use it for remote CHAP authentication.

Examples

The commands in the following example identify dialer interface 0 as the dialer rotary group leader and specify PPP as the encapsulation method that all member interfaces use. This example uses CHAP authentication on received calls only and sends the username ISPCorp in all CHAP challenges and responses:

DSLAM(config-if)# interface dialer 0 DSLAM(config-if)# encapsulation ppp DSLAM(config-if)# ppp authentication chap callin DSLAM(config-if)# ppp chap hostname ISPCorp

Related Commands

Command
Description

aaa authentication ppp

Specifies one or more AAA authentication methods for use on ATM and DSL interfaces running PPP.

ppp authentication

Enables Challenge Handshake Authentication Protocol (CHAP) or Password Authentication Protocol (PAP) and enables an AAA authentication method on an interface.


protocol

To specify the tunneling protocol the dial-in connection uses, use the protocol accept-dialin VPDN group configuration command. Use the no form of this command to remove the options.

protocol {any | l2f | l2tp | pppoe | pptp}

Syntax Description

any

Use any protocol.

l2f

Use L2F.

l2tp

Use L2TP.

pppoe

Use PPPoE.

pptp

Use PPTP.


Defaults

If you use this command under the VPDN-group, the default protocol is l2f. Otherwise, there is no default.

Command Modes

accept-dialin VPDN group configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Examples

The following example requests an L2TP dial-in tunnel to a local host named lac1 at IP address 123.45.67.891 for a user in the domain named partner.com:

DSLAM(config)# vpdn enable DSLAM(config)# vpdn-group l2tp-group DSLAM(config-vpdn)# protocol l2tp DSLAM(config-vpdn)# domain partner.com DSLAM(config-vpdn)# initiate-to ip 123.45.67.891 DSLAM(config-vpdn)# local name lac1 DSLAM(config-vpdn)# source-ip 123.45.67.891

Related Commands

None.

radius-server attribute nas-port format

To select the NAS-Port format used for RADIUS accounting features, use the radius-server attribute nas-port format global configuration command. To restore the default NAS-Port format, use the no form of this command.

radius-server attribute nas-port format format

no radius-server attribute nas-port format format

Syntax Description

format

NAS-Port format. Possible values for the format argument are as follows:

a—Standard NAS-Port format

b—Extended NAS-Port format

c—Shelf-slot NAS-Port format

d—PPP extended NAS-Port format

e—DSLAM extended NAS-Port format


Defaults

Standard NAS-Port format

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

The radius-server attribute nas-port format command configures RADIUS to change the size and format of the NAS-Port attribute field (RADIUS IETF attribute 5).

The following NAS-Port formats are supported:

Standard NAS-Port format—This 16-bit NAS-Port format indicates the type, port, and channel of the controlling interface. This is the default format used by Cisco IOS software.

Extended NAS-Port format—The standard NAS-Port attribute field is expanded to 32 bits. The upper 16 bits of the NAS-Port attribute display the type and number of the controlling interface; the lower 16 bits indicate the interface that is undergoing authentication.

Shelf-slot NAS-Port format—This 16-bit NAS-Port format supports expanded hardware models that require shelf and slot entries.

PPP extended NAS-Port format—This NAS-Port format uses 32 bits to indicate the interface, VPI, and VCI for PPP over ATM and PPPoE over ATM, and the interface and VLAN ID for PPPoE over IEEE 802.1Q VLANs.

In the following example, a RADIUS server is identified, and the NAS-Port field is set to the PPP extended format:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server host 172.31.5.96 auth-port 1645 acct-port 1646 DSLAM(config)# radius-server attribute nas-port format d

Related Commands

None.

radius-server challenge-noecho

To prevent the display of user responses to Access-Challenge packets, use the radius-server challenge-noecho global configuration command. To return to the default condition, use the no form of this command.

radius-server challenge-noecho

no radius-server challenge-noecho

Syntax Description

This command has no arguments or keywords.

Defaults

All user responses to Access-Challenge packets are echoed to the screen.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

This command applies to all users. When you configure the radius-server challenge-noecho command, user responses to Access-Challenge packets do not display unless the Prompt attribute in the user profile is set to echo on the RADIUS server. The Prompt attribute in a user profile overrides the radius-server challenge-noecho command for the individual user. For more information, see the chapter "Configuring RADIUS" in the Cisco IOS Security Configuration Guide, Release 12.2.

Examples

The command in the following example stops all user responses from displaying on the screen:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server challenge-noecho

Related Commands

None.

radius-server configure-nas

To have the Cisco router or access server query the vendor-proprietary RADIUS server for the static routes and IP pool definitions used throughout its domain when the device starts up, use the radius-server configure-nas command in global configuration mode. To discontinue the query of the RADIUS server, use the no form of this command.

radius-server configure-nas

no radius-server configure-nas

Syntax Description

This command has no arguments or keywords.

Defaults

No default behavior or values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

Use the radius-server configure-nas command to have the Cisco router query the vendor-proprietary RADIUS server for static routes and IP pool definitions when the router first starts up. Some vendor-proprietary implementations of RADIUS let the user define static routes and IP pool definitions on the RADIUS server instead of on each individual network access server in the network. As each network access server starts up, it queries the RADIUS server for static route and IP pool information. This command enables the Cisco router to obtain static routes and IP pool definition information from the RADIUS server.


Note Because the radius-server configure-nas command is performed when the Cisco router starts up, it does not take effect until you issue the copy system:running-config nvram:startup-config command.


Examples

The following example shows how to tell the Cisco router or access server to query the vendor-proprietary RADIUS server for already-defined static routes and IP pool definitions when the device first starts up:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server configure-nas

Related Commands

Command
Description

radius-server host non-standard

Indicates that the security server is using a vendor-proprietary implementation of RADIUS.


radius-server deadtime

To improve RADIUS response times when some servers might be unavailable, use the radius-server deadtime command in global configuration mode to cause the unavailable servers to be skipped immediately. To set dead time to 0, use the no form of this command.

radius-server deadtime minutes

no radius-server deadtime

Syntax Description

minutes

Length of time, in minutes, for which transaction requests skip over a RADIUS server, up to a maximum of 1440 minutes (24 hours).


