Release Notes for Cisco IOS Release 12.0(10)W5(18c) Feature Pack for the Cisco Catalyst 8540 MSR
November 13, 2000
These release notes describe the Cisco IOS Release 12.0(10)W5(18c) feature pack for the Catalyst 8540 MSR ATM switch router.
Note You can find the most current Cisco IOS documentation on Cisco Connection Online
(CCO ). These electronic documents
may contain updates and modifications made after the hardcopy documents were printed.
For more information about CCO, refer to
"Cisco Connection Online"
section.
Contents
These release notes describe the following topics:
The following terms are used throughout this document:
FeatureNetworking functionality that supports network technology and hardware. For example: Double Authentication, IP Multicast over Token Ring, Voice Over IP, PPP over ATM, and so forth.
Feature SetA group of features. For example: IP, IP Plus, Enterprise Plus, IP IPSec 56, and so forth.
ImageSoftware code containing a Cisco IOS feature set. The image file nomenclature, such as c800-y6-mw, c1000-bnsy40-mz, and c2500-g-l, specifies a platform, feature set, and file compression method. For example, c4500-is56i-mz indicates:
Cisco 4500 platform: c4500.
IP Plus IPSec 56 feature set: is56i.
RAM compression method: mz.
Feature PackA small box containing hardcopy documentation and CDs that contain software images, applications and electronic documentation. Feature packs provide software upgrades for many of the Cisco hardware platforms.
Feature Pack Contents
Your feature pack contains:
A Software Feature Pack CD-ROM with the following software:
Cisco IOS feature set software images that can include bundled modem firmware
Router Software Loader (RSL) program (a Windows 95 application) that loads images onto your Catalyst 8540 MSR
Trivial File Transfer Protocol (TFTP) server application (for Windows 95 only).
Documentation CD-ROM that contains all Cisco documentation
Cisco Connection Online wallet card and sticker with service contact information
A sticker with your feature pack's product number.
Software license for using Cisco software in object code form on a single access server or router.
How to Use These Release Notes
The tables in these release notes contain details about the Cisco feature packs. Use these tables to perform the following tasks before loading a software image onto a router:
Table 1 Catalyst 8540 MSR Default Memory and Upgrade Options
Memory Type
Catalyst 8540 MSR Defaults
Upgrade Options
Flash memory
16 MB
MEM-ASP-FLC16M= MEM-ASP-FLC20M=
DRAM
256 MB
NONE
Hardware Supported
Cisco IOS Release 12.0(10)W5(18c) supports the Catalyst 8540 MSR switch router. The following table lists the supported ATM port adapters and modules:
Table 2 Catalyst 8540 MSR ATM and Layer 3 Port Adapters and Modules
Part Description
Part Number
Catalyst 8540 Layer 3 Interface Modules
Enhanced Gigabit Ethernet Interface Modules
Enhanced 2-port Gigabit Ethernet 16K
C85EGE-2X-16K
Enhanced 2-port Gigabit Ethernet 64K
C85EGE-2X-64K
Enhanced 2-port Gigabit Ethernet 256K
C85EGE-2X-256K
Gigabit Ethernet Interface Modules
8-port Gigabit Ethernet 64K
C85GE-8X-64K
2-port Gigabit Ethernet 16K
C85GE-2X-16K
2-port Gigabit Ethernet 64K
C85GE-2X-64K
2-port Gigabit Ethernet 16K with ACL
C85GE-2XACL-16K
2-port Gigabit Ethernet 64K with ACL
C85GE-2XACL-64K
Fast Ethernet Interface Modules
16 Port 10/100 UTP 16K
C85FE-16T-16K
16 Port 10/100 UTP 64K
C85FE-16T-64K
16 Port 10/100 UTP 16K with ACL
C85FE-16TACL-16K
16 Port 10/100 UTP 64K with ACL
C85FE-16TACL-64K
16-port 100-FX MT-RJ 16K
C85FE-16F-16K
16 Port 100-FX MT-RJ 64K
C85FE-16F-64K
16 Port 100-FX MT-RJ 16K with ACL
C85FE-16FACL-16K
16 Port 100-FX MT-RJ 64K with ACL
C85FE-16FACL-64K
Catalyst 8540 ATM Router Module
ATM Router Module 64K
C8540-ARM-64K
Catalyst 8540 ATM Interface Modules
2-port OC-48c/STM-16 SMF-LR
C85MS-2F-OC48LR
2-port OC-48c/STM-16 SMF-IR
C85MS-2F-OC48SS
1-port OC-48c/STM-16 SMF-LR+4-port OC-12 SMF
