|
This chapter describes how to configure the system. These tasks include:
This chapter concludes with alphabetical summaries of the commands described in this chapter.
The following sections contain procedures and command descriptions for configuring the global system characteristics: host name and passwords, and configuring system security and system management functions. The global configuration commands described in the following sections are entered in configuration mode. See the section "Entering Configuration Mode" in the chapter "First-Time Startup and Basic Configuration" for the procedures to enter into this mode.
Use the hostname global configuration command to specify the host name for the network server, which is used in prompts and default configuration file names.
hostname nameThe argument name is the new host name for the network server and is case sensitive. The default host name is Router.
This command changes the host name to sandbox.
hostname sandbox
A banner is the message that the EXEC command interpreter displays whenever a user starts any EXEC process or activates a line. The general form of the banner global command follows.
banner {motd|exec|incoming} c text cThe motd, exec, and incoming keywords control when the banner message is displayed. The use of these keywords is described in the following sections.
The argument c specifies a delimiting character of your choice. The argument text specifies the message to be shown on the screen whenever an interface line is activated.
The default keyword is motd if none is specified.
The no version of these commands removes the specified banner, and the no banner command removes the motd.
Follow banner with one or more blank spaces, then type the delimiting character, followed by one or more lines of text, terminating the message with the second occurrence of the delimiting character. There is no limit to the amount of characters that can be used for the banner, with the exception of buffer limits and what is appropriate for a banner.
The following example uses the pound sign character as a delimiting character:
banner motd #
Building power will be off from 7:00 AM until 9:00 AM this coming Tuesday.
#
To specify a general-purpose message-of-the-day (motd) type banner, use the banner motd global configuration command.
banner motd c text cThis displays a message-of-the-day type banner whenever any type of connection is established, for example, when a line is activated, or when an incoming Telnet connection is created. Use this banner for messages that affect all users of the router (for example, for system reboots).
To display a message when an EXEC process is created, use the banner exec global configuration command.
banner exec c text cThis command specifies a message to be displayed when an EXEC process is created (for example, when a TTY line is activated, or an incoming connection is established to a VTY). This banner is designed for messages that affect only interactive terminal users of the router.
To display an incoming message to a particular terminal line, use the banner incoming global configuration command.
banner incoming c text cThis specifies a message to be displayed on incoming connections to particular terminal lines (for example, lines used for "milking machine" applications).
The EXEC banner can be suppressed on certain lines using the no exec-banner line subcommand (described in the section "Suppressing Banner Messages" later in this chapter). Lines so configured will not display the EXEC or MOTD banners when an EXEC is created.
Banners and messages are displayed in the following order:
At this point, the user logs in, if required.
This example illustrates how to display a message-of-the-day banner, and a message that will be displayed when an EXEC process is created. Use the banner global configuration commands and no exec-banner line subcommand to accomplish these settings.
! Both messages are inappropriate for the VTYs.
line vty 0 4
no exec-banner
!
banner exec /
This is Cisco Systems training group server.
Unauthorized access prohibited.
/
!
banner motd /
The server will go down at 6pm for a software upgrade
/
In normal system operation, there are several pools of different sized buffers. These pools grow and shrink based upon demand. Some buffers are temporary and are created and destroyed as warranted. Other buffers are permanently allocated and cannot be destroyed. The buffers command allows a network administrator to adjust initial buffer pool settings, as well as the limits at which temporary buffers are created and destroyed.
The full syntax of this command follows:
buffers {small|middle|big|large|huge} {permanent|max-free|min-free| initial} numberFirst choose the keyword that describes the size of buffers in the pool--small, big, huge, and so on. The default number of the buffers in a pool is determined by the hardware configuration, and can be displayed with the EXEC show buffers command.
The next keyword specifies the buffer management parameter to be changed, and can be one of the following:
The argument number specifies the number of buffers to be allocated.
The no buffers command with appropriate keywords and argument restores the default buffer values.
An optional global configuration command for adjusting huge buffer settings is the buffers huge size command. As with the above command, use only after consulting with Cisco staff:
buffers huge size numberThe buffers huge size command dynamically resizes all huge buffers to the value that you supply. The buffer size cannot be lowered below the default. The argument number specifies the number of buffers to be allocated.
The no version of the command with the keyword and argument restores the default buffer values.
In the following example, the system will try to keep at least 50 small buffers free.
buffers small min-free 50
In this example, the system will try to keep no more than 200 medium buffers free.
buffers middle max-free 200
With the following command, the system will try to create one large temporary extra buffer, just after a reload:
buffers large initial 1
In this example, the system will try to create one permanent huge buffer:
buffers huge permanent 1
In this example, the system will resize huge buffers to 20000 bytes:
buffers huge size 20000
To display statistics about the buffer pool on the network server, use the command show buffers. For more information, refer to the section "Monitoring System Processes" in the chapter "Managing and Monitoring the System."
This section describes the boot global configuration commands used to configure boot files. The boot command can be used to perform these tasks:
The commands to load files over the network take effect the next time the software is reloaded, provided they have been written into nonvolatile memory.
The network configuration file contains commands that apply to all network servers and terminal servers on a network. The default name of this file is network-confg. See the section "Entering Configuration Mode" in the chapter "First-Time Startup and Basic Configuration." To change the name of this file use the boot network global configuration command. The full command syntax follows:
boot network filename [address]The keyword network changes the network configuration file name from network-confg. The argument filename is the new name for the network configuration file. If you omit the argument address, the network server uses the default broadcast address of 255.255.255.255. If you use address, you can specify a specific network host or a subnet broadcast address.
The host configuration file contains commands that apply to one network server in particular. To change the host configuration file name, use the boot host global configuration command. The full command syntax follows:
boot host filename [address]The keyword host changes the host configuration file name to a name you specify in the filename argument. The network server uses its name to form a host configuration file name. To form this name, the network server converts its name to all lowercase letters, removes all domain information, and appends "-confg." By default, the host file name is router-confg.
New versions of the software can be downloaded over the network. Use the boot system global configuration command to do this. The full command syntax follows.
boot system filename [address]The keyword system indicates that the file name and host addresses for booting operating software over the network are in the nonvolatile memory. In this case, the argument filename is the file name of the operating software to load, and the argument address is the address of the network host holding that file.