Defaults

Dead time is set to 0.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

Use this command to cause the Cisco IOS software to mark as "dead" any RADIUS servers that fail to respond to authentication requests. This enables you to avoid the wait for the request to time out before the next configured server is tried. A RADIUS server marked as "dead" is skipped by additional requests for the duration of minutes or unless all servers are marked "dead."

Examples

The following example specifies 5 minutes dead time for RADIUS servers that fail to respond to authentication requests:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server deadtime 5

Related Commands

Command
Description

radius-server host

Specifies a RADIUS server host.

radius-server retransmit

Specifies the number of times the Cisco IOS software searches the list of RADIUS server hosts before giving up.

radius-server timeout

Sets the interval for which a router waits for a server host to reply.


radius-server directed-request

To allow users who are logging into a Cisco network access server (NAS) to select a RADIUS server for authentication, use the radius-server directed-request global configuration command. To disable the directed-request feature, use the no form of this command.

radius-server directed-request [restricted]

no radius-server directed-request [restricted]

Syntax Description

restricted

(Optional) Prevents the user from being sent to a secondary server if the specified server is unavailable.


Defaults

User cannot log into a Cisco NAS to select a RADIUS server for authentication.

Command Modes

Global configuration mode

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

The radius-server directed-request command sends only the portion of the username before the "@" symbol to the host specified after the "@" symbol. In other words, with this command enabled, you can direct a request to any of the configured servers, and only the username is sent to the specified server.

If you disable the radius-server directed-request command, the whole string, both before and after the "@" symbol, is sent to the default RADIUS server. The router queries the list of servers, starting with the first one in the list. The router sends the whole string and accepts the first response that it gets from the server.

Use the radius-server directed-request restricted command to limit the user to the RADIUS server that is identified as part of the username.

The no radius-server directed-request command causes the entire username string to be passed to the default RADIUS server.

Examples

DSLAM(config)# aaa new-model DSLAM(config)# aaa authentication login default radius DSLAM(config)# radius-server host 192.168.1.1 DSLAM(config)# radius-server host 172.16.56.103 DSLAM(config)# radius-server host 172.31.40.1 DSLAM(config)# radius-server directed-request

Related Commands

None.

radius-server host

To specify a RADIUS server host, use the radius-server host command in global configuration mode. To delete the specified RADIUS host, use the no form of this command.

radius-server host {hostname | ip-address} [auth-port port-number] [acct-port port-number] [timeout seconds] [retransmit retries] [key string] [alias{hostname | ip-address}]

no radius-server host {hostname | ip-address}

Syntax Description

hostname

Domain Name System (DNS) name of the RADIUS server host.

ip-address

IP address of the RADIUS server host.

auth-port

(Optional) Specifies the User Datagram Protocol (UDP) destination port for authentication requests.

port-number

(Optional) Port number for authentication requests; the host is not used for authentication if set to 0. If unspecified, the port number defaults to 1645.

acct-port

(Optional) Specifies the UDP destination port for accounting requests.

port-number

(Optional) Port number for accounting requests; the host is not used for accounting if set to 0. If unspecified, the port number defaults to 1646.

timeout

(Optional) The time interval (in seconds) that the router waits for the RADIUS server to reply before retransmitting. This setting overrides the global value of the radius-server timeout command. If no timeout value is specified, the global value is used. Enter a value in the range 1 to 1000.

seconds

(Optional) Specifies the timeout value. Enter a value in the range 1 to 1000. If you do not specify a timeout value, the global value is used.

retransmit

(Optional) The number of times a RADIUS request is re-sent to a server, if that server is not responding or responding slowly. This setting overrides the global setting of the radius-server retransmit command.

retries

(Optional) Specifies the retransmit value. Enter a value in the range 1 to 100. If you do not specify a retransmit value, the global value is used.

key

(Optional) Specifies the authentication and encryption key used between the router and the RADIUS daemon running on this RADIUS server. This key overrides the global setting of the radius-server key command. If you do not specify a key string, the global value is used.

The key is a text string that must match the encryption key that the RADIUS server uses. Always configure the key as the last item in the radius-server host command syntax. This syntax is necessary because the leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in the key, do not enclose the key in quotation marks unless the quotation marks themselves are part of the key.

string

(Optional) Specifies the authentication and encryption key for all RADIUS communications between the router and the RADIUS server. This key must match the encryption used on the RADIUS daemon. All leading spaces are ignored, but spaces within and at the end of the key are used. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks themselves are part of the key.

alias

(Optional) Allows up to eight aliases per line for any given RADIUS server.


Defaults

No RADIUS host is specified; use global radius-server command values.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

You can use multiple radius-server host commands to specify multiple hosts. The software searches for hosts in the order in which you specify them.

If no host-specific timeout, retransmit, or key values are specified, the global values apply to each host.

Examples

The following example specifies host1 as the RADIUS server and uses default ports for both accounting and authentication:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server host host1

The following example specifies port 1612 as the destination port for authentication requests and port 1616 as the destination port for accounting requests on the RADIUS host named host1:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server host host1 auth-port 1612 acct-port 1616

Because entering a line resets all the port numbers, you must specify a host and configure accounting and authentication ports on a single line.

The following example specifies the host with IP address 172.29.39.46 as the RADIUS server, uses ports 1612 and 1616 as the authorization and accounting ports, sets the timeout value to 6, sets the retransmit value to 5, and sets "rad123" as the encryption key, matching the key on the RADIUS server:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server host 172.29.39.46 auth-port 1612 acct-port 1616 timeout 6 DSLAM(config)# retransmit 5 key rad123

To use separate servers for accounting and authentication, use the zero port value as appropriate.