C85MS-1F4S-OC48LR
1-port OC-48c/STM-16 SMF-IR+4-port OC-12 SMF
C85MS-1F4S-OC48SS
1-port OC-48c/STM-16 SMF-IR+4-port OC-12 MMF
C85MS-1F4M-OC48SS
4-port OC-12c/STM-4 SMF
C85MS-4F-OC12SS
4-port OC-12c/STM-4 MMF
C85MS-4F-OC12MM
16-port OC-3c/STM-1 MMF
C85MS-16F-OC3MM
Catalyst 8540 POS
1-port POS OC-12c/STM-4 SMF-1R and 1-port Gigabit Ethernet 64K
C85-POSC12I-64K
1-port POS OC-12c/STM-4 SMF-1R and 1-port Gigabit Ethernet 256K
C85-POSC12I-256K
1-port POS OC-12c/STM-4 SMF-LR and 1-port Gigabit Ethernet 64K
C85-POSC12L-64K
1-port POS OC-12c/STM-4 SMF-LR and 1-port Gigabit Ethernet 256K
C85-POSC12L-256K
Catalyst 8540 Carrier Modules required for Port Adapters Modules (PAMs)
Carrier module for ATM port adapter modules
C85MS-SCAM-2P
Catalyst 8540 ATM Uplink (CSR Only)
1-port OC-3c/STM-1 MMF ATM Uplink and 1-port Gigabit Ethernet 64K
C85-10C3MGE-64K
1-port OC-3c/STM-1 SMF-IR ATM Uplink and 1-port Gigabit Ethernet 64K
C85-10C3SGE-64K
1-port OC-12c/STM-1 MMF ATM Uplink and 1-port Gigabit Ethernet 64K
C85-10C12MGE-64K
1-port OC-12c/STM-1 MMF ATM Uplink and 1-port Gigabit Ethernet 256K
C85-10C12MGE-256K
1-port OC-12c/STM-1 SMF-IR ATM Uplink and 1-port Gigabit Ethernet 64K
C85-10C12SGE-64K
1-port OC-12c/STM-1 SMF-IR ATM Uplink and 1-port Gigabit Ethernet 256K
C85-10C12SGE-256K
Catalyst 8540 Port Adapter Modules
Voice Port Adapters
4-port T1 (circuit emulation) with RJ-48 interface
WAI-T1C-4RJ48
4-port E1 (circuit emulation) with RJ-48 interface
WAI-E1C-4RJ48
4-port E1 (circuit emulation) with BNC interface
WAI-E1C-4BNC
Frame Relay Port Adapters
1-port Channelized DS3 Frame Relay
C85MS-1DS3-FRBNC
4-port Channelized E1 Frame Relay
C85MS-4E1-FRRJ48
ATM Port Adapters
1-port STS-12c/STM-4c SM LR
WAI-OC12-1SSLR
1-port STS-12c/STM-4c SM
WAI-OC12-1SS
1-port STS-12c/STM-4c MMF
WAI-OC12-1MM
4-port STS-3c/STM-1 single-mode (SM) long reach (LR)
WAI-OC3-4SSLR
4-port STS-3c/STM-1 SMF
WAI-OC3-4SS
OC-3 mix PAM, 1-port SM IR and 3-port MM ports
WAI-OC3-1S3M
4-port STS-3c/STM-1 MMF
WAI-OC3-4MM
4-port STS-3c/STM-1 UTP-5
WAI-OC3-4U5
4-port DS3
WAI-T3-4BNC
4-port E3 coaxial cable with BNC interface
WAI-E3-4BNC
8-port TI IMA
C85MS-8T1-IMA
8-port E1 120 ohm IMA
C85MS-8E1-IMA-120
4-port T1 (ATM) with RJ-48 interface
WAI-T1-4RJ48
4-port E1 (ATM) with RJ-48 interface
WAI-E1-4RJ48
4-port E1 (ATM) with BNC interface
WAI-E1-4BNC
Frame Relay Port Adapters
1-port Channelized DS3 Frame Relay
C85MS-1DS3-FRBNC
4-port Channelized E1 Frame Relay
C85MS-4E1-FRRJ48
Software Compatibility
The feature pack described in this release note contains Cisco IOS Release 12.0(10)W5(18c) software images, some images from previous software releases, and Router Software Loader (RSL) Version 7.10.
Determining Your Software Release
To determine the version of Cisco IOS software running on your Catalyst 8540 MSR, log in to the Catalyst 8540 MSR, and enter the show version user EXEC command.
router> show version
Cisco Internetwork Operating System Software
IOS (tm) PNNI Software (cat8540m-WP-M), Version 12.0(10)W5(18c)SOFTWARE
20480K bytes of Flash PCMCIA card at slot 0 (Sector size 128K).
8192K bytes of Flash internal SIMM (Sector size 256K).
Secondary is up
Secondary has 0K bytes of memory.
Configuration register is 0x0
router>
Product Numbers Quick-Reference List
Table 3 Feature Pack Product Numbers Quick Reference List
Product Number
Feature Pack Description
CD854R2-12.0.10W=
Catalyst 8540 Integrated ATM and Layer 3 feature set
Feature Pack Overview Table
Table 4 Catalyst 8540 MSR Feature Packs
Product Number
CD-ROM Title
Image Name(s)
Recommended Memory
UNIX
DOS
Flash
Main
CD854R2-12.0.10W=
Catalyst 8540 Integrated ATM and Layer 3 feature set
Cisco IOS release 12.0(10)W5(18c)
cat8540m-wp-mz.120-10.W5.18c.bin
aaa1587
16 MB
256 MB
Feature Set Tables
The Cisco IOS software is packaged in feature sets consisting of software imagesdepending on the Catalyst 8540 MSR. Each feature set contains a specific set of Cisco IOS features.
