|
Table Of Contents
Starting Up the Cisco ONS 15530
Using the Console Ports, NME Ports, and Auxiliary Ports
Configuring IP Access on the NME Interface
Displaying the NME Interface Configuration
Displaying the Operating Configurations
Displaying the NTP Configuration
Testing the System Management Functions
Configuring Traffic Filters and Firewalls
Configuring Passwords and Privileges
About CPU Switch Module Redundancy
Configuring CPU Switch Module Redundancy
Forcing a Switchover from Privileged EXEC Mode
Forcing a Switchover from ROM Monitor Mode
Synchronizing the Configurations
Displaying the CPU Switch Module Redundancy Configuration and Status
Reloading the CPU Switch Modules
Configuring Privileged EXEC Mode Access on the Standby CPU Switch Module
About Preserving Counters on a CPU Switch Module Switchover
Configuring Counter Preservation
About the Software Configuration Register
Software Configuration Register Settings
Changing the Software Configuration Register
Verify the Configuration Register Value
Configuring Fan Failure Shutdown
Displaying the Fan Tray Failure Shutdown Configuration
About Critical Temperature Shutdown
Configuring Critical Temperature Shutdown
Displaying the Threshold Temperatures
Initial Configuration
This chapter describes how to configure the Cisco ONS 15530 so it can be accessed by other devices.
• Starting Up the Cisco ONS 15530
• Using the Console Ports, NME Ports, and Auxiliary Ports
• Configuring IP Access on the NME Interface
• Configuring Security Features
• About CPU Switch Module Redundancy
• Configuring CPU Switch Module Redundancy
• About the Software Configuration Register
• Changing the Software Configuration Register
• Configuring Fan Failure Shutdown
• About Critical Temperature Shutdown
• Configuring Critical Temperature Shutdown
About the CPU Switch Module
The CPU switch module provides intelligence to the Cisco ONS 15530. The CPU switch module supports SNMP (Simple Network Management Protocol) and many MIBs (Management Information Bases).
The Cisco ONS 15530 uses a QED RM7000 RISC processor. It runs at 78 MHz externally and at 234 MHz internally. It has a 64-bit multiplexed address and data bus with byte parity running at 78 MHz. It has separate internal Layer 1 instruction and data caches of 16 KB each and internal Layer 2 combined instruction/data cache of 256 KB.
The CPU switch modules also contains a 32 by 32 switch fabric that directs traffic from client cards to trunk cards. The switch fabric supports 2.5 Gbps data signals with 2R transparency.
The CPU switch module provides a slot on the front panel that accommodates a CompactFlash card. You can use the CompactFlash card for system image upgrades, functional image upgrades, statistics gathering, and other file system applications.
The Cisco ONS 15530 supports redundant operation with dual CPU switch modules. The CPU switch modules reside in slots 5 and 6, the sixth and seventh slots from the left as you face the chassis. For more information about redundancy, see the "About CPU Switch Module Redundancy" section.
For more information on the CPU switch module, refer to the Cisco ONS 15530 ESP Hardware Installation Guide.
Starting Up the Cisco ONS 15530
Before starting up the Cisco ONS 15530, you should verify the following:
•The system is set for the correct AC (or DC) power voltages.
Refer to the Cisco ONS 15530 Hardware Installation Guide for correct power voltages.
•The cables are connected to the system.
•A console terminal is connected to the system.
Refer to the Cisco ONS 15530 Hardware Installation Guide for instructions.
When you start up the Cisco ONS 15530, the CLI (command-line interface) prompts you to enter the initial configuration dialog. Answer no to this prompt:
Would you like to enter the initial dialog? [yes]: no
You see the following user EXEC prompt:
Switch>
You can now begin configuring the CPU switch module.
Using the Console Ports, NME Ports, and Auxiliary Ports
You can configure the Cisco ONS 15530 from a direct console connection to the console port or remotely through its NME (network management Ethernet) port.
•If you are using a direct console connection, configure your terminal emulation program for 9600 baud, 8 data bits, no parity, and 1 stop bit.
•If you are using the NME port interface, you must assign an IP address to the interface (fastethernet 0).
For interface configuration instructions, see the "Configuring IP Access on the NME Interface" section.
For further details on configuring ports and lines for management access, refer to the
Cisco IOS Configuration Fundamentals Configuration Guide.Modem Support
The auxiliary port of the Cisco ONS 15530 provides modem connection support. The following settings on the modem are required:
•Enable auto answer mode.
•Suppress result codes.
•Ensure auxiliary port terminal characteristics, such as speed, stop bits, and parity, match those of the modem.
You can configure your modem by setting the DIP switches on the modem itself or by setting them through terminal equipment connected to the modem. Refer to the user manual provided with your modem for the correct configuration information.
For further details on configuring ports and modems for management access, refer to the Cisco IOS Configuration Fundamentals Configuration Guide and the Cisco IOS Dial Services Configuration Guide: Terminal Services.
About Passwords
You can configure both an enable password and an enable secret password. For maximum security, the enable password should be different from the enable secret password.
Enable Password
The enable password is a nonencrypted password that controls access to various commands and configuration modes. It contains from 1 to 25 uppercase and lowercase alphanumeric characters. Give the enable password only to users permitted to make configuration changes to the Cisco ONS 15530.
Enable Secret Password
The enable secret password is a secure, encrypted password. On systems running Cisco IOS, you must type in the enable secret password before you can access global configuration mode.You must type in the enable secret password to access boot ROM software.
Caution If you specify an encryption-type and then enter a clear text password, you will not be able to reenter enable mode. You cannot recover a lost password that has been encrypted by any method.
An enable secret password contains from 1 to 25 uppercase and lowercase alphanumeric characters. The first character cannot be a number. Spaces are valid password characters. Leading spaces are ignored; trailing spaces are recognized.
You will configure passwords in the "Configuring IP Access on the NME Interface" section.
Configuring IP Access on the NME Interface
The Fast Ethernet interface, or NME, on the active CPU switch module, named fastethernet 0, is the management interface that allows multiple, simultaneous Telnet or SNMP network management sessions.
You can remotely configure the Cisco ONS 15530 through the Fast Ethernet interface, but first you must configure an IP address so that the active CPU switch module is reachable. You can configure the NME interface two ways: manually from the CLI or by copying the configuration from the BOOTP server into NVRAM.
Note Before you begin to manually configure an NME interface, obtain its IP address and IP subnet mask. Also make sure the console cable is connected to the console port.
To configure IP access on the NME port fastethernet 0 from the CLI, perform these steps from the console interface:
The Cisco ONS 15530 NME interface should now be operating correctly.
Note If a CPU switch module switchover occurs, you can use the same IP address to access the redundant CPU switch module after it becomes active.
Note In a multiple shelf node configuration, perform these steps on the NME interfaces on all shelves in the node.