The following example specifies that RADIUS server host1 be used for accounting but not for authentication, and that RADIUS server host2 be used for authentication but not for accounting:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server host host1.example.com auth-port 0 DSLAM(config)# radius-server host host2.example.com acct-port 0

The following example specifies four aliases on the RADIUS server with IP address 172.1.1.1:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server host 172.1.1.1 acct-port 1645 auth-port 1646 DSLAM(config)# radius-server host 172.1.1.1 alias 172.16.2.1 172.17.3.1 172.16.4.1

Related Commands

Command
Description

aaa authentication ppp

Specifies one or more AAA authentication methods for use on serial interfaces running PPP.

aaa authorization

Sets parameters that restrict network access to a user.

ppp authentication

Enables CHAP or PAP or both and specifies the order in which CHAP and PAP authentications are selected on the interface.

radius-server key

Sets the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon.

radius-server retransmit

Specifies how many times the Cisco IOS software searches the list of RADIUS server hosts before it gives up.

radius-server timeout

Sets the interval that a router waits for a server host to reply.


radius-server host non-standard

To identify that the security server is using a vendor-proprietary implementation of RADIUS, use the radius-server host non-standard command in global configuration mode. This command tells the Cisco IOS software to support nonstandard RADIUS attributes. To delete the specified vendor-proprietary RADIUS host, use the no form of this command.

radius-server host {hostname | ip-address} non-standard

no radius-server host {hostname | ip-address} non-standard

Syntax Description

hostname

DNS name of the RADIUS server host.

ip-address

IP address of the RADIUS server host.


Defaults

No RADIUS host is specified.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

The radius-server host non-standard command enables you to indicate that the RADIUS server is using a vendor-proprietary implementation of RADIUS. Although an IETF draft standard for RADIUS specifies a method for communicating information between the network access server and the RADIUS server, some vendors have extended the RADIUS attribute set in a unique way. This command enables the Cisco IOS software to support the most common vendor-proprietary RADIUS attributes. Vendor-proprietary attributes are not supported unless you use the radius-server host non-standard command.

For a list of supported vendor-specific RADIUS attributes, refer to the appendix "RADIUS Attributes" in the Cisco IOS Security Configuration Guide.

Examples

The following example specifies a vendor-proprietary RADIUS server host named alcatraz:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server host alcatraz non-standard

Related Commands

Command
Description

radius-server configure-nas

Allows the Cisco router or access server to query the vendor-proprietary RADIUS server for the static routes and IP pool definitions it uses throughout its domain when the device starts up.

radius-server host

Specifies a RADIUS server host.


radius-server key

To set the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon, use the radius-server key command in global configuration mode. To disable the key, use the no form of this command.

radius-server key {0 string | 7 string | string}

no radius-server key

Syntax Description

0

string

Specifies that an unencrypted key will follow.

The unencrypted (cleartext) shared key.

7

string

Specifies that a hidden key will follow.

The hidden shared key.

string

The unencrypted (cleartext) shared key.


Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

After enabling authentication, authorization, and accounting (AAA) authentication with the aaa new-model command, you must set the authentication and encryption key using the radius-server key command.


Note Specify a RADIUS key after you issue the aaa new-model command.


The key that you enter must match the key that the RADIUS daemon uses. The software ignores all leading spaces, but it uses spaces within and at the end of the key. If you use spaces in your key, do not enclose the key in quotation marks unless the quotation marks themselves are part of the key.

Examples

The following example sets the authentication and encryption key to "dare to go":

DSLAM(config)# aaa new-model DSLAM(config)# radius-server key dare to go

The following example sets the authentication and encryption key to "anykey." The 7 specifies that a hidden key will follow.

DSLAM(config)# aaa new-model DSLAM(config)# service password-encryption DSLAM(config)# radius-server key 7 anykey

After you save your configuration and use the show-running config command, an encrypted key displays as follows:

DSLAM> show running-config ! ! radius-server key 7 19283103834782sda !The leading 7 indicates that the following text is encrypted.

Related Commands

Command
Description

aaa authentication ppp

Specifies one or more AAA authentication methods for use on serial interfaces running PPP.

aaa authorization

Sets parameters that restrict user access to a network.

ppp authentication

Enables CHAP or PAP or both and specifies the authentication method for CHAP and PAP authentication on the interface.

radius-server host

Specifies a RADIUS server host.


radius-server optional passwords

To specify that the first RADIUS request to a RADIUS server be made without password verification, use the radius-server optional-passwords command in global configuration mode. To restore the default, use the no form of this command.

radius-server optional-passwords

no radius-server optional-passwords

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

When the user enters the login name, the login request transmits with the name and a zero-length password. If accepted, the login procedure completes. If the RADIUS server refuses this request, the server software prompts for a password and tries again when the user supplies a password. The RADIUS server must support authentication for users without passwords to make use of this feature.

Examples

The following example configures the first login so that it does not require RADIUS verification:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server optional-passwords

Related Commands

None.

radius-server retransmit

To specify the number of times the Cisco IOS software searches the list of RADIUS server hosts before it gives up, use the radius-server retransmit command in global configuration mode. To disable retransmission, use the no form of this command.

radius-server retransmit retries

no radius-server retransmit

Syntax Description

retries

Maximum number of retransmission attempts. The default is 3 attempts.


Defaults

3 attempts

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

The Cisco IOS software tries all servers, allowing each one to time out before it increases the retransmit count.

Examples

The following example specifies a retransmit counter value of five times:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server retransmit 5

Related Commands

None.

radius-server timeout

To set the interval for which a router waits for a server host to reply, use the radius-server timeout command in global configuration mode. To restore the default, use the no form of this command.

radius-server timeout seconds

no radius-server timeout

Syntax Description

seconds

Number that specifies the timeout interval, in seconds. The default is 5 seconds.


Defaults

5 seconds

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

Use this command to set the number of seconds a router waits for a server host to reply before timing out.

Examples

The following example changes the interval timer to 10 seconds:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server timeout 10

Related Commands

Command
Description

radius-server host

Specifies a RADIUS server host.

radius-server key

Sets the authentication and encryption key for all RADIUS communications between the router and the RADIUS daemon.


radius-server vsa send

To configure the network access server to recognize and use vendor-specific attributes, use the radius-server vsa send command in global configuration mode. To restore the default, use the no form of this command.

radius-server vsa send [accounting | authentication]

no radius-server vsa send [accounting | authentication]

Syntax Description

accounting

(Optional) Limits the set of recognized vendor-specific attributes to only accounting attributes.

authentication

(Optional) Limits the set of recognized vendor-specific attributes to only authentication attributes.