Table 5 lists the features and feature sets supported by the Catalyst 8540 MSR in Cisco IOS Release 12.0(10)W5(18c).
Note This feature set table contains only a selected list of features. This table is not a cumulative
or complete list of all the features in each image.
Table 5 Feature Set Supported by the Catalyst 8540 MSR
Feature Set
Left-justified E.164 AFI support
SNMP1
Asynchronous support
PPP2 (SLIP3/PPP)
IP4
NTP5
TACACS+6
Telnet
Point-to-point and point-to-multipoint permanent VCCs7 and VPCs8
Point-to-point and point-to-multipoint switched VCCs and VPCs (UNI9 3.0)
Point-to-point and point-to-multipoint switched VCCs and VPCs (UNI 3.1)
Point-to-point and point-to-multipoint switched VCCs and VPCs (UNI 4.0)
Multipoint-to-point UNI signaling
Soft VCCs and VPCs
VP tunneling
VPI/VCI range support in ILMI 4.0
PNNI hierarchy
ILMI10 version 4.0
IISP11
LANE12 client (LEC13) and LANE services (LES14/BUS15/LECS16) on Route Processor
ATM ARP17 server on Route Processor
ATM ARP client on Route Processor
ATM tag switch router (TSR)
Port snooping
OAM18 F4 and F5
E.164 address translation
E.164 autoconversion
Circuit emulation
ATM access lists
ATM accounting
ATM RMON19
Multiple, weighted, dynamic thresholds for selective packet marking and discard
Shaped VP tunnels for CBR20 traffic
Substitution of other service categories in shaped VP tunnels
Dual leaky bucket policing
Scheduler/Service Class/PVC configuration
Logical multicast support (up to 254 leaves per output port, per point-to-multipoint VC)
Network clocking enhancements for smooth switchover
Per-VC or per-VP nondisruptive snooping
Support for non-zero MCR21 on ABR22 connections
Access lists on ILMI registration
CUGs
ATM soft restart
ATM accounting enhancements
CISCO-SYSLOG-MIB support
CISCO-CONFIG-COPY-MIB support
Signaling diagnostics and MIB23
Supplemental AToM MIB
E1 Frame Relay Port Adapter
Frame Relay to ATM Interworking Features on the Channelized E1 Port Adapter
Hierarchical VP tunnels
Remote logging for accounting
Tag switching VC-merge on non-UBR24 VP tunnels and hierarchical VP tunnels
PNNI complex node representation
Support for ATM-Fabric Integration Module in Catalyst 5500
PNNI explicit paths
PNNI alternate link selection
Tag switching CoS
Network Clock Distribution Protocol
Simple Gateway Control Protocol
Switch redundancy
CPU redundancy: PVP/PVC/VP tunnel preservation
12-bit VPI
ATM Router Module
ATM overbooking
Framing overhead
ATM End System Address (AESA) gateway
Online insertion and removal support for 8-port Gigabit Ethernet interface modules
Route processor switchover support for 8-port Gigabit Ethernet interface modules
Appletalk support for 8-port Gigabit Ethernet interface modules
RFC 1483 support on the ATM router modules
RFC 1577 support on the ATM router modules
Layer 2 Bridging Features
Layer 2 transparent bridging
Layer 2 MAC learning, aging, and switching by hardware
Spanning-Tree Protocol (IEEE 802.1d) support per bridge group
Support for a maximum of 64 active bridge groups
Integrated routing and bridging (IRB) mode support
Virtual LAN (VLAN) Features
Inter-Switch Link (ISL)-based VLAN trunking
802.1Q-based VLAN routing
Note Untagged packets arriving on a native VLAN are handled by the CPU, rather
than the microcode.
Layer 3 Routing, Switching, and Forwarding Features
IP, IPX, and IP multicast routing and forwarding between Ethernet ports
AppleTalk 1 and 2 routing
CMF (constrained multicast flooding)
Up to 128 IP multicast groups
QoS-based forwarding based on IP precedence-based forwarding
Load balancing among equal-cost paths based on source and destination IP and IPX addresses
Image Installation Tips and Troubleshooting When Using RSL
Image Installation Tips
The following information about RSL operations can help you with the installation process:
If you are loading software on a preconfigured Catalyst 8540 MSR, save the configuration file on your PC before running RSL.
If you have added any static entries to the PC Address Resolution Protocol (ARP) table, one or more of them might be deleted by RSL. Manually reenter any deleted entries in the PC ARP table.
During a connection, if the Catalyst 8540 MSR running configuration is not the same as its startup configuration, the exact configuration is not restored. Any changes that you made since the last time you entered copy running-config startup-config or write memory commands are lost.
RSL restores the Catalyst 8540 MSR startup configuration, but some running configuration commands are not restored. To restore the exact running configuration, reboot the router. The following interface configuration commands are not restored to the running configuration:
no shutdown
no ringspeed
media-type aui
Recovering from a Connection Error
If any of the following elements apply to your installation, modify the Short Timeout value from the Options dialog box in RSL:
You are connecting to a Catalyst 8540 MSR that has a large configuration file.
You see the following error message:
"Failed to configure the router to enable the Cisco IOS software image and configuration file upload and download operations. You may want to check the router to make sure that the selected interface exists."