Displaying the NME Interface Configuration
To display the configuration of the NME interface, use the following EXEC command:
Example
Switch# show interfaces fastethernet 0
FastEthernet0 is up, line protocol is up
Hardware is AmdFE, address is 0000.1644.28ea (bia 0000.1644.28ea)
Internet address is 172.20.54.152/24
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Keepalive set (10 sec)
Half-duplex, 10Mb/s, 100BaseTX/FX
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Queueing strategy: fifo
Output queue :0/40 (size/max)
5 minute input rate 3000 bits/sec, 6 packets/sec
5 minute output rate 1000 bits/sec, 3 packets/sec
36263 packets input, 3428728 bytes
Received 17979 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog
0 input packets with dribble condition detected
20363 packets output, 4279598 bytes, 0 underruns
0 output errors, 8 collisions, 0 interface resets
0 babbles, 0 late collision, 72 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Displaying the Operating Configurations
You can display the configuration file when you are in privileged EXEC (enable) mode.
•To see the current operating configuration, enter the following command at the enable prompt:
Switch#
more system:running-config
•To see the configuration saved in NVRAM, enter the following command:
Switch#
more nvram:startup-config
If you made changes to the configuration, but did not yet write the changes to NVRAM, the contents of the running-config file will differ from the contents of the startup-config file.
Configuring the Host Name
In addition to passwords and an IP address, your initial configuration should include the host name to make it easier to configure and troubleshoot the Cisco ONS 15530. To configure the host name, perform the following steps:
Note The host name is also synchronized with the standby CPU switch module. The host name prompt on the standby CPU switch module appears with "sby-" as a prefix.
Example
The following example shows how to configure a new host name, beginning in privileged EXEC mode:
Switch#
configure terminal
Switch(config)#
hostname ONS15530
ONS15530(config)#
end
ONS15530#
copy system:running-config nvram:startup-config
About NTP
The NTP (Network Time Protocol) is a utility for synchronizing system clocks over the network, providing a precise time base for networked workstations and servers. In the NTP model, a hierarchy of primary and secondary servers pass timekeeping information by way of the Internet to cross-check clocks and correct errors arising from equipment or propagation failures.
An NTP server must be accessible by the client switch. NTP runs over UDP (User Datagram Protocol), which in turn runs over IP. NTP is documented in RFC 1305. All NTP communication uses UTC (Coordinated Universal Time), which is the same as Greenwich Mean Time. An NTP network usually gets its time from an authoritative time source, such as a radio clock or an atomic clock attached to a time server. NTP distributes this time across the network. NTP is extremely efficient; no more than one packet per minute is necessary to synchronize two machines to within a millisecond of one another.
NTP uses a stratum to describe how many NTP hops away a machine is from an authoritative time source. A stratum 1 time server has a radio or atomic clock directly attached, a stratum 2 time server receives its time from a stratum 1 time server, and so on. A machine running NTP automatically chooses as its time source the machine with the lowest stratum number that it is configured to communicate with through NTP. This strategy effectively builds a self-organizing tree of NTP speakers.
NTP has two ways to avoid synchronizing to a machine whose time might be ambiguous:
•NTP never synchronizes to a machine that is not synchronized itself.
•NTP compares the time reported by several machines and does not synchronize to a machine whose time is significantly different from the others, even if its stratum is lower.
The communications between machines running NTP, known as associations, are usually statically configured; each machine is given the IP address of all machines with which it should form associations. Accurate timekeeping is possible by exchanging NTP messages between each pair of machines with an association.
The Cisco implementation of NTP does not support stratum 1 service; it is not possible to connect to a radio or atomic clock. We recommend that you obtain the time service for your network from the public NTP servers available in the IP Internet. If the network is isolated from the Internet, the Cisco NTP implementation allows a machine to be configured so that it acts as though it is synchronized using NTP, when in fact it has determined the time using other means. Other machines then synchronize to that machine using NTP.
A number of manufacturers include NTP software for their host systems, and a version for systems running UNIX and its various derivatives is also publicly available. This software allows host systems to be time-synchronized as well.
Configuring NTP
NTP services are enabled on all interfaces by default. You can configure your Cisco ONS 15530 in either of the following NTP associations:
•Peer association—This system either synchronizes to the other system or allows the other system to synchronize to it.
•Server association—This system synchronizes to the other system, and not the other way around.
From global configuration mode, use the following procedure to configure NTP in a server association that transmits broadcast packets and periodically updates the calendar:
For information on other optional NTP configurations, see the Cisco IOS Configuration Fundamentals Configuration Guide.
Displaying the NTP Configuration
To view the current NTP configuration and status, use the following EXEC command:
Example
The following example shows the NTP configuration and status:
Switch# show ntp status
Clock is synchronized, stratum 4, reference is 198.92.30.32
nominal freq is 250.0000 Hz, actual freq is 249.9999 Hz, precision is 2**24
reference time is B6C04F19.41018C62 (18:21:13.253 UTC Thu Feb 27 1997)
clock offset is 7.7674 msec, root delay is 113.39 msec
root dispersion is 386.72 msec, peer dispersion is 1.57 msec
Configuring Security Features
The Cisco ONS 15530 supports the following Cisco IOS software security features:
•AAA (authentication, authorization, and accounting)
•Kerberos
•RADIUS
•TACACS+
•Traffic filters and firewalls
•Passwords and privileges
Configuring AAA
This section describes the AAA features supported by the Cisco ONS 15530.
Configuring Authentication
To configure AAA authentication, perform the following tasks:
Step 1 Enable AAA by using the aaa new-model global configuration command.
Step 2 Configure security protocol parameters, such as RADIUS, TACACS+, or Kerberos if you are using a security server. Refer to the Cisco IOS Security Configuration Guide.
Step 3 Define the method lists for authentication by using an AAA authentication command.
Step 4 Apply the method lists to a particular interface or line, if required.
Configuring Authorization
The AAA authorization feature enables you to limit the services available to a user. When AAA authorization is enabled, the network access server uses information retrieved from the user's profile, which is located either in the local user database or on the security server, to configure the user's session. Once this is done, the user is granted access to a requested service only if the information in the user profile allows it.
Refer to the Cisco IOS Security Configuration Guide.
Configuring Accounting
The AAA accounting feature enables you to track the services that users are accessing and the amount of network resources that they are consuming. When AAA accounting is enabled, the network access server reports user activity to the TACACS+ or RADIUS security server (depending on which security method you have implemented) in the form of accounting records. Each accounting record contains accounting attribute-value (AV) pairs and is stored on the security server. This data can then be analyzed for network management, client billing, and auditing.
Refer to the Cisco IOS Security Configuration Guide.
Configuring Kerberos
For hosts and the KDC in your Kerberos realm to communicate and mutually authenticate, you must identify them to each other. To do this, you add entries for the hosts to the Kerberos database on the KDC and add SRVTAB files generated by the KDC to all hosts in the Kerberos realm. You also make entries for users in the KDC database.
Refer to the Cisco IOS Security Configuration Guide.
Configuring RADIUS
RADIUS is a distributed client/server system that secures networks against unauthorized access. RADIUS clients run on Cisco ONS 15530 systems and send authentication requests to a central RADIUS server that contains all user authentication and network service access information. RADIUS is a fully open protocol, distributed in source code format, that can be modified to work with any security system currently available.