Defaults

Disabled

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

The Internet Engineering Task Force (IETF) draft standard specifies a method for communicating vendor-specific information between the network access server and the RADIUS server by using the vendor-specific attribute (attribute 26). Vendor-specific attributes (VSAs) allow vendors to support their own extended attributes that are unsuitable for general use. The radius-server vsa send command enables the network access server to recognize and use both accounting and authentication vendor-specific attributes. Use the accounting keyword with the radius-server vsa send command to limit the set of recognized vendor-specific attributes to only accounting attributes. Use the authentication keyword with the radius-server vsa send command to limit the set of recognized vendor-specific attributes to only authentication attributes.

The Cisco RADIUS implementation supports one vendor-specific option using the format recommended in the specification. The Cisco vendor-ID is 9, and the supported option has vendor-type 1, which is named "cisco-avpair." The value is a string with the following format:

protocol : attribute sep value *

"Protocol" is a value of the Cisco "protocol" attribute for a particular type of authorization. "Attribute" and "value" are an appropriate attribute-value (AV) pair defined in the Cisco TACACS+ specification, and "sep" is "=" for mandatory attributes and "*" for optional attributes. This syntax allows the full set of features available for TACACS+ authorization to also be used for RADIUS.

For example, the following AV pair causes the Cisco "multiple named ip address pools" feature to be activated during IP authorization (during the PPP IPCP address assignment):

cisco-avpair= "ip:addr-pool=first"

The following example causes a "NAS Prompt" user to have immediate access to EXEC commands:

cisco-avpair= "shell:priv-lvl=15"

Other vendors have their own unique vendor-IDs, options, and associated VSAs. For more information about vendor-IDs and VSAs, refer to RFC 2138, Remote Authentication Dial-In User Service (RADIUS).

Examples

The following example configures the network access server to recognize and use vendor-specific accounting attributes:

DSLAM(config)# aaa new-model DSLAM(config)# radius-server vsa send accounting

Related Commands

Command
Description

radius-server attribute nas-port format

Selects the NAS-Port format used for RADIUS accounting features.


rbe nasip

To configure DHCP relay agent information option (option 82) support for ATM routed bridge encapsulation (RBE), use the rbe nasip command in global configuration mode. To remove this specification, use the no form of this command.

rbe nasip source_interface

no rbe nasip source_interface

Syntax Description

source_interface

The type and number of one of the interfaces on the router. The system forwards the IP address for this interface in the agent remote ID suboption, and the DHCP server uses the IP address to uniquely identify the DHCP relay agent.


Defaults

No IP address is specified.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

Use the rbe nasip command to configure DHCP relay agent information option (option 82) support for ATM routed bridge encapsulation (RBE).

You must configure DHCP relay agent information option support on the DHCP relay agent through the use of the ip dhcp relay information option command in order for the rbe nasip command to be effective.

Examples

In the following example, DHCP option 82 support is enabled on the DHCP relay agent with the ip dhcp relay agent information option command. The rbe nasip command configures the router to forward the IP address for Loopback0 to the DHCP server. ATM routed bridge encapsulation is configured on ATM subinterface 4/0.1.

DSLAM(config)# ip dhcp-server 10.0.0.202 ! DSLAM(config)# ip dhcp relay agent information option ! DSLAM(config)# interface Loopback0 DSLAM(config-if)# ip address 18.52.86.120 255.255.255.255 ! DSLAM(config-if)# interface ATM4/0 DSLAM(config-if)# no ip address ! DSLAM(config-if)# interface ATM4/0.1 point-to-point DSLAM(config-if)# ip unnumbered Loopback0 DSLAM(config-if)# ip helper-address 170.16.1.2 DSLAM(config-if)# atm route-bridged ip DSLAM(config-if)# pvc 88/800 DSLAM(config-if)# encapsulation aal5snap ! DSLAM(config-if)# router eigrp 100 DSLAM(config-if)# network 11.0.0.0 DSLAM(config-if)# network 170.16.0.0 ! DSLAM(config-if)# rbe nasip loopback0

Related Commands

Command
Description

ip dhcp relay information option

Enables the system to insert the DHCP relay agent information option in forwarded BOOT REQUEST messages to a Cisco IOS DHCP server.


rd

To create routing and forwarding tables for a VRF, use the rd VRF submode command.

rd route-distinguisher

Syntax Description

route-distinguisher

Add an 8-byte value to an IPv4 prefix to create a VPN IPv4 prefix.


Defaults

There is no default. You must configure a route distinguisher for a VRF to be functional.

Command Modes

VRF submode

Command History

Release
Modification

12.1(4)DA

This command was introduced.


Usage Guidelines

A route-distinguisher creates routing and forwarding tables and specifies the default route-distinguisher for a VPN. The software adds the route distinguisher to the beginning of the IPv4 prefixes to make the VPN-IPv4 prefixes globally unique.

A route distinguisher is either ASN-relative, in which case it is composed of an autonomous system number and an arbitrary number, or it is IP-address-relative, in which case it is composed of an IP address and an arbitrary number.

You can enter a route distinguisher in either of these formats:

16-bit AS number: your 32-bit number
For example, 101:3

32-bit IP address: your 16-bit number
For example, 192.168.122.15:1

Examples

The following example shows how to configure a default route distinguisher for two VRFs. The example illustrates the use of both AS-relative and IP address-relative route distinguishers:

DSLAM(config)# ip vrf vrf_blue DSLAM(config-vrf)# rd 100:3 DSLAM(config-vrf)# ip vrf vrf_red DSLAM(config-vrf)# rd 173.13.0.12:200

Related Commands

Command
Description

ip vrf

Enters VRF configuration mode.

show ip vrf

Displays information about a VRF.


redundancy reload-peer

To reload the standby NI-2 card, use the redundancy reload-peer privileged EXEC command.

redundancy reload-peer

Syntax Description

This command has no argument or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(7)DA

This command was introduced.


Usage Guidelines

This command reloads the standby NI-2 card in slot 11.