If you are connecting to any other router or access server, increase the Short Timeout to a value over 25 seconds.
Note If you change the timeout value, you must do so before connecting to the Catalyst 8540
MSR, or the new value will not be used. Also, increasing the Short Timeout value can
increase the time it takes for RSL to connect to the target Catalyst 8540 MSR.
Restoring the Startup Configuration
In some cases, RSL is unable to restore the startup configuration. If this happens, follow these steps:
Step 1 Ensure that all cables are properly attached to both the Catalyst 8540 MSR and the PC.
Step 2 Restart RSL and connect by using the Preconfigured router option.
Step 3 When asked if you want to overwrite the existing startup configuration file, choose no.
Step 4 When asked if you want to continue, choose yes.
Step 5 When the Catalyst 8540 MSR is connected, select Download Router Configuration in the Router Software Loader dialog box.
Step 6 Select the appropriate file and click the radio button beside Copy configuration to the router nonvolatile memory. The Catalyst 8540 MSR should now contain the startup configuration it had before the initial RSL connection.
Step 7 Exit RSL.
Note In the steps above, the Catalyst 8540 MSR configuration register (config-register 0xnnnn)
is not restored.
Note If you press Ctrl-Alt-Delete to quit RSL, the router configuration and the configuration
register are not restored. However, the configuration file is not deleted from the PC. To
restore the configuration file, follow the steps above, beginning with
Step 2.
Alternatives to RSL
RSL is designed to work with a PC running Microsoft Windows 95 and is the recommended method for downloading software to the Catalyst 8540 MSR; however, two alternatives are available for installing router software:
Note The sample prompts and output shown in the following sections might not be identical to
the prompts displayed on the Catalyst 8540 MSR console.
Installing the Router Software by Using a TFTP Server Application
This section explains how to install the Cisco IOS software onto Cisco Catalyst 8540 MSR using a Trivial File Transfer Protocol (TFTP) server or remote copy protocol (rcp) server application. Because TFTP and rcp require familiarity with the Cisco IOS command-line interface, we recommend using the Router Software Loader (RSL) application on your software feature pack CD-ROM whenever possible.
Note You can use the TFTP application with Windows, Macintosh, or UNIX systems; however,
you can use the TFTP server included on this software feature-pack CD-ROM only with a
PC running Windows 95. For other operating systems, you can find a number of TFTP or
rcp applications from independent software vendors or as shareware from public sources
on the World Wide Web.
Step 1 To install the TFTP server, run the downloaded self-extracting, executable file found on the feature pack CD-ROM for Microsoft Windows 95 only, and then follow the installation instructions.
Note We recommend that you back up the router configuration before upgrading the router
software.
Step 2 Start the TFTP server application by either clicking the CiscoTFTP Server icon on your desktop or choosing Programs from the Start menu and then selecting CiscoTFTP server.
Step 3 Set up the TFTP server root directory to be the location for the image files. From the menu bar, select View and then Options.
Step 4 In the TFTP server root directory field, click Browse to locate the directory that contains the files to copy to the Cisco Catalyst 8540 MSR. From the Browse for the TFTP Server Root Directory window, select a root directory and click OK.
Step 5 In the Options window, click OK.
Step 6 Complete the file transfer by using the Cisco IOS Planner to determine the image to load and the memory requirements for that image. Access the Cisco IOS Planner by going to the Cisco homepage (www.cisco.com) and logging in, then clicking Software Center under the Service & Support heading. You should arrive at the Technical Assistance Center (TAC). Click Cisco IOS Software, then scroll down to the bottom of the Cisco IOS Software page, and click the Upgrade Planner link. You should see Cisco IOS Planner at the top of the page.
Step 7 Select your Platform, Release, and SoftwareFeature to load onto the Catalyst 8540 MSR. You should see the Minimum Recommended Memory to download the image below the table.
Installation Procedure for Flash Images
Note If installing from RAM images, proceed to "Installation Procedure for RAM Images."
Note For rcp applications, substitute rcp for every occurrence of TFTP. For example, use "copy
rcp flash" instead of "copy tftp flash."
Step 1 To determine the amount of memory currently running on your Catalyst 8540 MSR, use the command show version on your router. Write down the configuration register value displayed in the last line of output from the command show version. Save this data to use in Step 7. The amount of memory appears just above the configuration register value.
The following example shows the output from the command show version:
router>show version
Cisco Internetwork Operating System Software
IOS (tm) 2500 Software (C2500-JS-L), Version 11.3(3), RELEASE SOFTWARE (fc1)
ROM: System Bootstrap, Version 5.2(8a), RELEASE SOFTWARE
BOOTFLASH: 3000 Bootstrap Software (IGS-RXBOOT), Version 10.2(8a), RELEASE SOFTW
ARE (fc1)
dunk1 uptime is 3 days, 7 hours, 46 minutes
System restarted by reload
System image file is "flash:c2500-js-l_113-3.exe", booted via flash
cisco 2500 (68030) processor (revision D) with 8192K/2048K bytes of memory.
Processor board ID 02315592, with hardware revision 00000000
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
1 Ethernet/IEEE 802.3 interface(s)
1 Token Ring/IEEE 802.5 interface(s)
2 Serial network interface(s)
32K bytes of non-volatile configuration memory.