To configure RADIUS on your Cisco router or access server, perform the following tasks:
Step 1 Use the aaa new-model global configuration command to enable AAA. AAA must be configured if you plan to use RADIUS. Refer to the Cisco IOS Security Configuration Guide.
Step 2 Use the aaa authentication global configuration command to define method lists for RADIUS authentication.Refer to the Cisco IOS Security Configuration Guide.
Step 3 Use line and interface commands to enable the defined method lists to be used. Refer to the Cisco IOS Security Configuration Guide.
The following configuration tasks are optional:
•You may use the aaa group server command to group selected RADIUS hosts for specific services.
•You may use the aaa dnis map command to select RADIUS server groups based on DNIS number. To use this command, you must define RADIUS server groups using the aaa group server command.
•You may use the aaa authorization global command to authorize specific user functions. Refer to the Cisco IOS Security Configuration Guide.
•You may use the aaa accounting command to enable accounting for RADIUS connections. Refer to the Cisco IOS Security Configuration Guide.
•You may use the dialer aaa interface configuration command to create remote site profiles that contain outgoing call attributes on the AAA server.
Refer to the Cisco IOS Security Configuration Guide.
Configuring TACACS+
To configure your system to support TACACS+, perform the following tasks:
Step 1 Use the aaa new-model global configuration command to enable AAA. AAA must be configured if you plan to use TACACS+.
Step 2 Use the tacacs-server host command to specify the IP address of one or more TACACS+ daemons. Use the tacacs-server key command to specify an encryption key that is used to encrypt all exchanges between the network access server and the TACACS+ daemon. This same key must also be configured on the TACACS+ daemon.
Step 3 Use the aaa authentication global configuration command to define method lists that use TACACS+ for authentication.
Step 4 Use line and interface commands to apply the defined method lists to various interfaces.
Step 5 If needed, use the aaa authorization global command to configure authorization for the network access server. Unlike authentication, which can be configured per line or per interface, authorization is configured globally for the entire network access server.
Step 6 If needed, use the aaa accounting command to enable accounting for TACACS+ connections.
Refer to the Cisco IOS Security Configuration Guide.
Configuring Secure Shell
The preferred method of administering the system is through a Telnet session. However, using Telnet can cause security issues that include session hijacking, sniffing, and man-in-the-middle attacks. These attacks can be stopped using the Secure Shell (SSH) protocol and application, which the system supports. SSH is an application and protocol that secures the sessions using standard cryptographic mechanisms. Two versions of SSH are currently available, SSHv1 and SSHv2.
SSH runs on top of a reliable transport layer, such as TCP/IP, and provides strong authentication and encryption capabilities. SSH allows you to log in to a host over a network, execute commands remotely, and move files from one host to another. The requirements are:
•Any host that needs an incoming secure connection must have the SSH daemon (or server) running.
•The SSH client is required to initiate a connection to the remote host.
The Cisco IOS implementation of the SSH server on the system provides the following:
•Secure incoming connections
•Remote EXEC session connections to the system
•DES, 3DES, and AES (128, 192, and 256 bit) encryption
•Username and password authentication using the existing Cisco IOS AAA authentication functions
•SSHv1 and SSHv2
For additional information about SSH, refer to the Cisco IOS Security Configuration Guide. For a complete description of the SSH commands (in this chapter) refer to the Cisco IOS Security Command Reference.
To configure SSH on the system, perform the following steps in global EXEC mode:
Example
The following example shows how to configure the SSH client and start the SSH server:
Switch(config)# hostname
Switch(config)# ip domain-name cisco.com
Switch(config)# crypto key generate rsa
To start SSH client functionality on the system, use the following command:
Note You can run the SSH client configuration from any EXEC configuration level.
Displaying and Disconnecting SSH
To display the SSH utilization, use the following privileged EXEC commands:
Command Purposeshow ssh
Displays SSH connection information.
disconnect ssh session-id
Disconnects an SSH session.
show ip ssh
Displays the SSH configuration.
Examples
The following example shows how to display the SSH connection information:
Switch# show ssh
Connection Version Encryption State Username
0 1.5 3DES Session started sriram
Connection Version Mode Encryption Hmac State Username
1 2.0 IN aes128-cbc hmac-md5 Session started aarun
1 2.0 OUT aes128-cbc hmac-md5 Session started aarun
The following example shows how to clear the outgoing SSH connection 0:
Switch# disconnect ssh 0
[Connection to 10.13.1.98 closed by foreign host]
Switch#
The following example shows how to display the SSH configuration:
Switch# show ip ssh
SSH Enabled - version 1.5
Authentication timeout: 120 secs; Authentication retries: 3
Testing the System Management Functions
This section describes the commands used to monitor and display the system management functions.
Displaying Active Processes
To display information about the active processes, use the following privileged EXEC commands:
Command Purposeshow processes
Displays active process statistics.
show processes cpu
Displays active process CPU utilization.
show processes memory
Displays active process memory utilization.
Displaying Protocols
To display the configured protocols, use the following privileged EXEC command:
Command Purposeshow protocols type card/subcard/port
Displays the global and interface-specific status of any configured Level 3 protocol.
Displaying Stacks
To monitor the stack utilization of processes and interrupt routines, use the following privileged EXEC command:
The show stacks command output includes the reason for the last system reboot. If the system was reloaded because of a system failure, a saved system stack trace is displayed. This information is useful only to Cisco engineers analyzing crashes in the field.
Switch# show stacks
Minimum process stacks:
Free/Size Name
5544/6000 IPC Zone Manager
4864/6000 IPC delayed init
5712/6000 CDP BLOB
8672/9000 IP IRDP
8544/9000 IP Background
10984/12000 RFSS_server_action
Interrupt level stacks:
Level Called Unused/Size Name
1 575422 6656/9000 NME/Serial/Compact Flash interrupts
2 0 9000/9000 DMA/Timer Interrupt
3 677 8400/9000 Console Uart
4 0 9000/9000 GT/IOFPGA Error interrupts
5 0 9000/9000 OIR Intr
6 0 9000/9000 ARB Intr
7 0 9000/9000 APS Intr
9 3096752 8552/9000 NMI Interrupt Handler
Switch#
Displaying Environment
To display temperature and voltage information on the system console, use the following EXEC command:
Checking Basic Connectivity
To diagnose basic network connectivity on the system, use the following privileged EXEC commands
:
Configuring Traffic Filters and Firewalls
The Cisco ONS 15530 supports the traffic filter and firewall features provided by Cisco IOS software.
Traffic filters provide basic traffic filtering capabilities with access control lists (also referred to as access lists). Access lists can be configured for all routed network protocols (IP, AppleTalk, and so on) to filter the packets of those protocols as the packets pass through a system. You can configure access lists on your Cisco ONS 15530 to control access to a network, preventing certain traffic from entering or exiting a network.
Firewalls are networking devices that control access to your organization's network assets. You can position firewalls to control access at the entrance points into your network. or to control access to a specific part of your network
Refer to the Cisco IOS Security Configuration Guide.