Examples

The following example reloads the standby NI-2 card:

DSLAM> enable DSLAM# redundancy reload-peer

Related Commands

Command
Description

redundancy reload-shelf

Reload all cards in the chassis.

redundancy switch-activity

Switch over manually from the active NI-2 card to the standby NI-2 card.

show redundancy states

Display the state of the primary and secondary NI-2s, and identify which NI-2 is active.


redundancy reload-shelf

To reload all cards in the chassis, including the NI-2 cards, use the redundancy reload-shelf privileged EXEC command.

redundancy reload-shelf

Syntax Description

This command has no argument or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(7)DA

This command was introduced.


Usage Guidelines

This command reloads all the cards in the chassis. This command also prompts you for confirmation to save the running configuration if it has changed. If you enter "yes," the system saves the running configuration and then reloads all the cards in the chassis. If you enter "no," the system directly reloads all the cards in the chassis.

Examples

The command in the following example reloads all cards in the chassis:

DSLAM> enable DSLAM# redundancy reload-shelf System configuration has been modified. Save? [yes/no]: no Reload the entire shelf [confirm] y

Related Commands

Command
Description

redundancy reload-peer

Reload the standby NI-2 card.

redundancy switch-activity

Switch over manually from the active NI-2 card to the standby NI-2 card.

show redundancy states

Display the state of the primary and secondary NI-2s, and identify which NI-2 is active.


redundancy switch-activity

To switch over manually from the active NI-2 card to the standby NI-2 card, use the redundancy switch-activity privileged EXEC command.

redundancy switch-activity

Syntax Description

This command has no argument or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(7)DA

This command was introduced.


Usage Guidelines

This command causes a manual switchover of activity to occur. This command also asks you for confirmation to save the running configuration if it has changed. If you enter "yes," the system saves the running command and then reloads all the cards in the chassis. If you enter "no," the system directly reloads all the cards in the chassis.

Examples

The command in the following example causes a manual switchover from the active NI-2 card to the standby NI-2 card:

DSLAM> enable DSLAM# redundancy switch-activity System configuration has been modified. Save? [yes/no]: no This will reload the active unit and force a switch of activity. [confirm] y

Related Commands

Command
Description

redundancy reload-peer

Reload the standby NI-2 card.

redundancy reload-shelf

Reload all cards.

show redundancy states

Display the state of the primary and secondary NI-2s, and identify which NI-2 is active.


request-dialin

To configure an L2TP access concentrator (LAC) to request L2F or L2TP tunnels to an LNS and create a request-dialin VPDN subgroup, use the request-dialin VPDN group command. To remove the request-dialin subgroup from a VPDN group, use the no form of this command.

request-dialin

no request-dialin

Syntax Description

This command has no keywords nor arguments.

Defaults

Disabled

Command Modes

VPDN group mode

Command History

Release
Modification

12.2(1b) DA

This command was introduced.


Usage Guidelines

For a VPDN group to request dial-in calls, you must also configure the following commands:

initiate-to VPDN group command

protocol VPDN subgroup command

At least one dialed number identification service (DNIS) or domain request-dialin command

After you establish an L2TP tunnel, both dial-in and dial-out calls can use the same tunnel.


Note You must configure the vpdn-group command with the accept-dialin command or the request-dialin command to enable VPDN. The request-dialin command initiates a dial-in tunnel. The acceptor, in turn, accepts a request for a dial-in tunnel.


Examples

The following example requests an L2TP dial-in tunnel to a remote peer at IP address 172.17.33.125 for a user in the domain named partner.com:

DSLAM(config)# vpdn-group 1 DSLAM(config-vpdn)# request-dialin DSLAM(config-vpdn-req-in)# protocol l2tp DSLAM(config-vpdn-req-in)# domain partner.com DSLAM(config-vpdn-req-in)# initiate-to ip 172.17.33.125

Related Commands

Command
Description

accept-dialin

Accepts requests to create either L2F or L2TP tunnels for dial-in.

domain-name

Specifies the domain name for a DHCP client.

initiate-to

Specifies the IP address to which calls are tunneled.

multilink

Limits sessions that are authorized for all multilink users.

protocol

Specifies the tunneling protocol that is used for the dial-in connections.


route-target

To create a route-target extended community for a VRF, use the route-target VRF submode command. To disable the configuration of a route-target community option, use the no form of this command.

route-target {import | export | both} route-target-ext-community

no route-target {import | export | both} route-target-ext-community

Syntax Description

import

Import routing information from the target VPN extended community.

export

Export routing information to the target VPN extended community.

both

Import routing information from and export routing information to the target VPN extended community.

route-target-ext-community

Add the route-target extended community attributes to the VRF list of import, export, or both (import and export) route-target extended communities.


Defaults

There are no defaults. A VRF is not associated with any route-target extended community attributes until you specify the VRF using the route-target command.

Command Modes

VRF submode

Command History

Release
Modification

12.1(4)DA

This command was introduced.


Usage Guidelines

The route-target command creates lists of import and export route target extended communities for the specified VRF. Execute the command one time for each target community. All VRFs that are configured with that extended community as an import route target contain learned routes that carry a specific route-target extended community. Learned routes from a VRF site (for example, by BGP, RIP, or static route configuration) contain export route targets for extended communities that are configured for the VRF added as route attributes to control the VRFs into which the route is imported.

The route-target specifies a target VPN extended community. Like a route-distinguisher, an extended community is composed of either an autonomous system number and an arbitrary number, or an IP address and an arbitrary number. You can enter the numbers in either of these formats:

16-bit AS number: your 32-bit number
For example, 101:3

32-bit IP address: your 16-bit number
For example, 192.168.122.15:1

Examples

The following example shows how to configure route-target extended community attributes for a VRF:

DSLAM(config)# ip vrf vrf_blue DSLAM(config-vrf)# route-target both 1000:1 DSLAM(config-vrf)# route-target export 1000:2 DSLAM(config-vrf)# route-target import 173.27.0.130:200


Note The result of the command sequence is that VRF vrf_blue has two export extended communities (1000:1 and 1000:2) and two import extended communities (1000:1 and 173.27.0.130:200).