16384K bytes of processor board System flash (Read ONLY)
Configuration register is 0x2102
Step 2 If your TFTP server or the workstation where you start your Telnet session are not in the same network as the router, add the default gateway.
Knowing if the TFTP Server and the Router Are in the Same Network
Compare the IP address with the mask on the TFTP server and the mask on the Ethernet interface of the router. If you can ping the TFTP server's IP address from the router, they are in the same network.
Example:
case 1:
Tftp server ip add. 172.17.247.195 mask 255.255.0.0
Interface ethernet 0 of the router ip add. 172.17.3.192 mask 255.255.0.0
case 2:
Tftp server ip add. 172.17.247.195 mask 255.255.0.0
Interface ethernet 0 of the router ip add. 172.10.3.192 mask 255.255.0.0
In case 1, a default gateway is not required because the TFTP server and this interface of the router are in the same network. In case 2, it is necessary to configure a default gateway on the router, because the TFTP server and router are in different IP networks.
Adding the Default Gateway in the Configuration
Once you know the IP address of the default gateway, use the IP default-gateway command from global configuration mode:
ip default-gateway 172.17.247.190
Determining the IP Address and Mask on the Router
Look for the IP address command under the interface Ethernet in your configuration.
Example:
Router>en
Password:
Router#sh run
Building configuration...
Current configuration:
!
version 11.3
service timestamps debug uptime
...................
interface Ethernet0
ip address 172.17.3.192 255.255.0.0
Determining the IP Address of the TFTP Server (for Windows 95)
Select Start from the toolbar, then select Run. Enter winipcfg and then click ok to display the IP configuration dialog box.
Determining the IP Address of the TFTP Server (for UNIX stations)
Enter the command netstat -in. The IP addresses of the interfaces on your station should appear. Select the one that goes into the router network.
Determining the Default Gateway for the Router
The default gateway is always the next hop that any packet crosses to reach the workstation where you have the TFTP server or the Telnet session source or both. The traceroute command will show the IP address of the default gateway in the first line of the output.
Example:
Router>traceroute 172.17.247.195
Type escape sequence to abort.
Tracing the route to 172.17.247.195
172.17.247.190 4 msec 4 msec 4 msec
2 172.17.247.195 4 msec * 0 msec
Router>
Configuring to Cross a Frame-Relay Link to Reach the TFTP Server
First, consider the remote end of the frame-relay link as the default gateway. Then, add a frame-relaymap IP statement in the configuration with the IP address of that remote end and the dlci number needed to reach it.
Step 3 Verify that the selected Platform, Release, and Software Feature are correct by logging onto the Cisco homepage, then clicking Software Center under Service & Support. Next click Cisco IOS Software, then click the Upgrade Planner link.
Step 4 Establish a direct console session or virtual Telnet connection to the Catalyst 8540 MSR.
To prevent losing a Telnet connection during the reboot phase of this software installation (Step 11), use a direct console connection between the Catalyst 8540 MSR console port and the PC COM port.
Step 5 Launch the hyperterminal on the PC, using the following settings:
Speed 9600 bits per second
8 databits
0 parity bits
1 stop bit
No Flow Control
Step 6 To launch the Catalyst 8540 MSR into Rxboot mode, change the configuration register to the value 0x2101 as follows:
Router> enable
Password: <password>
Router#
Router# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# config-register 0x2101
Router(config)# ^Z
Router#
%SYS-5-CONFIG_I: Configured from console by console
Router# wr mem
Building configuration...
[OK]
Router#
Router# reload
Note If connected by Telnet and you lose the session following the reload, try again after a few
minutes.
Step 7 Use the following sequence of commands to restore the previous configuration register value for the next reload. Replace the asterisks (****) with the configuration register value you recorded in Step 1 of this section:
Router(boot) >
Router(boot) > en
Password: <password>
Router(boot)# conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(boot)(config)# con
Router(boot)(config)# config-register 0x****
Router(boot)(config)# ^Z
Caution Do not save anything while in boot mode. Avoid using the save commands (write mem or copy run start), and answer no to any question that suggests saving your current configuration. If you save data while in this mode, you can partially or completely erase your configuration.
The following example shows how to avoid using save commands:
router(boot)#reload
*Mar 1 00:30:49.972: %SYS-5-CONFIG_I: Configured from console by console
System configuration has been modified. Save? [yes/no]: NO
Note If you did not keep a copy of the configuration register in
Step 4, use 0x2102 in the
following step.
Step 8 Verify that the IP addresses of the TFTP server and the Catalyst 8540 MSR targeted for the TFTP software upgrade are in the same range. To do this, ping the TFTP server.
Step 9 Ping the Catalyst 8540 MSR from the TFTP server to verify that a network connection exists between them. See Step 2 in this section for detailed information on how to verify a network connection.
Caution Cisco recommends that you keep a copy of the Catalyst 8540 MSR configuration before upgrading the Catalyst 8540 MSR software. At prompt, type copy startup tftp, then the host name or address of TFTP server.
Step 10 Copy the new software image from the TFTP server to the Catalyst 8540 MSR.