The boot system command overrides the processor configuration register setting unless the register specifies the use of default (ROM) operating software. Therefore, to permit netbooting, set the configuration register bits on the processor card to any pattern other than 0-0-0-0 or 0-0-0-1.
Refer to your Cisco hardware installation and reference publications for more information about the processor configuration registers.
To use the nonvolatile memory option to specify netbooting, place a boot system command in the nonvolatile memory. You use this command to specify both the file name of the operating software to load, and the Internet address of the server host holding that file:
boot system /usr/local/tftpdir/cisco.ts2 192.7.31.19
Use the b command at the ROM monitor prompt (>) to manually boot the system from the ROM software. The syntax is as follows:
bThe following is an example of the b command output:
>b
F3:
{ROM Monitor copyrights}
Use the b command at the ROM monitor prompt (>) to manually netboot the system, as in the following example. Check the appropriate hardware manual for the correct jumper or configuration register setting. The syntax for TFTP netbooting is as follows:
b filename [address]The filename argument specifies the filename of the image you want loaded. It is case sensitive. The address argument is optional and defines the IP address of the host you want to boot from. The following is an example of the b command for manually netbooting:
>b testme4.test 131.108.15.112
F3:
{ROM Monitor copyrights}
When netbooting, with or without Flash memories, you can specify that the ROM image is to be booted if other boot images are not available.
boot system romUse the boot system rom global configuration command to specify the use of the ROM system image when other boot system commands exist in the configuration.
For example, a list specifying two possible internet locations for a system image, with the ROM software being used as a backup, is given below:
boot system gs3-bfx.90-1 192.31.7.24
boot system gs3-bfx.83-2 192.31.7.19
boot system rom
To specify the size of the buffer to be used for netbooting a host or a network configuration file, use the boot buffersize global configuration command. The full command syntax follows:
boot buffersize bytesThe argument bytes specifies the size of the buffer to be used. By default, it is the size of your nonvolatile memory; it is 32 kilobytes if you do not have nonvolatile memory. There is no minimum or maximum size that may be specified.
The EXEC commands write terminal and write network use the information specified by the buffersize keyword when performing their functions (see the section "Entering Configuration Mode" in the chapter "First-Time Startup and Basic Configuration" for more information about these EXEC commands).
You can configure multiple instances of the boot commands. When issued, each command is executed in order and so can be used to begin a systematic search or to build a specific list. For example, you can issue multiple boot commands to build an ordered list of configuration-file-name-and-host-address pairs. The network server scans this list until it successfully loads the appropriate network or host configuration file or system boot image. In this example, the network server looks first for fred-confg on network 192.31.7.24 and, if it cannot load that file, then for wilma-confg on network 192.31.7.19:
boot host /usr/local/tftpdir/fred-confg 192.31.7.24
boot host /usr/local/tftpdir/wilma-confg 192.31.7.19
If the network server cannot find either file, a background process tries at ten-minute intervals (default) to load one or the other of the files.
You may issue multiple instances of all variations of the boot command, including the no boot forms. This feature can be useful for removing configuration files. To remove a configuration-file-name-and-host-address pair from the list, use the no boot command syntax.
Cisco routers support netbooting over both TFTP and MOP across all supported media types such as Ethernet, FDDI, serial, Token Ring, and HSSI. During a netbooting session, routers behave like hosts; they route via proxy ARP or a default gateway. However, when netbooting, a router ignores routing information, static IP routes, and bridging information. As a result, intermediate routers are responsible for handling ARP and TFTP requests correctly. For serial and HSSI media, ARP is not used.
If you need to netboot from a server, it is recommended that you ping the server from the ROM software. If you are unable to ping the server, there is a problem with the server configuration or hardware. Contact your technical support representative for assistance. See "Useful Information to Provide Technical Support" later in this section for details.
The list that follows contains solutions to common problems that occur when netbooting. Note that these solutions only apply if you were able to successfully ping the server.
When netbooting, the client you netboot from sends an ARP request to the server over every available appropriate network interface (such as an Ethernet port or a Token Ring port). The client expects the server or a router to return an ARP response. If the client does not receive an ARP response from the server or a router, a message similar to the following displays at the client console:
Booting gs3-bfx..................[timed out]
One possible cause of this message is that intermediate routers are not performing proxy arp. Look for no ip proxy-arp in the configuration of the intermediate router. Another possible reason for this message appearing at the client is that the client is using a broadcast address, and the intermediate router does not have an IP helper address defined to point to the TFTP server.
When netbooting, it is not unusual for the client to send additional requests before receiving a response to the initial ARP request. This can result in timeouts, out-of-order packets, and multiple responses. Timeouts (shown as periods on a netbooting display) and out-of-order packets (shown as Os) do not necessarily prevent a successful boot. It is acceptable to have timeouts and out-of-order packets. The following examples show successful boots even though a timeout and out-of-order packets have occurred:
Booting gs3-bfx from 131.108.1.123: !.!!!!!!!!!!!!!!!!!!!!!!
Booting gs3-bfx from 131.108.1.123: !0.0!!!!!!!!!!!!!!!!!!!!!!
Note that intermittent timeouts and out-of-order packets may occur throughout a netbooting session without being cause for concern. Excessive timeouts and out-of-order packets can be caused by bad routing paths on the intermediate routers, an extremely slow server, problems caused by multiple paths, or noise on the line. If your netbooting session appears to have excessive timeouts and out-of-order packets, contact your technical support representative and report the problem. Before calling technical support, you will need to gather some information. See "Useful Information to Provide Technical Support" that follows for details.
Collect the following information for the technical support representative:
Change the last sentence in the first note on page 4-13 to read, "A failure message, buffer overflow - xxxx/xxxx
, will appear, where xxxx/xxxx is the number of bytes used/total number of bytes."
The Flash Memory card is an add-in card of Flash memory storage onto which system software images may be stored, booted, and rewritten as necessary. This card is also called the CSC-MC+. The Flash card provides a more fault-tolerant solution to users who only netboot. The Flash card reduces the effects of network failure on system netbooting.
The CSC-MC+ Flash Memory card allows you to:
The Flash capability requires the appropriate level of system software, firmware, and hardware. A number of prerequisites and caveats apply to the installation and use of Flash as well. Refer to the Modular Products Hardware Installation and Reference publication for complete hardware requirements, specifications, caveats, and step-by-step installation instructions.