Configuring Passwords and Privileges
Using passwords and assigning privilege levels is a simple way of providing terminal access control in your network. You can configure up to 16 different privilege levels and assign each level to a password. For each privilege level you define a subset of Cisco IOS commands that can be executed. You can use these different levels to allow some users the ability to execute all Cisco IOS commands, and to restrict other users to a defined subset of commands.
Refer to the Cisco IOS Security Configuration Guide.
About CPU Switch Module Redundancy
The Cisco ONS 15530 supports fault tolerance by allowing the standby CPU switch module to take over if the active CPU switch module fails. This standby, or redundant, CPU switch module runs in hot-standby state. In hot-standby state, the standby CPU switch module is partially booted with Cisco IOS software, but no configuration is loaded.
At the time of a switchover from the active CPU switch module, the standby CPU switch module becomes active and loads the configuration as follows:
•If the running configuration file on the active and standby CPU switch modules match, the new active CPU switch module uses the running configuration file.
•If the running configuration file on the new active CPU switch module is missing or invalid, the new active CPU switch module uses the startup configuration file in its NVRAM (not the NVRAM of the former active CPU switch module).
The former active CPU switch module then reloads and becomes the standby CPU switch module.
Note If the standby CPU switch module is unavailable, the system reports a minor alarm. Use the show facility-alarm status command to display the redundancy alarm status.
When the Cisco ONS 15530 is powered on, the two CPU switch modules arbitrate to determine which is the active CPU switch module and which is the standby CPU switch module. The following rules apply during arbitration:
•A newly inserted CPU switch module always comes up as the standby CPU switch module, except in cases where the newly inserted card is the only one present.
•If one of the CPU switch modules cannot boot its software image, the redundant CPU switch module boots as the active CPU switch module, allowing you to correct the situation manually.
•The primary route processor at the time the system is powered off continues as the primary when the system is powered on.
•If none of the above conditions is true, the CPU switch module in slot 6 becomes the active CPU switch module.
During normal operation, the active CPU switch module boots completely. The standby CPU switch module partially boots, stopping short of parsing the configuration. From this point, the active and standby CPU switch modules communicate periodically to synchronize any system configuration changes.
Table 3-1 describes the five CPU switch module hardware states.
Figure 3-1 shows the valid hardware transition states for a system with redundant CPU switch modules.
Figure 3-1 CPU Switch Module State Transition Diagram
In response to redundancy events, such as switchovers and reboots of the active CPU switch module, the software transitions through a series of software redundancy states. Table 3-2 lists some of the significant software states.
Redundant Operation Requirements
For fully redundant operation, the following requirements must be met:
•Two CPU switch modules are required.
•The CPU switch modules must have identical hardware configurations. This includes variables such as DRAM size, and so on.
•Both CPU switch modules must have the same functional image.
•Both CPU switch modules must be running compatible system images. System images are compatible across one major release.
•Both the running and startup configurations are automatically synchronized between the CPU switch modules.
•Both CPU switch modules must be set to autoboot (a default setting).
If these requirements are met, the Cisco ONS 15530 runs in redundant mode by default. If they are not met, the system is conditionally redundant.
Conditions Causing a Switchover from the Active CPU Switch Module
The following conditions can cause a switchover from the active CPU switch module to the standby CPU switch module:
•The active CPU switch module is removed or swapped. When the CPU switch module functioning as the active CPU switch module is removed, the standby CPU switch module takes over. The Cisco ONS 15530 is nonredundant until a second CPU switch module is inserted.
•The active CPU switch module is rebooted. When a CPU switch module functioning as the active CPU switch module is rebooted, it relinquishes its active role if the standby CPU switch module has reached the hot-standby state.
•The active CPU switch module fails. The standby CPU switch module takes over as the active CPU switch module, using the last synchronized running configuration file (or the last saved startup configuration file if the running configuration file synchronization was disabled or failed).
•A switchover is manually forced with the redundancy switch-activity command.
Configuring CPU Switch Module Redundancy
This section describes how to configure CPU switch module redundancy for your Cisco ONS 15530.
Note The initial default configuration supports CPU switch module redundancy and database synchronization with no manual configuration required.
Forcing a Switchover from Privileged EXEC Mode
You can manually force the standby CPU switch module to take over as the active CPU switch module from privileged EXEC mode. To force a switchover from privileged EXEC mode, enter the following command on the active CPU switch module CLI:
Command Purposeredundancy switch-activity [force]
Causes a CPU switch module switchover. If the standby CPU switch module has not reached the hot-standby software state, use the force option.
As long as you have not changed the default configuration register setting from autoboot, the standby CPU switch module (formerly the active CPU switch module) automatically boots until it reaches the hot-standby state.
Note Data transmission through the system is not affected by a CPU switch module switchover.
Example
The following example shows how to manually cause a CPU switch module switchover from privileged EXEC mode:
Switch# redundancy switch-activity
This will reload the active unit and force a switch of activity [confirm] y
Preparing to switch activity
00:12:05: %SYS-5-RELOAD: Reload requested
<Information deleted>
Forcing a Switchover from ROM Monitor Mode
You can manually force the standby CPU switch module to take over as the active CPU switch module ROM monitor mode. To force a switchover from ROM monitor mode, enter the following commands on the active CPU switch module CLI:
Command Purposeswitchover
Causes a CPU switch module reset and switchover. The CPU switch module stays in ROM monitor mode.
Note Using the reset command in ROM monitor mode on the active processor CLI under normal conditions does not cause a switchover.
Example
The following example shows how to manually cause a CPU switch module switchover from ROM monitor mode:
<Information deleted>
This CPU is ACTIVE (sev=0), peer CPU is NON-PARTICIPANT (sev=2)
MANHATTAN_OPTICAL platform with 131072 Kbytes of main memory
rommon 1 > switchover
System Bootstrap, Version 12.1(20010726:234219) [ffrazer-lh4 102], DEVELOPMENT S
OFTWARE
Copyright (c) 1994-1999 by cisco Systems, Inc.
Flash size is 16777216
Reset Reason Register = RESET_REASON_SW_NMI (0x4)
Reset type 0x2
Reading monitor variables from NVRAM
Running reset I/O devices
Enabling interrupts
Initializing TLB
Initializing cache
Initializing required TLB entries
Initializing main memory
SDRAM DIMM size 67108864
Sizing NVRAM
Initializing PCMCIA controller
Initializing SRC FPGA
CPU arbitration
This CPU is NON-PARTICIPANT (sev=2), peer CPU is ACTIVE (sev=0)
MANHATTAN_OPTICAL platform with 131072 Kbytes of main memory
rommon 1 >
Configuring Autoboot
If you have changed the default configuration register value from autoboot, you can change it back by performing the following steps, beginning in global configuration mode:
Command PurposeStep 1
Switch(config)# config-register 0x2102
Sets the configuration register for autoboot.1
Step 2
Switch(config)# boot system bootflash:filename
Sets the BOOT environment variable. This variable specifies the location and name of the system image file to use when automatically booting the system.