Router> enable
Password: <password>
Router#
Router# copy tftp flash
Step 11 Enter the IP address of the TFTP server as in the following example:
Address or name of remote host [255.255.255.255]? 172.17.247.195
Step 12 Enter the filename of the Cisco IOS software image that you will install, as in the following example:
Source file name? c1600-y-l.112-18.P
Note The image name varies depending on the file name of the image on the TFTP server.
Step 13 Specify the destination image filename.
This is the name that you call the new software image once loaded onto the Catalyst 8540 MSR. You can name the image anything. Common practice uses the UNIX image filename.
Destination file name [c1600-y-l.112-18.P]? c1600-y-l.112-18.P
Step 14 Enter yes to erase the existing software image in the Catalyst 8540 MSR Flash memory before copying the new one. Or, enter no to keep the existing software image. Verify that you have enough memory to keep both.
Erase flash device before writing? [confirm] yes/no
The copying process takes several minutes; the time differs from network to network. During the transfer process, a list of the access files is displayed.
The exclamation point (!) indicates that the copy process is taking place. Each exclamation point (!) indicates that ten packets were transferred successfully.
A checksum verification of the image occurs after the image is written to Flash memory. The Catalyst 8540 MSR reloads itself with the new image when the software upgrade is complete.
What to Check if I See "Text checksum verification failure" During the Copy
If you have seen many "." instead of "!" during the copy, you may have a message similar to the one shown below:
If you issue a show flash command, you see something similar to the example below:
router#sh flash
PCMCIA flash directory:
File Length Name/status
1 3437967 c1600-sy-mz.120-8.0.2.T
2 3489036 c1600-y-l.112-19.P1
3 290304 c1600-y-l.112-18.P [invalid checksum]
In both cases, a checksum failure indicates that the file has not been properly copied into the memory. Copy it again. Make sure that the file in the TFTP server is the same size as in the location where you got it.
Sometimes, you will see this behavior when the network is busy. Try again when the network is less busy, or try to establish a direct Ethernet connection between the TFTP server and the router to download the file.
What to Check if You Have the Error Message "error opening TFTP"
If you get the following problem, verify that the file is in the root directory of the TFTP server, and check again that you entered the correct filename. Be careful with I (capital i), l (small L), and 1(one) that could be mistaken. The example below shows the error message that you might see:
%Error opening tftp://172.17.0.5/rsp-dsv-mz.112-19.P1.bin (No such file or directory)
What to Check if You See a "Timeout" Error Message
Verify that the TFTP server is open on your PC. Make sure that the file is in the root directory by going to the menu bar and selecting View, then Options.
What to Check if You See the Error Message "can't open file"
Verify that the TFTP server is running on your computer. Make sure that you have copied the exact filename. Especially be careful with I (capital i), l (small L), and 1 (one) that could be mistaken.
Caution Do not save anything while in boot mode. Avoid using the save commands (write mem or copy run start), and answer no to any question that suggests saving your current configuration. If you save data while in this mode, you can partially or completely erase your configuration. See Step 7 for an example.
Step 15 Before reloading, verify that the image is properly installed in Flash memory and that the Boot system commands point to the proper file to load. Then type the following commands:
Router(boot)# reload
*Mar 1 00:30:49.972: %SYS-5-CONFIG_I: Configured from console by consoled
System configuration has been modified. Save? [yes/no]: no
Proceed with reload? [confirm] yes
Verify That You Stored the New Cisco IOS Image Properly
Use the command show flash to verify that you saved the file, that the size is correct, and that you don't have an invalid checksum. If the file does not appear, or if it appears followed by "[invalid checksum]", or if the size doesn't correspond to the file size on the TFTP server, you will need to start the procedure again. Go back to Step 1 in this section.
Tip Be aware that the router uses bytes and some TFTP servers use Kilobytes.
Verify That the Boot System Commands Are in the Right Order in the Configuration
The router stores and executes the boot system commands in the configuration file in the order that you enter them. If a boot system command entry in the list specifies an invalid device or filename, the router skips that entry.
Example:
router>en
Password:
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
Router(config)#boot system flash c1600-y-l.112-18.P
Router(config)#boot system flash
Step 16 After the reload is complete, use the command show version to verify that the Catalyst 8540 MSR is now running with the desired Cisco IOS image. An example of the show version command follows:
Router>sh ver
Cisco Internetwork Operating System Software
IOS (tm) 1600 Software (C1600-Y-L), Version 11.2(18)P, RELEASE SOFTWARE (fc1)
ROM: System Bootstrap, Version 11.1(7)AX [kuong (7)AX], EARLY DEPLOYMENT RELEASE
SOFTWARE (fc2)
ROM: 1600 Software (C1600-BOOT-R), Version 11.1(7)AX, EARLY DEPLOYMENT RELEASE S
OFTWARE (fc2)
riou uptime is 9 minutes
System restarted by reload
System image file is "flash:c1600-y-l.112-18.P", booted via flash
cisco 1603 (68360) processor (revision C) with 13824K/4608K bytes of memory.
Processor board ID 05317740, with hardware revision 00000000
Bridging software.
X.25 software, Version 2.0, NET2, BFE and GOSIP compliant.