The features of the Flash Memory card include the following:
The Flash Memory card provides write-protection against accidental erasure or reprogramming of the Flash memories. The write-protect jumper, located on the front edge of the card, may be removed in order to prevent reprogramming of the Flash memories. The jumper must be installed when programming is required. The system image stored in the Flash Memory card can only be changed from a privileged EXEC command session on the console terminal, which offers system-wide security as well. In general, Cisco does not recommend this feature for remote systems.
The following is an overview of configuring your system to boot from Flash memories. This is not a step-by-step set of instructions; rather, it is an overview to the process of using the Flash capability. Refer to the Modular Products Hardware Installation and Reference publication for complete instructions on installing the hardware and netbooting, and in particular, any jumper setting changes.
Step 1: Set your system to boot from ROM software.
Step 2: Restore the system configuration, if necessary.
Step 3: Copy the TFTP image to Flash memories.
Step 4: Configure from the terminal to automatically boot from the desired file in Flash memory.
Step 5: Write your configuration to memory.
Step 6: Set your system to netboot from a file name (requires jumper setting change).
Step 7: Power-cycle and reboot your system to ensure that all is working as expected and that the configuration is stored in NVRAM.
Once you have successfully installed and tested the CSC-MC+ card, you may want to configure the system with the no boot system flash command in order to revert back to booting from ROM.
The remainder of this section describes the configuration commands used with the Flash feature.
To verify that the appropriate system card is properly connected to the CSC-MC+ card, use the show flash or show flash all commands.
The show flash command displays the total amount of Flash memory present on the Flash card, the type of card connected to the Flash card, any files that may currently exist in Flash memory and their size, and the amounts of Flash memory used and remaining.
The show flash all command displays all the above information, but also shows all the information about each Flash memory device.
Once you configure Flash, the show flash or show flash all commands will display the names of the system software images.
show flash show flash allThe following shows sample output of the show flash command:
George#show flash
4096K bytes of flash ROM on MC+ (via MCI)
Contains:
gsxx (1086414)
tsyy (1086414)
[935053/4194304]
The following shows sample output of the show flash all command:
George#show flash all
4096K bytes of flash ROM on MC+ (via MCI)
ROM 0, U2 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 1, U19, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 2, U3 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 3, U20, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 4, U4 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 5, U21, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 6, U5 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 7, U22, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 8, U9 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 9, U26, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 10, U10, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 11, U27, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 12, U11, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 13, U28, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 14, U12, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 15, U29, code 0x89BD, size 0x40000, name INTEL 28F020
Contains:
gsxx (1086414)[invalidated]
gsxx (1086414)
tsyy (1086414)
[935053/4194304]
Note the
[invalidated]
flag at the end of the second example. This flag will appear when a file is rewritten (recopied) into Flash memory, a user aborts, in a network timeout, or a Flash memory overflow. A prompt will tell you that the identical file already exists and that it will be invalidated. The first (now invalidated) copy of the file is still present within Flash memory, but it is rendered unusable in favor of the newest version.
To eliminate any files from Flash (invalidated or otherwise) and free up all available memory space, the entire Flash memory must be erased; individual files cannot be erased from Flash memory.
Both examples illustrate that the Flash memory can store and display multiple, independent software images (gsxx
and tsyy
) for booting itself or for TFTP serving software for other Cisco products. This feature would be most useful for storing default system software as a back-up. These images may also be stored in compressed format.
In the second example, ROM 0 is at location U2 on the Flash Memory card. The code is a vendor code, size is in hex bytes, INTEL is the vendor name, and the last number is the chip part number.
The copy tftp flash command copies (writes) a TFTP image into the current Flash configuration:
copy tftp flashbuffer overflow - xxxx/xxxx
, will appear, where xxxx/xxxx is the number of bytes read in/number of bytes available.
Once you give the copy tftp flash command, the system prompts you for the IP address (or domain name) of the TFTP server. This may be another Cisco router serving ROM or Flash system software images. You are then prompted for the file name of the software image and you are given the option to erase the existing Flash memory before writing onto it only when there is free space available in Flash memory. If no free Flash memory space is available or if the Flash memory has never been written to, the erase routine is required before new files can be copied. You will be prompted for these conditions by the system. The Flash memory is erased at the factory before shipment.
Following is sample output (copying a system image named gsxx
) of the prompt you will see under these conditions:
George#copy tftp flash
IP address or name of remote host [255.255.255.255]? 131.131.101.101
Name of tftp filename to copy into flash []? gsxx
copy gsxx from 131.131.101.101 into flash memory? [confirm]
Flash is filled to capacity. (this line only appears if Flash memory is full)
Erasure is needed before flash may be written.
Erase flash before writing? [confirm]
When you erase the existing Flash, the system clears and initializes each Flash memory, and a pound sign (#) prompt is displayed for each cleared and initialized device (total of 16). The entire copying process takes several minutes and will differ from network to network.
Following is sample output from copying a system image, named gsxx
, into the current Flash configuration:
George#copy tftp flash
IP address or name of remote host [255.255.255.255]? 131.131.101.101
Name of tftp filename to copy into flash []? gsxx
copy gsxx from 131.131.101.101 into flash memory?[confirm]
xxxxxxxx bytes available for writing without erasure.
erase flash before writing? [confirm]
Clearing and initializing flash memory (please wait)####...
Loading from 101.2.13.110: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!... [OK - 324572/524212 bytes]
Verifying checksum...
VVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVV...
Flash verification successful. Length = 324572, checksum = 0xE2E2
The series of !'s in the above sample output indicate that the copying process is taking place. The series of V's indicate that a checksum verification of the Flash memory is occurring as it is loaded into memory for boot. This is verified only through data compare during programming of the Flash memory. The last line in the sample configuration indicates that the copy is successful.
Having successfully copied an image onto the Flash, the output of show flash all will provide the image name, as in the following sample output:
George#show flash all
4096K bytes of flash ROM on MC+ (via MCI)
ROM 0, U2 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 1, U19, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 2, U3 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 3, U20, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 4, U4 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 5, U21, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 6, U5 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 7, U22, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 8, U9 , code 0x89BD, size 0x40000, name INTEL 28F020
ROM 9, U26, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 10, U10, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 11, U27, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 12, U11, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 13, U28, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 14, U12, code 0x89BD, size 0x40000, name INTEL 28F020
ROM 15, U29, code 0x89BD, size 0x40000, name INTEL 28F020
Contains:
gsxx (1622132)
[2572172/4194304 bytes free]
During the actual copy process, the yellow LED on the CSC-MC+ will be lit, indicating the security (write-protect) jumper is installed. If the security jumper was removed from the Flash card, this would be indicated with the show flash command.