Step 3
Switch(config)# end
Switch#
Returns to privileged EXEC mode.
Step 4
Switch# copy system:running-config nvram:startup-config
Saves the configuration to NVRAM. The new configuration register value takes effect after the next system reload.
1 This is the default configuration register setting. For details on using the configuration register to set boot parameters, refer to the Cisco IOS Configuration Fundamentals Configuration Guide.
Note If the standby CPU switch module remains in ROM monitor mode, you can manually boot the CPU switch module using a system image either on the bootflash or on a Flash PC Card.
Example
The following example shows how to configure the Cisco ONS 15530 to autoboot using the first valid file on the Flash PC Card in slot 0:
Switch(config)# config-register 0x2102
Switch(config)# boot system flash slot0:
Switch(config)# end
Switch# copy system:running-config nvram:startup-config
Displaying the Autoboot Configuration
To display the configuration register value, use the following EXEC commands:
Command Purposeshow version
Displays the configuration register value.
show bootvar
Displays the configuration register value.
Example
The following example shows the contents of the configuration register:
Switch# show version
Cisco Internetwork Operating System Software
IOS (tm) ONS-15530 Software (manopt-M0-M), Experimental Version 12.1(20010221:0]
Copyright (c) 1986-2001 by cisco Systems, Inc.
Compiled Tue 20-Feb-01 18:40 by lthanvan
Image text-base: 0x60010968, data-base: 0x604D8000
ROM: System Bootstrap, Version 12.1(20010204:232442) [vsankar-alarm_fix 106], DE
BOOTFLASH: M1540-ODS Software (manopt-M0-M), Experimental Version 12.1(20001229]
M1 uptime is 1 minute
System returned to ROM by power-on
System image file is "tftp://171.69.1.129//tftpboot/lthanvan/manopt-m0-mz"
cisco (QUEENS-CPU) processor with 98304K/32768KB of memory.
R7000 CPU at 234Mhz, Implementation 39, Rev 2.1, 256KB L2, 2048KB L3 Cache
Last reset from unexpected value
2 Ethernet/IEEE 802.3 interface(s)
509K bytes of non-volatile configuration memory.
16384K bytes of Flash internal SIMM (Sector size 64K).
Configuration register is 0x2102
The following example shows the contents of the boot variable:
Switch# show bootvar
BOOT variable = bootflash:ons15530-i-mz.1;
CONFIG_FILE variable =
BOOTLDR variable =
Configuration register is 0x2
Standby auto-sync startup config mode is on
Standby auto-sync running config mode is on
Synchronizing the Configurations
During normal operation, the startup and running configurations are synchronized by default between the two CPU switch modules. In the event of a switchover, the new active CPU switch module uses the current running configuration. Configurations are synchronized either manually from the CLI using the redundancy manual-sync command or automatically following configuration changes input from the CLI or from SNMP if automatic synchronization is enabled.
Synchronizing Configurations Manually
To immediately synchronize the configurations used by the two CPU switch modules, use the following privileged EXEC command on the active CPU switch module:
Command Purposeredundancy manual-sync {startup-config | running-config | both}
Immediately synchronizes the configuration.
Example
The following example shows how to manually synchronize the running configuration:
Switch# redundancy manual-sync running-config
Enabling and Disabling Automatic Synchronization
You can enable and disable automatic synchronization of the running configuration and the startup configuration between the two CPU switch modules. Automatic synchronization ensures that, when a switchover occurs, the standby CPU switch module has the most recent configuration information.
Note By default, the Cisco ONS 15530 automatically synchronizes the running configuration and the startup configuration between the two CPU switch modules.
Table 3-3 lists the events that cause the automatic synchronization of the configuration files.
To enable or disable the system to automatically synchronize the configurations on both CPU switch modules, perform the following steps on the active CPU switch module, beginning in global configuration mode
Example
The following example shows how to disable automatic synchronization of the running configuration:
Switch(config)# redundancy
Switch(config-red)# no auto-sync running-config
Switch(config-red)# end
Switch# copy system:running-config nvram:startup-config
Configuring Maintenance Mode
You can configure the Cisco ONS 15530 to enter the redundancy maintenance mode. Configuration synchronizations and standby CPU switch module fault reporting are suppressed in maintenance mode. Upon exiting maintenance mode and reverting to redundant mode, the standby switch CPU switch module reboots to the hot-standby state.
Note When the system is in maintenance mode, switchovers only occur by entering the redundancy switch-activity force command, or physically removing the active CPU switch module.
To configure maintenance mode, perform the following steps, beginning in global configuration mode:
Command PurposeStep 1
Switch(config)# redundancy
Switch(config-red)#
Enters redundancy configuration mode.
Step 2
Switch(config-red)# maintenance-mode
Configures the system in maintenance mode.
Example
The following example shows how to configure redundancy maintenance mode:
Switch(config)# redundancy
Switch(config-red)# maintenance-mode
This command will place the system in SIMPLEX mode [confirm] y
Displaying the CPU Switch Module Redundancy Configuration and Status
To display the CPU switch module redundancy configuration and status, use the following privileged EXEC commands:
Examples
The following example shows the CPU switch module redundancy configuration and status:
Switch# show redundancy summary
Redundant system information
----------------------------
Available Uptime: 3 days, 4 hours, 35 minutes
Time since last switchover: 10 hours, 30 minutes
Switchover Count: 1
Inter-CPU Communication State:UP
Last Restart Reason: Switch over
Software state at switchover: ACTIVE
Last Running Config sync: 2 hours, 18 minutes
Running Config sync status: In Sync
Last Startup Config sync: 6 hours, 4 minutes
Startup Config sync status: In Sync
This CPU is the Active CPU.
-------------------------------
Slot: 7
Time since CPU Initialized: 22 hours, 33 minutes
Image Version: ONS-15530 Software(ONS15530-I-M),...
Image File: bootflash:ons15530-i-mz.010727
Software Redundancy State: ACTIVE
Hardware State: ACTIVE
Hardware Severity: 0
Peer CPU is the Standby CPU.
-------------------------------
Slot: 6
Time since CPU Initialized: 10 hours, 29 minutes
Image Version: ONS-15530 Software(ONS15530-I-M),...