Basic Rate ISDN software, Version 1.0.
1 Ethernet/IEEE 802.3 interface(s)
1 serial(sync/async) network interface(s)
1 ISDN Basic Rate interface(s)
System/IO memory with parity disabled
2048K bytes of DRAM onboard 16384K bytes of DRAM on SIMM
System running from FLASH
8K bytes of non-volatile configuration memory.
12288K bytes of processor board PCMCIA flash (Read ONLY)
Router>
Installation Procedure for RAM Images
Step 1 Verify that the IP addresses of the TFTP server and the Catalyst 8540 MSR targeted for the TFTP software upgrade are in the same range. To do this, ping the TFTP server.
Step 2 Ping the Catalyst 8540 MSR from the TFTP server to verify that a network connection exists between them. See Step 2 in the "Installation Procedure for Flash Images" section for detailed information on how to verify a network connection.
Step 3 Copy the new software image from the TFTP server to the Catalyst 8540 MSR:
Router> enable
Password: <password>
Router#
Router# copy tftp flash
Caution Cisco recommends that you keep a copy of the Catalyst 8540 MSR configuration before upgrading the Catalyst 8540 MSR software. At prompt, type copy startup tftp, then the host name or address of the TFTP server.
Copying a System Image From One Device to Another
Here is a list of the possibilities (these may vary depending on your platform):
Router#copy tftp ?
bootflash: Copy to bootflash: file system
disk0: Copy to disk0: file system
disk1: Copy to disk1: file system
flash: Copy to flash: file system
ftp: Copy to ftp: file system
lex: Copy to lex: file system
null: Copy to null: file system
nvram: Copy to nvram: file system
rcp: Copy to rcp: file system
running-config: Update (merge with) current system configuration
slot0: Copy to slot0: file system
slot1: Copy to slot1: file system
startup-config Copy to startup configuration
system: Copy to system: file system
tftp: Copy to tftp: file system
Below you can find the three most common system images and a detailed example:
copy tftp flash
copy rcp flash
copy slot0: slot1:
Detailed example:
router#sh slot0
-#- ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name
Step 4 Enter the IP address of the TFTP server as in the following example:
Address or name of remote host [255.255.255.255]? 172.16.1.1
Step 5 Enter the filename of the Cisco IOS software image that you will install, as in the following example: Source file name? c2500-js-l_113-3.bin
Note The image name varies depending on the filename of the image on the TFTP server.
Step 6 Specify the destination image filename.
This is the name that you call the new software image once it is loaded onto the Catalyst 8540 MSR. You can name the image anything. Common practice is to use the UNIX image filename.
Destination file name [c2500-js-l_113-3.bin]? c2500-js-l_113-3.bin
Step 7 Enter yes to erase the existing software image in the Catalyst 8540 MSR Flash memory before copying the new one. Or, enter no to keep the existing software image. Verify that you have enough memory to keep both.
Erase flash device before writing? [confirm] yes/no
The copying process takes several minutes; the time differs from network to network. During the transfer process, a list of the access files is displayed.
The exclamation point (!) indicates that the copy process is taking place. Each exclamation point (!) indicates that ten packets were transferred successfully.
A checksum verification of the image occurs after the image is written to Flash memory. The Catalyst 8540 MSR reloads itself with the new image when the software upgrade is complete.
What to Check if You See "Text checksum verification failure" During the Copy
If you have seen many "." instead of "!" during the copy, you may have a message similar to the one shown below:
If you do a "show flash," you see something similar to the example below:
router#sh flash
PCMCIA flash directory:
File Length Name/status
1 3437967 c1600-sy-mz.120-8.0.2.T
2 3489036 c1600-y-l.112-19.P1
3 290304 c1600-y-l.112-18.P [invalid checksum]
In both cases, a checksum failure indicates that the file has not been properly copied into the memory. Copy it again. Make sure that the file in the TFTP server is the same size as in the location where you got it.
Sometimes, you will see this behavior when the network is busy. Try again when the network is less busy, or try to establish a direct ethernet connection between the TFTP server and the router to download the file.
What to Check if You Have the Error Message "error opening TFTP"
If you get the following error message, verify that the file is in the root directory of the TFTP server, and check again that you entered the correct filename. Be careful with I (capital i), l (small L), and 1(one) that could be mistaken. The example below shows the error message that you might see:
%Error opening tftp://172.17.0.5/rsp-dsv-mz.112-19.P1.bin (No such file or directory)
What to Check if You See a "Timeout" Error Message
Verify that the TFTP server is open on your PC. Make sure that the file is in the root directory by going to the menu bar and selecting View, then Options.
What to Check if You See the Error Message "can't open file"
Verify that the TFTP server is running on your computer. Make sure that you have copied the exact filename. Be careful with I (capital i), l (small L), and 1 (one) that could be mistaken.
After you complete the reload, the router should run the desired Cisco IOS image. Use the show version command to verify that the image is there. See Step 7 for detailed instructions on how to verify if the Cisco IOS image is stored properly and if the boot systemcommands are set correctly.
Caution Do not save anything while in boot mode. Avoid using the save commands (write mem or copy run start), and answer no to any question that suggests saving your current configuration. If you save data while in this mode, you can partially or completely erase your configuration. See Step 7 for an example.