Following is sample out put of this write-protected condition:
George#show flash
flash memory on MC+ card (via MCI)
security jumper is uninstalled, so flash memory is read-only
In this condition, no files could be copied to Flash until the jumper was reinstalled.
You are now ready to boot from Flash. The following sections describe how to automatically and manually boot from the Flash Memory card.
You can automatically boot the system from the Flash memories using the boot system flash system configuration command:
boot system flash filename
boot system configuration commands regardless of argument. Specifying the arguments flash, filename, or address with the no boot system command disables only the command specified by these arguments.
The boot system flash command boots the first valid file in Flash memory. The boot system flash filename boots the file specified by this file name.
Configure the system to automatically boot from the desired file in Flash memory using the configure terminal command and the boot system flash filename system configuration command.
Write the configuration to NVRAM with the write memory command. Following this, boot the system with the reload command.
The following shows use of this sequence of commands:
George#configure terminal
boot system flash gsnew-image
^Z
George#write memory
[ok]
George#reload
[confirm]
System Bootstrap, Version 4.5(0.3)
Copyright (c) 1986-1990 by cisco Systems
CSC3 processor with 4096 Kbytes of memory
F3: 1578668+35572+156084 at 0x1000
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR.... [OK - 162132/2110400 bytes]
F3: 1586072+36028+156004 at 0x1000
{ROM Monitor copyrights...}
Use the b flash command at the ROM monitor level to manually boot the system, as in the following example. Check the appropriate hardware manual for the correct jumper setting.
boot flash [filename]The optional filename argument specifies the filename of the image you want loaded. It is case sensitive.
>b flash
F3: 1578668+35572+156084 at 0x1000
RRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRRR.... {reading/booting flash from rom monitor}
{ROM Monitor copyrights...}
To copy an image back to a TFTP server use the copy flash tftp command. This copy of the system image can serve as a backup copy and may also be used to verify that the copy in Flash is the same as on the original file on disk.
copy flash tftpThe following is an example of the use of this system configuration command:
George#copy flash tftp
IP address of remote host [255.255.255.255]? 101.2.13.110
Name of file to copy []?gsxx
writing gsxx !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
George#
Once you have successfully installed and tested the CSC-MC+ card and configured Flash memory, you may want to configure the system (configure terminal) with the no boot system flash configuration command in order to revert to booting from ROM. After this command is entered, use the write memory command to save this new configuration command to NVRAM. This also requires changing the jumper on the configuration register of the processor. Refer to the appropriate hardware manual.
In the description that follows, one router with a Flash Memory card installed will be referred to as the Flash server; all other routers will be referred to as client routers. The configurations for the Flash server and client routers will be given through example configurations of each, with commands included as necessary.
The Flash server and client router must be able to reach one another before the TFTP function can be implemented. Verify this connection by pinging between the Flash server and client router (in either direction) using the ping command.
The syntax for the ping command is as follows:
Router# ping 131.131.101.101 <Return>
In this example, the Internet Protocol (IP) address of 131.131.101.101 belongs to the client router. In response to this command, !!!!!
indicates a connection, while ... [timed out]
or [failed]
indicates none. If the connection fails, reconfigure the interface, check the physical connection between the Flash server and client router, and ping again.
After this connection is verified, ensure that a TFTP-bootable image is present in Flash memory. This is the system software image that the client router will boot. Note the name of this software image so that it can be verified after the first client boot (the filename gs3-bfx.90.1 will be used in this example).
Caution The type of software (bfx, and so forth) residing in the Flash memory must be of the same type as the ROM software installed on the client router. For example, if the client router has gs3-bfx.90.1 (capable of X.25 bridging) in ROM and gs3-bf.90.1 is booted from the Flash server, the client router will operate under the control of the gs3-bf.90.1 software and will not have X.25 bridging capability. |
Once you have verified the presence of a bootable image in Flash memory, you can configure the Flash server.
Configure the Flash server by adding both the tftp-server system command and the access-list command to the configuration memory. Use the configure terminal command to do so.
Sample output of these commands follows:
Server# configure terminal
Enter configuration commands, one per line.
Edit with DELETE, CRTL/W, and CRTL/U;end with CTRL/Z
tftp-server system gs3-bfx.90.1 1
access-list 1 permit 131.131.101.0 0.0.0.255
^Z
Server# write memory <Return>
[ok]
This example gives the filename of the software image in the Flash server and one access list (labeled 1). The access list must include the network within which the client router resides. Thus, in the example, the network 131.131.101.0 and any client routers on it are permitted access to the Flash server filenamed gs3-bfx.90.1. For this exercise, the IP address of the Flash server is 131.131.111.111.
Caution Using the no boot system command in the following example will invalidate all other boot system commands currently in the client router system configuration. Before proceeding, determine whether the system configuration stored in the router you will use as the client should first be saved (uploaded) to a TFTP file server. Refer to the chapter "FIrst-Time Startup and Basic Configuration" for instructions on uploading and downloading system configuration files. |
Configure the client router using the no boot system command, the boot system command, and the boot system rom command. Use the configure terminal command to enter these commands into the client router's configuration memory. Using these commands requires changing the jumper on the processor's configuration register to the pattern 0-0-1-0 (Position 1).
Following is an example of the use of these commands:
Client# configure terminal
Enter configuration commands, one per line.
Edit with DELETE, CRTL/W, and CRTL/U;end with CTRL/Z
no boot system
boot system gs3-bfx.90.1 131.131.111.111
boot system rom
^Z
Client# write memory <Return>
[ok]
Server# reload
In this example, the no boot system command invalidates all other boot system commands currently in the configuration memory, and any boot system commands entered after this command will be executed first. The second command, boot system filename address, tells the client router to look for the file gs3-bfx.90.1 in the (Flash) server with an IP address of 131.131.111.111. Failing this, the client router will boot from its system ROM upon the boot system rom command, which is included as a backup in case of a network problem.
Caution The system software (gs3-bfx.90.1) to be booted from the Flash server (131.131.111.111) must reside in Flash memory on the server. If it is not in Flash memory, the client router will boot the Flash server's system ROM. |
Use the show version command on the client router to verify that the software image booted from the Flash server is the image present in Flash memory.