Image File (on sby-CPU): bootflash:ons15530-i-mz.010727
Software Redundancy State: STANDBY HOT
Hardware State: STANDBY
Hardware Severity: 0
The following example shows the CPU switch module capabilities:
Switch# show redundancy capability
CPU capability support
Active CPU Sby CPU Sby Compat CPU capability description
---------- ---------- ----------- ----------------------------------------
48 MB 48 MB OK CPU DRAM size
16 MB 16 MB OK CPU PMEM size
512 KB 512 KB OK CPU NVRAM size
16 MB 16 MB OK CPU Bootflash size
4.6 4.6 OK CPU hardware major.minor version
1.43 1.43 OK CPU functional major.minor version
Linecard driver major.minor versions, (counts: Active=13, Standby=13)
Active CPU Sby CPU Sby Compat Drv/Ch/F ID Driver description
---------- ---------- ----------- ----------- ------------------------------
1.3 1.3 OK 0x1100/0/0 CPU with Switch Fabric
2.3 2.3 OK 0x1101/0/0 10 Port ESCON line card
2.1 2.1 OK 0x110A/0/0 8 Port GE-FC line card
3.1 3.1 OK 0x1105/0/0 2.5G Transparent line card
1.9 1.9 OK 0x1105/1/0 2.5G Transparent line card
3.1 3.1 OK 0x1109/0/0 2.5G Transparent line card
1.9 1.9 OK 0x1109/1/0 2.5G Transparent line card
Active CPU Sby CPU Sby Compat Drv/Ch/F ID Driver description
---------- ---------- ----------- ----------- ------------------------------
1.3 1.3 OK 0x1103/0/0 OSC line card
0.1 0.1 OK 0x1107/1/0 OSC daughter card
2.1 2.1 OK 0x1102/0/0 10G trunk card
1.0 1.0 OK 0x110B/0/0 2.5G trunk card
2.1 2.1 OK 0x1110/0/0 PSM wdm splitter
1.1 1.1 OK 0x1100/0/1 ONS15530 Rommon
Software sync client versions, listed as version range X-Y.
X indicates the oldest peer version it can communicate with.
Y indicates the current sync client version.
Sync client counts: Active=6, Standby=6
Active CPU Sby CPU Sby Compat Cl ID Redundancy Client description
---------- ---------- ----------- ----- ------------------------------------
ver 1-2 ver 1-2 OK 17 CPU Redundancy
ver 1-1 ver 1-1 OK 19 Interface Sync
ver 1-1 ver 1-1 OK 36 MetOpt Password Sync
ver 1-2 ver 1-2 OK 18 Online Diagnostics
ver 1-2 ver 1-2 OK 6 OIR Client
ver 1-1 ver 1-1 OK 27 metopt cm db sync
ackplane IDPROM comparison
Backplane IDPROM field Match Local CPU Peer CPU
--------------------------- ----- -------------------- --------------------
idversion YES 1 1
magic YES 153 153
card_type YES 4358 4358
order_part_num_str YES PROTO-HAMPTON-CHASSIS
PROTO-HAMPTON-CHASSIS
description_str YES Prototype Hampton Backplane
Prototype Hampton Backplane
board_part_num_str YES 73-6573-03 73-6573-03
board_revision_str YES 02 02
serial_number_str YES TBC055089 TBC055089
date_of_manufacture_str YES 10/21/2001 10/21/2001
deviation_numbers_str YES N/A N/A
manufacturing_use YES 0 0
rma_number_str YES
rma_failure_code_str YES
oem_str YES Cisco Cisco
clei_str YES TBD TBD
snmp_oid_substr YES TBD TBD
schematic_num_str YES 92-4568-03 92-4568-03
Backplane IDPROM field Match Local CPU Peer CPU
--------------------------- ----- -------------------- --------------------
hardware_major_version YES 3 3
hardware_minor_version YES 1 1
engineering_use_str YES LAB Prototype LAB Prototype
crc16 OK 52960 10284
user_track_string NO hello PhyAlias test AssetTag123
lab
diagst YES ^A ^A
board_specific_revision YES 1 1
board_specific_magic_number YES 153 153
board_specific_length YES 56 56
mac_address_block_size YES 16 16
mac_address_base_str YES 00016447a240 00016447a240
cpu_number OK 0 1
optical_backplane_type YES 255 255
The following example shows how to display the running configuration file on the standby CPU switch module:
sby-Switch# show redundancy running-config-file
!
version 12.1
no service pad
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
no service dhcp
!
hostname Switch
<Information deleted>
Reloading the CPU Switch Modules
To reload one or both of the CPU switch modules, use the following privileged EXEC commands on the active CPU switch module CLI:
Command Purposeredundancy reload peer
Reloads the standby CPU switch module.
redundancy reload shelf
Reloads both CPU switch modules in the shelf.
Example
The following example shows how to reload the standby CPU switch module:
Switch# redundancy reload peer
Reload peer [confirm] y
Preparing to reload peer
Configuring Privileged EXEC Mode Access on the Standby CPU Switch Module
Access to privileged EXEC mode from the standby CPU switch module CLI can be enabled from the active CPU switch module CLI. This feature provides extra security for the Cisco ONS 15530 system.
To configure access to privileged EXEC mode on the standby CPU switch module, perform the following steps on the active CPU switch module CLI, beginning in global configuration mode:
Example
The following example shows how to configure redundancy maintenance mode:
Switch(config)# redundancy
Switch(config-red)# standby privilege-mode enable
Displaying the Standby CPU Switch Module Privileged EXEC Mode Status
To display the privileged EXEC mode access status on the standby CPU switch module, use the following privileged EXEC command:
Example
The following example shows the privileged EXEC mode access status on the standby CPU switch module:
Switch# show redundancy summary
Redundant system information
----------------------------
Available Uptime: 15 hours, 27 minutes
sysUpTime (switchover clears): 15 hours, 27 minutes
Switchover Count: 0
Inter-CPU Communication State: DOWN
Last Restart Reason: Normal boot
Last Running Config sync: never
Running Config sync status: Disabled
Last Startup Config sync: never
Startup Config sync status: Disabled
This CPU is the Active CPU.
-------------------------------
Slot: 5
Time since CPU Initialized: 15 hours, 27 minutes
Image Version: ONS-15530 Software (ONS15530-I-M), Release 12.1(10)EV
Image File: ons15530-i-mz.evt
Software Redundancy State: ACTIVE
Hardware State: ACTIVE
Hardware Severity: 0
Peer CPU is the Standby CPU.
-------------------------------
Slot: 6
Time since CPU Initialized: Unknown, peer CPU not responding
Image Version: Unknown, peer CPU not responding
Image File (on sby-CPU): Unknown, peer CPU not responding
Software Redundancy State: DISABLED
Hardware State: NOT PLUGGED IN
Hardware Severity: 0
Privilege Mode: Enabled
About Preserving Counters on a CPU Switch Module Switchover
The Cisco ONS 15530 supports line card module traffic statistics and performance monitoring counters. The counters synchronize periodically from the primary CPU switch module to the standby CPU switch module enabling the system to preserve the statistics information across a CPU switch module switchover.
Performance monitoring counters for various encapsulations are preserved on the 2.5-Gbps transponder line cards.
Traffic statistics and performance monitoring counters are preserved on the following cards:
•ESCON aggregation card
•4-port 1-Gbps/2-Gbps FC aggregation card
•8-port GE/GC aggregation card
•2.5-Gbps ITU trunk card
•10-Gbps ITU trunk card
•10-Gbps ITU tunable trunk card
•10-Gbps uplink card
Table 3-4 lists the counters preserved over a CPU switch module switchover.