Related Commands

Command
Description

ip vrf

Enters VRF configuration mode.

import map

Configures an import route map for the VRF.


scrambling

To configure scrambling on an interface, use the scrambling interface configuration command. To restore the default value, use the no form of this command.

scrambling [cell-payload | sts-stream] [protection | working | <cr>]

no scrambling

Syntax Description

cell-payload

The 48-byte portion of an ATM cell carrying user data.

sts-stream

The portion of the Synchronous Transport Signal (STS) frame that carries user data (OC-3 only).

protection

The fiber that is connected to the NI-2 card in slot 11.

working

The fiber that is connected to the NI-2 card in slot 10.

<cr>

Both protection and working fibers.


Defaults

No default behavior or values.

Command Modes

Interface configuration

Command History

Release
Modification

12.1(4)DA

This command was introduced.

12.1(7)DA

The keywords protection and working were added.


Usage Guidelines

The scrambling type must match on both sides of a link. Use the scrambling command only on trunk or subtend interfaces.

Examples

The following example uses the scrambling command to enable scrambling on the specified interface:

DSLAM> enable DSLAM# configure terminal DSLAM(config)# interface atm 0/1 DSLAM(config-if)# scrambling cell-payload protection

Note The scrambling sts-stream and scrambling cell-payload commands execute only on STS network interfaces such as OC-3.


Related Commands

Command
Description

payload scrambling

Enables ATM cell payload scrambling on a subscriber port.

show controllers

Displays information on working and protection fibers.


sdsl bitrate

To set the maximum and minimum allowed bit rates for the STU-C profile parameters, use the sdsl bitrate command.

sdsl bitrate bitrate

Syntax Description

bitrate

The STU-C upstream and downstream bit rates are identical. The loop characteristics determine the achievable rate. See the allowed ranges and default values in Usage Guidelines below.


Defaults

The default setting specifies a line rate of 784 kbps.

Command Modes

Profile configuration

Command History

Release
Modification

12.1(1)DA

This command was introduced.


Usage Guidelines

SDSL cards train only at the selected bit rate. If a CPE fails to train, a lower bit rate might be required.

The following allowable STU-C bit rate ranges occur in kilobits per second:

1168

1040

784

528

400

272

144


Caution This command causes the port to retrain when you change the bit rate parameter.

If you set a parameter to its current value, the port does not retrain. If a port is training when you change the parameter, the port untrains and retrains to the new parameter.

Examples

In this example, the command sets the bit rate of the default profile to 528 kbps downstream and upstream:

DSLAM# configure terminal DSLAM(config)# dsl-profile default DSLAM(cfg-dsl-profile)# sdsl bitrate 528

Related Commands

Command
Description

show dsl interface atm slot#/port#

Displays DSL and ATM status for a port.


secondary sync bootflash

To manually synchronize the bootflash files between the active and the standby NI-2, use the secondary sync bootflash privileged EXEC command.

secondary sync bootflash

Syntax Description

This command has no argument or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(7)DA

This command was introduced.


Usage Guidelines

Use this command to manually synchronize the bootflash files between the active and the standby NI-2. The auto-sync command performs this task automatically.

Examples

The following example synchronizes the bootflash files between the active and the standby NI-2:

DSLAM> enable DSLAM# secondary sync bootflash

Related Commands

Command
Description

auto-sync

Automatically synchronizes the startup configuration between the active and the standby NI-2.

dir bootflash

Displays the bootflash files for the active NI-2 card.

dir secondary-bootflash

Displays the bootflash files for the standby NI-2 card.

secondary sync config

Synchronizes the startup configuration between the active and the standby NI-2.

secondary sync flash

Synchronizes the flash files from the active to the standby NI-2.

secondary sync running-config

Synchronizes the running configuration between the active and the standby NI-2.


secondary sync config

To manually copy the startup configuration and the IfIndex-table files from the active to the standby NI-2, use the secondary sync config privileged EXEC command.

secondary sync config

Syntax Description

This command has no argument or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(7)DA

This command was introduced.


Usage Guidelines

Use this command to manually copy the startup configuration from the active to the standby NI-2.

Examples

The command in the following example copies the startup configuration from the active to the standby NI-2:

DSLAM> enable DSLAM# secondary sync config

Related Commands

Command
Description

auto-sync

Automatically synchronizes the startup configuration between the active and the standby NI-2.

dir bootflash

Displays the bootflash files for the active NI-2 card.

dir secondary-bootflash

Displays the bootflash files for the standby NI-2 card.

secondary sync bootflash

Synchronizes the bootflash files between the active and the standby NI-2.

secondary sync flash

Synchronizes the flash files between the active and the standby NI-2.

secondary sync running-config

Synchronizes the running configuration between the active and the standby NI-2.

show running-config

Displays the running configuration for every currently defined profile, including the default.

show startup-config

Displays the configuration file pointed to by the config_file environment variable.

squeeze

Deletes files and frees up space.


secondary sync flash

To manually synchronize the flash files on the active and the standby NI-2, use the secondary sync flash privileged EXEC command.

secondary sync flash

Syntax Description

This command has no argument or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(7)DA

This command was introduced.


Usage Guidelines

Use this command to manually synchronize the flash files on the active and the standby NI-2.

Examples

The following example synchronizes the flash files on the active and the standby NI-2:

DSLAM> enable DSLAM# secondary sync flash

Related Commands

Command
Description

auto-sync

Automatically synchronizes the startup configuration on the active and the standby NI-2.

dir flash

Displays the flash files for the active NI-2 card.

dir secondary-flash

Displays the flash files for the standby NI-2 card.

secondary sync bootflash

Synchronizes the bootflash files on the active and the standby NI-2.

secondary sync config

Synchronizes the startup configuration on the active and the standby NI-2.

secondary sync running-config

Synchronizes the running configuration on the active and the standby NI-2.

squeeze

Deletes files and frees up space.


secondary sync running-config

To synchronize the running configurations on the active and the standby NI-2, use the secondary sync running-config privileged EXEC command.

secondary sync running-config

Syntax Description

This command has no argument or keywords.

Defaults

No default behavior or values.