Following is sample output of the show version command:
Client# show version
GS Software (GS3-BFX), Version 9.0(1), CISCO SYSTEMS SOFTWARE
Copyright (c) 1986-1992 by cisco Systems, Inc.
Compiled Mon 30-Mar-92 17:16
System Bootstrap, Version 4.5(0.5), CISCO SYSTEMS SOFTWARE
Client uptime is 5 minutes
System restarted by reload
System image file is "gs3-bfx.90.1", booted via tftp from 131.131.111.111
The important information in this example is contained in the first line (GS Software...), and the last full line (System image file...). The two software types and versions shown indicate the software currently running in RAM in the client router (first line) and the software booted from the Flash server (last line). These two types and versions must be the same.
Verify that the software shown in the first line of the previous example is the software residing in the Flash server memory.
In the event of a Flash memory load failure, the following error message is displayed:
Error programming flash memory
If you see this message, contact customer service immediately and inform them of the situation.
Additionally, you can perform the following steps, which might recover from the error. These steps can be repeated.
Step 1: If possible, inspect the cable connections between the Flash card and the host card. Also, make sure that the host card is securely seated in its Multibus slot.
Step 2: Erase the Flash memory and try to download the file again. To erase the Flash memory, press Return or type y at the Erase flash before writing? [confirm] prompt.
Occasionally network failures make netbooting impossible. To lessen the effects of network failure, consider the following boot strategy.
After Flash is installed and configured, you may want to configure the router to boot in the following order:
This boot order provides a more fault-tolerant alternative in the netbooting environment. Use the following three commands in your configuration to allow you to boot first from Flash, then from a system file, and finally from ROM.
boot system flash
filename
boot system
filename
address
boot system rom
The order of the commands needed to implement this strategy is shown in the following sample output:
George#configure terminal
boot system flash
gsxx
boot system
gsxx
131.131.101.101
boot system rom
^Z
George#write memory
[ok]
George#
In addition to these commands, the router must be configured to boot from ROM (involves a jumper setting change).
Using this strategy, a router, used primarily in a netbooting environment, would have three alternative sources from which to boot. These alternative sources would help cushion the negative affects of a failure with the TFTP file server, and the network in general.
This section describes how to configure password protection and terminal access security.
You may set passwords to control access to the privileged command level and to individual lines. The Terminal Access Controller Access Control System (TACACS) protocol controls terminal use by means of a user-ID-and-password pair. The Defense Data Network developed TACACS to control access to its TAC terminal servers; Cisco patterned its TACACS support after the DDN application.
These system security measures may not provide the level of protection needed for some environments; individual routing protocols and bridging support may have additional security procedures. You may also need to use access lists for additional protection. For procedures for configuring access lists, refer to the sections describing configuration of a particular routing protocol or bridging support.
To assign a password for the privileged command level, use the enable password global configuration command:
enable password passwordThe argument password is case sensitive and specifies the password prompted for in response to the EXEC command enable. The password argument may contain any alphanumeric characters, including spaces, up to 80 characters. Password checking is also case sensitive. The password Secret is different than the password secret, for example, and the password two words is an acceptable password.
To enter the privileged command level, type the following EXEC command and then press Return:
enable Next, type the password for the privileged command level at the Password:
prompt.
When you use the enable command at the console terminal, the EXEC does not prompt you for a password if the privileged mode password is not set. Additionally, if the enable password is not set and the line 0 (console line) password is not set, it is only possible to enter privileged mode on the console terminal. This feature allows you to use physical security rather than passwords to protect privileged mode if that is what you prefer to do.
If the enable password is not set and the line 0 (console) password is set, it is possible to enter privileged command mode either without entering a password at the console terminal or by entering the console line password when prompted while using any other line.
The following example sets the password secretword for the privileged command level on all lines, including the console:
enable password secretword
When an EXEC is started on a line with password protection, the EXEC prompts for the password. If you enter the correct password, the EXEC prints its normal nonprivileged prompt. You may try three times to enter a password before the EXEC exits and returns the terminal to the idle state.
To specify a password, use the password line subcommand. The full command syntax follows:
password textThe text argument may contain any alphanumeric character, including spaces, up to 80 characters. The password checking is also case sensitive. The password Secret is different than the password secret, for example, and the password two words is an acceptable password.
To enable checking for the password specified by the password command, use the line subcommand login:
loginAlternatively, to use the TACACS user ID and password-checking mechanism instead, use the following subcommand:
login tacacsTo disable all password checking, use the command:
no loginThe server prints the message-of-the-day banner before prompting for a password, so you immediately see messages such as no trespassing notifications. By default, virtual terminals require a password. If you do not set a password for a virtual terminal, it will respond to attempted connections by displaying an error message and closing the connection. Use the no login subcommand to disable this behavior and allow connections without a password.
The following example sets the password letmein on line 5:
line 5
password letmein
login
If your network server has the nonvolatile memory option, you can lock yourself out if you enable password checking on the console terminal line and then forget the line password.
To recover from this, force the network server into factory diagnostic mode by turning off the network server, inserting a jumper in bit 15 of the processor configuration register, (or bit 7 of the processor configuration register in the IGS or CRM), and turning on the network server. Follow these steps.
Step 1: You will be asked if you want to set the manufacturers' addresses. Respond by typing "yes." You then see the following prompt:
TEST-SYSTEM>
Step 2: Type the enable command to get the privileged prompt, as in:
TEST-SYSTEM#enable
Step 3: Type the show configuration command to review the system configuration and find the password.
Step 4: To resume normal operation, turn off the network server, remove the jumper from bit 15 (or bit 7) of the configuration register, and turn on the network server again.
Step 5: Log in to the network server with the password that was shown in the configuration file.
The processor configuration registers are described in the Cisco hardware installation and reference publications.
When the network server restarts in factory diagnostic mode, it does not read the nonvolatile memory, thus avoiding the command to set a password for the console terminal. Do not change anything in the factory diagnostic mode.
Cisco Systems provides unsupported versions of both a standard and an extended TACACS server. The servers run on most UNIX systems and are available via FTP from the host ftp.cisco.com. You may use the servers to create UNIX accounting applications that monitor use of a system and user logins.
The configuration commands in the following sections tailor the behavior of the standard TACACS server.