Configuring Counter Preservation
To configure counter preservation on the CPU switch module, perform the following steps from the active CPU switch module CLI, beginning in global configuration mode:
Example
The following example shows how to enable the preserving counters feature:
Switch (config)# redundancy
Switch (config-red)# auto-sync counters interface
Displaying the Counter Preservation Configuration
To display the counter preservation configuration on the CPU switch module, use the following command:
Example
The following example shows the counter preservation configuration on the CPU switch module:
Switch# show redundancy capability
Standby CPU capability support (not all fields shown)
Sby CPU CPU capability descriptio
--------------------------------- --------------------------------
48 MB CPU DRAM size
16 MB CPU PMEM size
512 KB CPU NVRAM size
16 MB CPU Bootflash size
Standby linecard driver major.minor versions, (driver count=14)
Sby CPU Drv/Ch/F ID Driver description
--------------------------- ----------- --------------------------
1.3 0x1100/0/0 CPU with Switch Fabric
2.3 0x1101/0/0 10 Port ESCON line card
2.1 0x110A/0/0 8 Port GE-FC line card
1.1 0x1111/0/0 4 Port 2x FC line card
3.1 0x1105/0/0 2.5G Transparent line car
1.9 0x1105/1/0 2.5G Transparent line car
3.1 0x1109/0/0 2.5G Transparent line car
1.9 0x1109/1/0 2.5G Transparent line car
1.3 0x1103/0/0 OSC line card
Sby CPU Drv/Ch/F ID Driver description
--------------------------- ----------- --------------------------
0.1 0x1107/1/0 OSC daughter card
2.1 0x1102/0/0 10G trunk card
1.0 0x110B/0/0 2.5G trunk card
2.1 0x1110/0/0 PSM wdm splitter
1.1 0x1100/0/1 ONS15530 Rommon
Software sync client versions, listed as version range X-Y.
X indicates the oldest peer version it can communicate with.
Y indicates the current sync client version.
Sby sync client count=9)
Sby CPU Cl ID Redundancy Client descrip
--------------------------------- ----- --------------------------
ver 1-2 17 CPU Redundancy
ver 1-1 19 Interface Sync
ver 1-1 36 MetOpt Password Sync
ver 1-1 109 MetOpt Counter Sync
ver 1-1 108 MetOpt Optical Cfg
ver 1-1 110 Metopt Crypto Sync
ver 1-2 18 Online Diagnostics
ver 1-2 6 OIR Client
ver 1-1 27 metopt cm db sync
Local backplane IDPROM
Backplane IDPROM field Local CPU
--------------------------------- --------------------------------
idversion 1
magic 153
card_type 4358
order_part_num_str PROTO-HAMPTON-CHASSIS
description_str Prototype Hampton Backplane
board_part_num_str 73-6573-03
board_revision_str 02
serial_number_str TBC055089
date_of_manufacture_str 10/21/2001
deviation_numbers_str N/A
manufacturing_use 0
rma_number_str
rma_failure_code_str
oem_str Cisco
clei_str TBD
snmp_oid_substr TBD
schematic_num_str 92-4568-03
hardware_major_version 3
Backplane IDPROM field Local CPU
--------------------------------- --------------------------------
hardware_minor_version 1
engineering_use_str LAB Prototype
crc16 52960
user_track_string hello PhyAlias test AssetTag123
diagst ^A
board_specific_revision 1
board_specific_magic_number 153
board_specific_length 56
mac_address_block_size 16
mac_address_base_str 00016447a240
cpu_number 0
optical_backplane_type 255
List of Configurable features and their current status:
Redundancy Client Feature Enabled/Disabled
----------------- ------- -----------------
MetOpt Counter Sync Counter Sync Enabled
Switch#
About the Software Configuration Register
The Cisco ONS 15530 uses a 16-bit software configuration register to set specific system parameters. Settings for the software configuration register are written into NVRAM (nonvolatile random access memory).
You can change the software configuration register settings for the following reasons:
•Force the system into the ROM monitor or boot ROM
•Select a boot source and default boot filename
•Enable or disable the break function
•Control broadcast addresses
•Set the console terminal baud rate
•Load operating software from Flash memory
•Enable booting from a TFTP server
•Recover a lost password
•Boot the system manually using the boot command at the bootstrap program prompt.
•Force the system to boot automatically from the system bootstrap software (boot image) or from its default system image in onboard Flash memory, using any boot system commands stored in the startup configuration file in NVRAM
Software Configuration Register Settings
Table 3-5 describes each of the software configuration register bits.
Caution To avoid confusion and possibly halting the system, remember that valid configuration register settings might be combinations of settings and not just the individual settings listed in Table 3-5. For example, the value of 0x0101 is a combination of settings (bit 8 is 0x0100 and bits 00 through 03 are 0x0001).
Bit 8 controls the console break function. Setting bit 8 (the factory default) causes the system to ignore the console break key. Clearing bit 8 causes the system to use the break key or break signal as a command to force the system into the bootstrap monitor (ROMMON), thereby halting normal operation. Regardless of the setting of the break enable bit, a break causes a return to the ROMMON during the first few seconds (approximately five seconds) of booting.
Bit 9 controls the secondary bootstrap program function. Setting bit 9 causes the system to use the secondary bootstrap. Clearing bit 9 (the factory default) causes the system to ignore the secondary bootstrap. The secondary bootstrap program is used for system debugging and diagnostics.
Bit 10 controls the host portion of the IP broadcast address. Setting bit 10 causes the system to use all zeros. Clearing bit 10 (the factory default) causes the system to use all ones. Bit 10 interacts with bit 14, which controls the network and subnet portions of the IP broadcast address.
Table 3-6 shows the combined effect of bits 14 and 10.
Table 3-6 Register Settings for Broadcast Address
Bit 14 Bit 10 Address (<net><host>)0
0
<ones><ones>
0
1
<ones><zeros>
1
0
<net><ones>
1
1
<net><zeros>
Bit 12 and bit 11 in the configuration register determine the data transmission rate of the console terminal. Table 3-7 shows the bit settings for the four available rates. The factory-set default data transmission rate is 9600.
Table 3-7 Settings for Console Terminal Transmission Rate
Bit 12 Bit 11 Baud Rate0
0
9600
0
1
4800
1
0
1200
1
1
2400
Bit 13 determines the system response to a bootload failure. Setting bit 13 (the factory default) causes the system to load operating software from bootflash memory after five unsuccessful attempts to load a boot file from the Flash memory device in slot 0. Clearing bit 13 causes the server to continue attempting to load a boot file from bootflash indefinitely.
Boot Field Values
The lowest four bits of the configuration register (bits 3, 2, 1, and 0) form the boot field. The order in which the system looks for system bootstrap information depends on the boot field setting in the configuration register.
Table 3-8 describes the values for the boot field.
Default System Boot Behavior
The factory default value for the configuration register on the Cisco ONS 15530 is 0x2102. When the system boots, the following occurs:
•The system attempts to load the system images specified in the boot system commands in the startup configuration file. If no boot system commands are configured, the system attempts to load the first system image stored on the Flash memory device in slot 0.
•The console Break key sequence, or break signal, is disabled and the system ignores it while rebooting.
Note Regardless of the setting of the break enable bit, a break causes a return to the ROMMON during the first few seconds (approximately five seconds) of booting.