Step 8 Before reloading, verify that the image is properly installed in Flash memory and that the Boot system commands point to the proper file to load. Then type the following commands:
Router(boot)# reload
*Mar 1 00:30:49.972: %SYS-5-CONFIG_I: Configured from console by consoled
System configuration has been modified. Save? [yes/no]: no
Proceed with reload? [confirm] yes
Verify That You Stored the New Cisco IOS Image Properly
Use the command show flash to verify that you saved the file, that the size is correct, and that you don't have an invalid checksum. If the file does not appear, or if it appears followed by "[invalid checksum]", or if the size doesn't correspond to the file size on the TFTP server, you will need to start the procedure again. Go back to Step 1 in this section.
Tip Be aware that the router uses bytes and some TFTP servers use Kilobytes.
Verify That the Boot System Commands Are in the Right Order in the Configuration
The router stores and executes the boot system commands in the configuration file in the order that you enter them. If a boot system command entry in the list specifies an invalid device or filename, the router skips that entry.
Example:
router>en
Password:
Router#conf t
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
Router(config)#boot system flash c1600-y-l.112-18.P
Router(config)#boot system flash
Step 9 After the reload is complete, use the command show version to verify that the <<router/access server>> is now running with the desired Cisco IOS image. An example of the show version command follows:
Router>sh ver
Cisco Internetwork Operating System Software
IOS (tm) 1600 Software (C1600-Y-L), Version 11.2(18)P, RELEASE SOFTWARE (fc1)
Loading c2500-js-l_113-3.exe from 171.71.93.192 (via Ethernet0): !!!!!!!!!!!!!!!
<...snip...>
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
[OK - 8900924/16777216 bytes]
Verifying checksum... OK (0x8ABE)
Flash copy took 0:04:57 [hh:mm:ss]
%FLH: Re-booting system after download
Related Documentation
The following sections describe the documentation available for the Catalyst 8540 MSR. These documents consist of hardware and software installation guides, Cisco IOS configuration and command references, system error messages, feature modules, and other documents.
Documentation is available as printed manuals or electronic documents, except for feature modules, which are available online on CCO and the Documentation CD-ROM only.
Use these release notes with the documents listed in the following sections:
Feature modules describe new features supported by Release 12.0(10)W5(18c) and are updates to the Cisco IOS documentation set. A feature module consists of a brief overview of the feature, benefits, configuration tasks, and a command reference. As updates, the features modules are available online only. Feature module information is incorporated in the next printing of the Cisco IOS documentation set.
The Cisco IOS software documentation set consists of the Cisco IOS configuration guides, Cisco IOS command references, and several other supporting documents, which are shipped with your order in electronic form on the Documentation CD-ROMunless you specifically ordered the printed versions.
Documentation Modules
Each module in the Cisco IOS documentation set consists of two books: a configuration guide and a corresponding command reference. Chapters in a configuration guide describe protocols, configuration tasks, Cisco IOS software functionality, and contain comprehensive configuration examples. Chapters in a command reference provide complete command syntax information. Use each configuration guide with its corresponding command reference.
Table 5 describes the contents of the Cisco IOS Release 12.0 software documentation set, which is available in electronic form and also in printed form upon request.
Note You can find the most current Cisco IOS documentation on CCO and the Documentation
CD-ROM. These electronic documents might contain updates and modifications made
after the paper documents were printed.
You can access the Cisco IOS documentation set on CCO at:
Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.
Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).
Obtaining Technical Assistance
Cisco provides Cisco Connection Online (CCO) as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed documents, or by sending mail to Cisco.
Cisco Connection Online
Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.
CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.
Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.
Modem using standard connection rates and the following terminal settings: VT100 emulation; 8 data bits; no parity; and 1 stop bit.
From North America, call 408 526-8070
From Europe, call 33 1 64 46 40 82
You can e-mail questions about using CCO to cco-team@cisco.com.
Technical Assistance Center
The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.
To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.
This URL is subject to change without notice. If it changes, point your Web browser to CCO, press Login, and click on this path: Technical Assistance Center: Technical Tips.
The following sections are provided from the Technical Tips page:
Access Dial CookbookContains common configurations or recipes for configuring various access routes and dial technologies.
Field NoticesNotifies you of any critical issues regarding Cisco products and includes problem descriptions, safety or security issues, and hardware defects.
Frequently Asked QuestionsDescribes the most frequently asked technical questions about Cisco hardware and software.
HardwareProvides technical tips related to specific hardware platforms.
Hot TipsDescribes popular tips and hints gathered from the Cisco Technical Assistance Center (TAC). Most of these documents are available from the TAC Fax-on-demand service. To reach Fax-on-demand and receive documents at your fax machine from the United States, call 888 50-CISCO (888 502-4726). From other areas, call 650 596-4408.
Internetworking FeaturesLists tips on using Cisco IOS software features and services.
Sample ConfigurationsProvides actual configuration examples that are complete with topology and annotations.
Documentation Feedback
If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.
You can e-mail your comments to bug-doc@cisco.com.
To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:
Cisco Systems, Inc. Document Resource Connection 170 West Tasman Drive San Jose, CA 95134-9883