Command Modes

Privileged EXEC

Command History

Release
Modification

12.1(7)DA

This command was introduced.


Usage Guidelines

Use this command to synchronize the running configurations on the active and the standby NI-2.

Examples

The following example synchronizes the running configurations on the active and the standby NI-2:

DSLAM> enable DSLAM# secondary sync running-config

Related Commands

Command
Description

auto-sync

Automatically synchronizes the startup configuration on the active and the standby NI-2.

secondary sync bootflash

Synchronizes the bootflash files on the active and the standby NI-2.

secondary sync config

Synchronizes the startup configuration on the active and the standby NI-2.

secondary sync flash

Synchronizes the flash files on the active and the standby NI-2.

show running-config

Displays the running configuration for every currently defined profile, including the default.

show startup-config

Displays the configuration file to which the config_file environment variable points.

squeeze

Deletes files and frees up space.


service dhcp

To enable the Cisco IOS Dynamic Host Configuration Protocol (DHCP) Server feature, use the service dhcp global configuration command. Use the no form of this command to disable the Cisco IOS DHCP Server feature.

service dhcp

no service dhcp

Syntax Description

This command has no keywords or arguments.

Defaults

The feature is enabled.

Command Modes

Global configuration

Command History

Release
Modification

12.2(1b)DA

This command was introduced.


Usage Guidelines

By default, the Cisco IOS DHCP Server feature is enabled on your Cisco DSLAM.

Examples

The following example enables DHCP services on the DHCP server:

DSLAM(config)# service dhcp

Related Commands

None.

set temperature-rating

Use the set temperature-rating command in EXEC mode to provision the system temperature rating.

set temperature-rating { commercial | osp }

Syntax Description

commercial

Commercial environment

osp

Outside-plant environment


Defaults

No default behavior or values.

Command Modes

EXEC

Command History

Release
Modification

12.2(5)DA

This command was introduced.


Usage Guidelines

Use this command to set the temperature rating for the system. By default, system temperature ratings are set as commercial. A temperature rating mismatch alarm is triggered when any installed system component has a different temperature rating than the system temperature rating setting.

If the system temperature rating setting is osp, then any system component with a temperature rating of commercial triggers the temperature rating mismatch alarm. If the system temperature rating setting is commercial, then any system component with an osp rating triggers the alarm.

If a system has an osp rating but has never been provisioned, then the temperature rating mismatch alarm is on. To remove the alarm, set the system temperature rating to osp. When you change the system temperature rating setting, the facility-alarm status automatically updates, preventing unnecessary mismatch alarms.

Examples

The following examples show how to use the command to change the system temperature rating setting.

To set the system temperature rating to osp:

DSLAM> set temperature-rating osp

To set the system temperature rating to commercial:

DSLAM# set temperature-rating commercial

Related Commands

Command
Description

show environment

Displays information about system temperature settings, as well as temperature details for installed cards or recently provisioned card slots.

show facility-alarm status

Displays information about current alarms on your system.


shdsl annex

To configure the shdsl annex type, use the shdsl annex DSL profile configuration command. To disable, use the no form of this command.

shdsl annex {a | b | auto}

no shdsl annex {a | b | auto}

Syntax Description

a

Configures annex type a on the selected DSL profile.

b

Configures annex type b on the selected DSL profile.

auto

Allows the CO to detect and then select the CPE side annex type during training.


Defaults

The default setting for the shdsl annex command is auto.

Command Modes

DSL profile configuration.

Command History

Release
Modification

12.1(7)DA2

This command was introduced.

12.2(7)DA

The Auto Annex feature was added to the command.


Usage Guidelines

Use Annex A in North American network implementations. Annex B is appropriate for European shdsl implementations.

Examples

The following example shows how to configure shdsl Annex B:

DSLAM(config)# dsl-profile austin DSLAM(cfg-dsl-prof)# shdsl annex b

Related Commands

Command
Description

shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive}

Configures the bit rate, mask type, annex type, and rate mode on a DSL profile.

shdsl margin {min dB | threshold dB | target dB}

Configures margin values, in decibels, on a DSL profile.


shdsl bitrate

To configure the shdsl bit rate, use the shdsl bitrate DSL profile configuration command. To disable, use the no form of this command.

shdsl bitrate rate

no shdsl bitrate

Syntax Description

rate

Specifies the maximum symmetrical data transmission rate for a G.SHDSL link.

Valid rates are 72, 136, 200, 264, 392, 520, 776, 1032, 1160, 1544, 2056, and 2312 kbps.


Defaults

no shdsl bitrate

The default setting specifies a line rate of 776 kbps.

Command Modes

DSL profile configuration

Command History

Release
Modification

12.1(7)DA2

This command was introduced.


Usage Guidelines

If you change the bit rate on a live port, the line retrains.

Examples

The following example shows how to use the shdsl bitrate command to configure the upstream and downstream bandwidth at 2312 kbps:

DSLAM(config)# dsl-profile austin DSLAM(cfg-dsl-prof)# shdsl bitrate 2312

Related Commands

Command
Description

shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive}

Configures the bit rate, mask type, annex type, and rate mode on a DSL profile.

shdsl margin {min dB | threshold dB | target dB}

Configures margin values, in decibels, on a DSL profile.


shdsl margin

To configure shdsl margins, use the shdsl margin DSL profile configuration command. To disable, use the no form of this command.

shdsl margin target dB

shdsl margin min dB

shdsl margin threshold dB

no shdsl margin target

no shdsl margin min

no shdsl margin threshold

Syntax Description

target

In rate adaptive mode, the target margin determines the amount of margin that is required before the line trains. If the line cannot achieve the target margin, it attempts to train at a lower rate. The line continues to lower the rate until it finds a line rate that supports the target margin.

dB

0 to 15 is the configurable range of values in decibels.

min

Configures the minimum SNR margin for the selected DSL profile. If the SNR falls below the configured value after the line has been trained for 5 seconds, the line drops and attempts to retrain.

dB

0 to 31 is the configurable range of values in decibels.

threshold

Configures the minimum SNR threshold margin. If the SNR margin falls below the configured value, an SNR margin threshold alarm is issued.

dB

0 to 31 is the configurable range of values in decibels.