The tacacs-server host global configuration command specifies a TACACS host. The full syntax of this command follows.
tacacs-server host nameThe argument name is the name or Internet address of the host. You can use multiple tacacs-server host subcommands to specify multiple hosts. The server will search for the hosts in the order you specify them. The no tacacs-server host global configuration command deletes the specified name or address.
The tacacs-server attempts global configuration command controls the number of login attempts that may be made on a line set up for TACACS verification.
tacacs-server attempts countThe argument count is the number of attempts. The default is three attempts.
The no tacacs-server attempts global configuration command restores the default.
This command changes the login attempt to just one try:
tacacs-server attempts 1
The tacacs-server retransmit global configuration command specifies the number of times the server will search the list of TACACS server hosts before giving up. The server will try all servers, allowing each one to time-out before increasing the retransmit count.
tacacs-server retransmit retriesThe argument retries is the retransmit count. The default is two retries.
The no tacacs-server retransmit global configuration command restores the default.
This command specifies a retransmit counter value of five times:
tacacs-server retransmit 5
The tacacs-server timeout global configuration command sets the interval the server waits for a server host to reply.
tacacs-server timeout secondsThe argument seconds specifies the number of seconds. The default interval is five seconds. The no tacacs-server timeout global configuration command restores the default.
This command changes the interval timer to ten seconds:
tacacs-server timeout 10
If, when running the TACACS server, the TACACS server does not respond, the default action is to deny the request. Use the tacacs-server last-resort global configuration command to change that default.
tacacs-server last-resort {password|succeed}The command causes the network server to request the privileged password as verification, or forces successful login without further input from the user, depending upon the keyword specified, as follows:
The no tacacs-server last-resort global configuration command restores the system to the default behavior.
The following variations of the enable command may be used to configure privileged-level command access using the TACACS protocol.
The enable use-tacacs global configuration command is used for setting the TACACS protocol for determining whether a user can access the privileged command level.
enable use-tacacsIf you use this command, the EXEC enable command will ask for both a new user name and password. This is then passed to the TACACS server for authentication. If you are using the extended TACACS, it will also pass any existing UNIX user identification code to the server.
The enable last-resort global configuration command allows you to specify what happens if the TACACS servers used by the enable command do not respond.
enable last-resort {password|succeed}The default action is to fail. Use of the keyword changes the action, as follows:
The no enable last-resort global configuration command restores the default.
What follows are the configuration commands that tailor the behavior of the extended TACACS client.
The tacacs-server extended global configuration command enables an extended TACACS mode.
tacacs-server extendedThis mode provides information about the terminal requests for use in setting up host auditing trails and accounting files for tracking use of terminal servers and routers. Information includes responses from terminal servers and routers, and validation of user requests. An unsupported, extended TACACS server is available from Cisco Systems via anonymous FTP for UNIX users who want to create the auditing programs.
The no tacacs-server extended command disables this mode.
The tacacs-server notify global configuration command causes a message to be transmitted to the TACACS server, with retransmission being performed by a background process for up to five minutes. The terminal user, however, receives an immediate response allowing access to the terminal. The full syntax of this command follows.
tacacs-server notify {connect|slip|enable|logout}The keywords specify notification of the TACACS server whenever a user does one of the following:
The no tacacs-server notify command with the appropriate keyword disables notification.
The tacacs-server authenticate command requires a response from the network or communications server to indicate whether the user may perform the indicated action.
tacacs-server authenticate {connect|slip|enable}Actions that require a response include the following, specified as optional keywords:
The no tacacs-server authenticate command with the appropriate keyword disables the action.
You can specify that the first TACACS request to a TACACS server is made without password verification. This option is configured with the tacacs-server optional-passwords global configuration command:
tacacs-server optional-passwordsWhen the user types in the login name, the login request is transmitted with the name and a zero-length password. If accepted, the login procedure completes. If the TACACS server refuses this request, the terminal server prompts for a password, and tries again when the user supplies a password. The TACACS server must support authentication for users without passwords to make use of this feature. This feature supports all TACACS requests--login, SLIP, enable, and so on.
Networks that cannot support a TACACS service may still wish to use a user name-based authentication system. In addition, it may be useful to define special user names that get special treatment (for example, an "info" user name that does not require a password, but connects the user to a general purpose information service).
The network server software supports these needs by implementing a local username configuration command. The format for the command is:
username name [nopassword|password encryptiontype password]Multiple username commands can be used to specify options for a single user.
The nopassword keyword means that no password is required for this user to log in. This is usually most useful in combination with the autocommand keyword.
The password keyword specifies a possibly encrypted password for this user name.
The encryptiontype argument is a single-digit number that defines whether the text immediately following is encrypted and, if so, what type of encryption is used. Currently defined encryption types are 0, which means that the text immediately following is not encrypted, and 7, which means that the text is encrypted using a Cisco-defined encryption algorithm. A password can contain embedded spaces and must be the last option specified in the username command.
When you specify an encryption type of 0 to enter an unencrypted password, the system displays the encrypted version of the password. For example, suppose you enter the following command:
username bill password westward
The system would display this command like this:
username bill password 7 21398211
The encrypted version of the password is 21398211. The password was encrypted by the Cisco-defined encryption algorithm, as indicated by the "7."
If you were to enter the following command, the system would assume that the password is already encrypted and would do no encryption. It would display the command exactly as you typed it:
username bill password 7 21398211
username bill password 7 21398211
The accesslist keyword specifies an outgoing access list that overrides the access list specified in the access class line configuration subcommand. It is used for the duration of the user's session. The access list number is specified by the number argument.
The autocommand keyword causes the command specified by the command argument to be issued automatically after the user logs in. When the command is complete, the session is terminated. As the command can be any length and contain imbedded spaces, commands using the autocommand keyword must be the last option on the line.
The noescape keyword prevents a user from using an escape character on the host to which he is connected.
The nohangup keyword prevents the network server from disconnecting the user after an automatic command (set up with the autocommand keyword) has completed. Instead, the user gets another login prompt.
To implement a service similar to the UNIX who command, which can be given at the login prompt and lists the current users of the network server, the command takes the following form:
username who nopassword nohangup autocommand show users
To implement an ID that will work even if all the TACACS servers break, the command is as follows:
username superuser password superpassword
The Simple Network Management Protocol (SNMP) provides a way to access and set configuration and run-time parameters for the network server. Cisco System's implementation of SNMP is compatible with RFCs 1155, 1156, and 1157. The Cisco Management Information Base (MIB) supports RFCs 1155 to 1213, and provides Cisco-specific variables.