•After five failed attempts to load a system image on the Flash memory device in slot 0, the system loads the first system image from Flash memory. If that attempt fails, the system stays in ROMMON mode.
Boot Command
You can enter only the boot command, or you can include additional boot instructions, such as the name of a file stored in Flash memory or a file that you specify for booting from a network server.
If you use the boot command without specifying a file or any other boot instructions, the system boots using the default system image (the first system image in onboard Flash memory). Otherwise, you can instruct the system to boot from a specific system image in Flash memory (using the boot filename command) or by sending a direct TFTP request to a specific server (using the boot filename ip-address command).
Changing the Software Configuration Register
To change the configuration register, perform the following steps:
Command PurposeStep 1
Switch#
configure terminal
Switch(config)#
Enters global configuration mode.
Step 2
Switch(config)# config-register value
Sets the contents of the configuration register. The value is a hexadecimal number preceded by 0x. See Table 3-5 for the list of values.
Note The new configuration register value takes effect at the next system reload.
Step 3
Switch(config)#
end
Switch#
Returns to privileged EXEC mode.
Step 4
Switch# reload
(Optional) Reloads the system using the new configuration register value.
Note The factory default value for the register is 0x2102.
Example
The following example shows how to configure the system to manually boot from the ROMMON prompt:
Switch# configuration terminal
Switch(config)# config-register 0x100
Switch(config)# end
Switch# reload
Verify the Configuration Register Value
To verify the configuration register value, use the following EXEC command:
Command PurposeSwitch# show version
Displays the current configuration register value. This value is used at the next system reload.
Example
The following example shows how to configure the system to examine the startup configuration file for boot system options:
Switch# show version
<Information deleted>
Configuration register is 0x2102 (will be 0x100 at next reload)
About Fan Failure Shutdown
The Cisco ONS 15530 fan assembly is located at the bottom of the chassis and contains six individual fans and a fan controller board. The controller board monitors the status of each fan and reports the status to the CPU switch modules.
If a single fan fails, a minor alarm is reported to the CPU switch module. However, the chassis never reaches a critical high temperature when only one fan fails.
If two or more fans fail, a major alarm is reported to the CPU switch module.
If all six fans in the fan tray fail, the chassis reaches critical temperature after 4 minutes.
To prevent damage to the cards and modules in the shelf when two or more fans fail, you can configure the system to automatically reset the following cards:
•ESCON aggregation cards
•8-port FC/GE aggregations cards
•2.5-Gbps ITU trunk cards
•10-Gbps ITU trunk cards
•Transponder line cards
In addition, the ITU lasers on the transponder line cards are powered off.
To recover from fan failure shutdown, you must power-cycle the shelf.
Caution Do not save the startup configuration file after the line cards shut down. This action would result in losing the previous startup configuration.
Caution The fan failure shutdown feature disrupts traffic on the shelf when two or more fans fail.
Configuring Fan Failure Shutdown
To configure the system to automatically shut down when two or more fans fail, use the following global configuration command:
Note The system starts powering off or resetting the transponder modules about 2 minutes after detecting that two or more fans have failed.
Example
The following example shows how to enable fan tray failure shutdown:
Switch(config)#
environment-monitor shutdown fanDisplaying the Fan Tray Failure Shutdown Configuration
To display the fan tray failure shutdown configuration, use the following EXEC command:
Example
The following example shows how to display the fan tray failure shutdown feature configuration:
Switch# show environment
Fan
---
Status: Total Failure
Line card shutdown on fan failure:enabled
Sensor Temperature Thresholds
(degree C) Minor Major Critcal Low
-------------------- ----------- ------------------------------------
Inlet Sensor 28 65 75 80 -15
Outlet Sensor 28 75 85 90 -15
Sensor Alarms
Min
Critical
-------------------- ------------------------
Inlet Sensor 0 0 0
Outlet Sensor 0 0 0
Power Entry Module 0 type DC status: OK
About Critical Temperature Shutdown
Cisco ONS 15530 utilizes the temperature sensor on its CPU switch module to detect abnormal temperature conditions during system operation. Thermal monitoring of chassis components provides early warning indications of possible component failure to ensure safe and reliable system operation and avoid network interruptions. The temperature sensor might trip in response to elevated ambient air temperature, a clogged air filter or other airflow blockage, or a combination of these causes.
The Cisco ONS 15530 system generates four types of alarms: critical, major, minor, and low. The following table provides the default threshold temperatures for these alarms:
Note You can override the default threshold temperatures by issuing the environment-monitor temperature-threshold command in the global configuration mode.
The Cisco ONS 15530 system automatically resets the following cards if the operating temperature exceeds the critical threshold:
•ESCON aggregation cards
•8-port FC/GE aggregations cards
•2.5-Gbps ITU trunk cards
•10-Gbps ITU trunk cards
•Transponder line cards
•Multirate cards
All the other cards will be shutdown if the operating temperature exceeds the critical threshold. In addition, the ITU lasers on the trunk cards will be powered off. Though possible, Cisco does not recommend that you disable this feature.
To recover from a shutdown, you must power-cycle the shelf.
Caution Do not save the startup configuration file after the line cards shut down. This action would result in losing the previous startup configuration.
Caution The shutdown feature disrupts traffic on the shelf when the operating temperature exceeds the critical temperature.
Configuring Critical Temperature Shutdown
To configure the system to automatically shut down when a critical alarm is generated, use the following global configuration command:
Command Purposeenvironment-monitor shutdown temperature slot/subslot/module
Enables system shutdown if the operating temperature exceeds the critical threshold temperature.
To change the default threshold temperatures, use the following global configuration command:
Command Purposeenvironment-monitor temperature-threshold {critical | major | minor | low} slot/subslot/module <threshold value>
Sets new1 threshold temperatures for the specified temperature sensor module.
1 If you do not specify the threshold temperature for an alarm (critical, major, minor, or low), the threshold will be reset to the default value. If you do not specify the temperature sensor module as well, the threshold temperature will be reset for all the temperature sensor modules.
To reset all thresholds for all temperature sensor modules, use the following global configuration command:
Command Purposeno environment-monitor temperature-threshold
Resets all thresholds to the default temperatures for all temperature sensor modules.
Example
The following example shows how to configure the critical threshold temperature:
Switch(config)#
environment-monitor temperature-threshold critical 6/0/0 65Displaying the Threshold Temperatures
To display the configured threshold temperatures, use the following EXEC command:
Example
The following example shows how to display the configured threshold temperatures:
Switch# show environment
Fan: OK
Line card shutdown on fan failure: disabled
Sensor Module Temperature Thresholds
(degree C) Minor Major Critcal Low
-------------------- ------ ----------- ------------------------------------
Sensor 6/0/0 34 35 45 55 -15
Sensor Module Version Alarms Shutdown
Minor Major Critical Mode
-------------------- ------ ------- ------------------------ --------
Sensor 6/0/0 A 0 0 0 Chassis
Power Supply 1 status: OK
Posted: Tue Feb 28 04:18:08 PST 2006
All contents are Copyright © 1992--2006 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.