Defaults

The default setting, no shdsl margin configures the following threshold values:

min—0

threshold—3

target0 (for rate adaptive mode the target default is 2)


Note We suggest using the no shdsl margin default settings.


Command Modes

DSL profile configuration.

Command History

Release
Modification

12.1(7)DA2

This command was introduced.


Usage Guidelines

Changing the shdsl margin on a live port causes the line to retrain.

Examples

The following example shows you how to configure the shdsl margin values min 2, threshold 10, and target 0:

DSLAM(config)# dsl-profile austin DSLAM(cfg-dsl-prof)# shdsl margin min 2 DSLAM(cfg-dsl-prof)# shdsl margin threshold 10 DSLAM(cfg-dsl-prof)# shdsl margin target 0

Related Commands

Command
Description

shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive}

Configures the bit rate, mask type, annex type, and rate mode on a DSL profile.


shdsl masktype

To set the G.SHDSL mask type, use the shdsl masktype command in DSL profile configuration mode. To use the default mask type, use the no form of this command.

shdsl masktype masktype

no shdsl masktype

Syntax Description

symmetric

Configures symmetric mask type in the selected DSL profile.


Defaults

The default shdsl masktype is symmetric.

Command Modes

DSL profile configuration.

Command History

Release
Modification

12.1(7)DA2

This command was introduced.


Usage Guidelines

If you change the shdsl mask type on a live port, the line retrains.

Examples

The following example shows you how to configure a symmetric mask type:

DSLAM(config)# dsl-profile austin DSLAM(cfg-dsl-prof)# shdsl masktype symmetric

Related Commands

Command
Description

shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive}

Configures the bit rate, mask type, annex type, and rate mode on a DSL profile.

shdsl margin {min dB | threshold dB | target dB}

Configures margin values, in decibels, on a DSL profile.


shdsl ratemode

To configure the type of training rate (fixed or adaptive), use the shdsl ratemode command. To disable ratemode, use the no form of this command.

shdsl ratemode {fixed | adaptive}

no shdsl ratemode

Syntax Description

fixed

In fixed training mode, no rates are negotiated. The line rate selected is the line rate to which the port attempts to train. If the port is unable to attain that line rate, it does not train.

adaptive

In adaptive training mode, the rate is negotiated during training. If the line cannot train at the selected rate, the line trains at the next best rate. Rates are negotiated in 64-kbps decrements.


Defaults

The default, no shdsl ratemode, is fixed.

Command Modes

DSL profile configuration.

Command History

Release
Modification

12.2(7)DA

This command was introduced.


Usage Guidelines

Changing the shdsl bit rate, mask type, rate, or annex type on a live port causes the line to retrain.

Examples

In the following example the training mode is configured as adaptive:

DSLAM(config)# dsl-profile austin DSLAM(cfg-dsl-prof)# shdsl ratemode adaptive

Related Commands

Command
Description

shdsl annex {a | b}

Configures the annex type on a DSL profile.

shdsl bitrate rate

Configures the bit rate on a DSL profile.

shdsl masktype symmetric

Configures the mask type on a DSL profile.

shdsl margin {min dB | threshold dB | target dB}

Configures margin values, in decibels, on a DSL profile.

shdsl set bitrate rate masktype symmetric annex {a | b | auto}ratemode {fixed | adaptive}

Configures the bit rate, mask type, annex type, and ratemode on a DSL profile.


shdsl set bitrate masktype annex

The shdsl set bitrate masktype annex ratemode command aggregates the configuration of shdsl bit rates, mask types, annex types, and rate mode. To configure SHDSL bit rates, mask types, annex types, and rate mode, use the shdsl set bitrate masktype annex ratemode command in DSL profile configuration mode. To disable the shdsl set bitrate masktype annex ratemode command, use the no form of this command.

shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive}

no shdsl set bitrate masktype annex ratemode

Syntax Description

bitrate

Specifies the maximum symmetrical data transmission rate for a G.SHDSL link.

rate

Valid rates are 72, 136, 200, 264, 392, 520, 776, 1032, 1160, 1544, 2056, and 2312 kbps.

masktype

Configures the shdsl mask type for the selected DSL profile.

symmetric

Configures a symmetric mask type for the selected DSL profile.

annex

Configures the annex type for the selected DSL profile.

a

Configures Annex A for the selected DSL profile.

b

Configures Annex B for the selected DSL profile.

auto

Allows the CO to detect and then select the CPE side annex type during training.

ratemode

Configures the shdsl rate type for the selected DSL profile.

fixed

Configures a fixed training rate for the selected DSL profile.

adaptive

Configures an adaptive training rate for the selected DSL profile.


Defaults

The default no shdsl set bitrate rate masktype symmetric annex {a | b | auto} ratemode {fixed | adaptive} configures the following values on the selected DSL profile:

Bit rate—776

Mask type—Symmetric

Annex—A

Rate mode—(fixed)

Command Modes

DSL profile configuration.

Command History

Release
Modification

12.1(7)DA2

This command was introduced.

12.2(7)DA

The ratemode keyword was added.


Usage Guidelines

Changing the shdsl bit rate, mask type, rate, or annex type on a live port causes the line to retrain.

Examples

The following example shows how to configure a DSL profile with a 1544 kbps bit rate, symmetric mask type, Annex A, and adaptive rate mode:

DSLAM(config)# dsl-profile austin DSLAM(cfg-dsl-prof)# shdsl set bitrate 1544 masktype symmetric annex a ratemode adaptive

Related Commands

Command
Description

shdsl annex {a | b | auto}

Configures the annex type on a DSL profile.

shdsl bitrate rate

Configures the bit rate on a DSL profile.

shdsl masktype symmetric

Configures the mask type on a DSL profile.

shdsl margin {min dB | threshold dB | target dB}

Configures margin values, in decibels, on a DSL profile.

shdsl ratemode {fixed | adaptive}

Configures the type of ratemode (fixed or adaptive) on a DSL profile.



hometocprevnextglossaryfeedbacksearchhelp

Posted: Thu May 27 13:36:23 PDT 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.