A separate document, available in RFC 1213-type (MIB II) format, describes all the Cisco-specific SNMP variables in the Cisco portion of the MIB. It also describes what is required to establish minimum configuration. Contact Cisco Systems to obtain a copy of this document, which includes instructions for accessing the variables using SNMP.
Cisco also provides support for some of the FDDI MIB variables as described in RFC 1285, "FDDI Management Information Base," January 1992 by Jeffrey D. Case of the University of Tennessee and SNMP Research, Inc. One such variable that Cisco supports is
snmpFddiSMTCFState.
To be able to configure the SNMP server, you need to be in the configuration command collection mode. You enter this mode using the EXEC command configure at the EXEC prompt. See the section "Entering Configuration Mode" in the chapter "First-Time Startup and Basic Configuration" for a description of the procedure.
You begin SNMP operation by entering the configuration commands that define the desired operation. To disable SNMP server operations on the network server after it has been started, use the no snmp-server global configuration command:
no snmp-serverTo set up an access list that determines which hosts can send requests to the network server, use the snmp-server access-list global configuration command. This access list applies only to the global read-only SNMP agent configured with the command snmp-server community. The network server ignores packets from hosts that the access list denies.
The full command syntax follows.
snmp-server access-list listThe argument list is an integer from 1 through 99 that specifies an IP access list number.
The no snmp-server access-list global configuration command removes the specified access list.
This command causes the router to ignore packets from hosts that do not match access list 21:
snmp-server access-list 21
To set up the community access string, use the snmp-server community global configuration command. The full command syntax follows:
snmp-server community string [RO|RW] [list]This command enables SNMP server operation on the network server. The argument string specifies a community string that acts like a password and permits access to the SNMP protocol.
By default, an SNMP community string permits read-only access (keyword RO); use the keyword RW to allow read-write access. The optional argument list is an integer from 1 through 99 that specifies an access list of Internet addresses that may use the community string.
The no snmp-server community global configuration command removes the specified community string or access list.
This command assigns the string comaccess to the SNMP server, allows read-only access, and specifies that addresses that match the criteria in access list 4 may use the community string. (Notice that the string is entered without quotes or any other parsing characters.)
snmp-server community comaccess RO 4
To set the system contact string (syscontact), use the snmp-server contact command. The command syntax follows:
snmp-server contact textThe text argument is a string that specifies the system contact information.
To set the system location string, use the snmp-server location command. The command syntax follows:
snmp-server location textThe text argument is a string that specifies the system location information.
To establish the message queue length for each TRAP host, use the snmp-server queue-length global configuration command:
snmp-server queue-length lengthThis command defines the length of the message queue for each TRAP host.
The argument length is the number of TRAP events that can be held before the queue must be emptied; the default is 10. Once a TRAP message is successfully transmitted, software will continue to empty the queue, but never faster than at a rate of four TRAP messages per second.
The no snmp-server queue-length command resets the queue length to its default value of 10.
This command establishes a message queue that traps four events before it must be emptied:
snmp-server queue-length 4
To establish the packet filtering size, use the snmp-server packetsize global configuration command. The full command syntax follows:
snmp-server packetsize bytesThis command allows control over the largest SNMP packet size permitted when the SNMP server is receiving a request or generating a reply.
The argument bytes is a byte count from 484 through 8192. The default is 484. The no snmp-server packetsize command resets this default.
This command establishes a packet filtering maximum size of 1024 bytes:
snmp-server packetsize 1024
To specify the recipients of TRAP messages, use the snmp-server host global configuration command. The full syntax follows:
snmp-server host address community-string [snmp|tty]This command specifies which host or hosts should receive TRAP messages. You need to issue the snmp-server host command once for each host acting as a TRAP recipient.
The argument address is the name or Internet address of the host. The argument community-string is the password-like community string set with the snmp-server community command.
The optional keywords define whether the TRAPS be included, as follows:
With the snmp-server host command, you get all the SNMP TRAP messages about TTY events by default. The no snmp-server host command removes the specified host.
This command sends all possible SNMP TRAPS to 131.108.2.160, including TTY TRAPS.
snmp-server host 131.108.2.160
In order to turn these TRAP messages off, use the no snmp-server host command. For example, the following sequence of commands only sends the seven SNMP TRAP messages to 131.108.2.160, not all the others.
snmp-server host 131.108.2.160
no snmp-server host 131.108.2.160 tty
This example causes all the SNMP-type messages to be sent to the host specified by the name cisco.com. The command uses the community string comaccess as the password:
snmp-server host cisco.com comaccess snmp
To establish the TRAP message authentication, use the snmp-server trap-authentication global configuration command:
snmp-server trap-authenticationThis command enables the network server to send a TRAP message when it receives a packet with an incorrect community string.
The SNMP specification requires that a TRAP message be generated for each packet with an incorrect community string. However, because this action can result in a security breach, the network server by default does not return a TRAP message when it receives an incorrect community string.
To define how often to try resending TRAP messages on the retransmission queue, use these global configuration commands:
snmp-server trap-timeout secondsThe argument seconds sets the interval for resending the messages. The default is set to 30 seconds. The no snmp-server trap-timeout command restores this default.
This command sets an interval of 20 seconds to try resending TRAP messages on the retransmission queue:
snmp-server trap-timeout 20
Using SNMP packets, a network management tool can send messages to users on virtual terminals and the network server's console. This facility operates in a similar fashion to the SNMP send command; however, the SNMP request that causes the message to be issued to the users, also specifies the action to be taken after the message is delivered. One possible action is a shutdown request.
Requesting a shutdown-after-message is similar to issuing a send command followed by a reload command. Because the ability to cause a reload from the network is a powerful feature, it is protected by this configuration command. To use this SNMP message reload feature the device configuration must include the snmp-server system-shutdown global configuration command. The full command syntax follows:
snmp-server system-shutdownThe no snmp-server system-shutdown option prevents a SNMP system-shutdown request (from an SNMP manager) from resetting the Cisco agent.
To understand how to use this command with SNMP requests, read the document mib.txt available by anonymous FTP from ftp.cisco.com. This document is available in RFC 1213-type format. It describes all the Cisco-specific SNMP variables in the Cisco portion of the MIB. It also describes what is required to establish minimum configuration. Contact Cisco Systems to obtain a copy of this document, which includes instructions for accessing the variables using SNMP.
You can configure the network server to act as a limited Trivial File Transfer Protocol (TFTP) server from which other Cisco servers can boot their software. As a TFTP server host, the network server responds to TFTP read request messages by sending a copy of its ROM software to the requesting host. The TFTP read request message must use the file name that you specified in the network server configuration.
To specify TFTP server operation for a communications server, use the tftp-server system global configuration command. The full syntax follows.
tftp-server system filename ip-access-listThis command has two arguments: filename and list. The argument filename is the name you give the communications server ROM file, and the argument ip-access-list is an IP access-list number.
The system sends a copy of the ROM software to any host which issues a TFTP read request with this file name. To learn how to specify an access list, see the "Configuring IP Access Lists" section in the chapter "Routing IP."
You can specify multiple file names by repeating the tftp-server system command. To remove a previously defined file name, use the no tftp-server system command and append the appropriate file name and an access-list number.
This command causes the router to send, via TFTP, a copy of the ROM software when it receives a TFTP read request for the file goodimage. The requesting host is checked against access list 22.
tftp-server system goodimage 22
The service global configuration command tailors use by the network server of network-based services. Some service commands also configure system defaults; see decimal-tty for an example. The full command syntax follows:
service keywordThe argument keyword is one of the following:
The no service command disables the specified service or function.
The following command enables TFTP autoloading of configuration files:
service config
By default, the network server sends the output from the EXEC command debug and system error messages to the console terminal.
To redirect these messages, as well as output from asynchronous events such as interface transition, to other destinations, use the logging configuration command options.
These destinations include the console terminal, virtual terminals, and UNIX hosts running a syslog server; the syslog format is compatible with 4.3 BSD UNIX.
To configure the logging of messages, you need to be in the configuration command collection mode. To enter this mode, use the EXEC command configure at the EXEC prompt (see the section "Entering Configuration Mode" in the chapter "First-Time Startup and Basic Configuration" for the procedure). The following sections describe how to implement these redirection options.
To enable or disable message logging, use the following global configuration commands:
logging onThe logging on command enables message logging to all supported destinations other than the console. This behavior is the default.
The no logging on command enables logging to the console terminal only.
The default logging device is the console; all messages are displayed on the console unless otherwise specified.
To log messages to an internal buffer, use the logging buffered global configuration command. The full command syntax follows.
logging bufferedThe logging buffered command copies logging messages to an internal buffer instead of writing them to the console terminal. The buffer is circular in nature, so newer messages overwrite older messages. To display the messages that are logged in the buffer, use the EXEC command show logging. The first message displayed is the oldest message in the buffer.
The no logging buffered command cancels the use of the buffer and writes messages to the console terminal, which is the default.
To limit how many messages are logged to the console, use the logging console global configuration command. The full syntax of this command follows:
logging console levelThe logging console command limits the logging messages displayed on the console terminal to messages with a level number at or below the specified severity level, which is specified by the level argument.
The argument level can be one of the keywords listed in Table 1-1. They are listed in order from the most severe to the least severe level.
Level | Keyword | Description | Syslog Definition |
---|---|---|---|
0 | emergencies | System is unusable | LOG_EMERG |
1 | alerts | Immediate action is needed | LOG_ALERT |
2 | critical | Critical conditions exist | LOG_CRIT |
3 | errors | Error conditions exist | LOG_ERR |
4 | warnings | Warning conditions exist | LOG_WARNING |
5 | notification | Normal, but significant, conditions exist | LOG_NOTICE |
6 | informational | Informational messages | LOG_INFO |
7 | debugging | Debugging messages | LOG_DEBUG |
The default is to log messages at the warnings level to the console.
The no logging console command disables logging to the console terminal.
This command sets console logging of messages at the debug level:
logging console debug
To limit the level of messages to log to the terminal lines (monitors), use the logging monitor command. The full syntax of this command follows.
logging monitor levelThe logging monitor command limits the logging messages displayed on terminal lines other than the console line to messages with a level at or above level. The argument level is one of the keywords described for the logging console command in the previous section, "Logging Messages to the Console." To display logging messages on a terminal, use the privileged EXEC command terminal monitor.
The no logging monitor command disables logging to terminal lines other than the console line.
This command sets the level of messages displayed on monitors other than the console to notifications:
logging monitor notifications
To log messages to the syslog server host, use the logging global configuration command. The full syntax is as follows:
logging internet-addressThe logging command identifies a syslog server host to receive logging messages. The argument internet-address is the Internet address of the host. By issuing this command more than once, you build a list of syslog servers that receive logging messages.
The no logging command deletes the syslog server with the specified address from the list of syslogs.
To limit how many messages are sent to the syslog servers, use the logging trap global configuration command. Its full syntax follows:
logging trap levelThe logging trap command limits the logging messages sent to syslog servers to messages with a level at or above level. The argument level is one of the keywords described for the logging console command in Table 1-1.
To send logging messages to a syslog server, specify its host address with the logging command.
The default trap level is informational.
The no logging trap command disables logging to syslog servers.
The current software generates four categories of the syslog messages:
The EXEC command show logging displays the addresses and levels associated with the current logging setup. The command output also includes ancillary statistics.
To set up the syslog daemon on a 4.3 BSD UNIX system, include a line such as the following in the file /etc/syslog.conf:
local7.debug /usr/adm/logs/tiplog
The local7
keyword specifies the logging facility to be used.
The debug argument specifies the syslog level. See the previous level arguments list for other arguments that can be listed.
The UNIX system sends messages at or below this level to the file specified in the next field. The file must already exist, and the syslog daemon must have permission to write to it.
To configure your console and virtual terminal lines you need to be in the configuration command collection mode. To enter this mode, use the EXEC command configure at the EXEC prompt (see the section "Entering Configuration Mode" in the chapter "First-Time Startup and Basic Configuration" for the procedure).
To start configuring a terminal line, use the line command. This command identifies a specific line for configuration and starts line configuration command collection.
The line command has the following syntax:
line [type-keyword] first-line [last-line]This command can take up to three arguments: a keyword, a line number, or a range of lines numbers.
The optional argument type-keyword specifies the type of line to be configured; it is one of the following keywords:
When the line type is specified, the argument first-line is the relative number of the terminal line (or the first line in a contiguous group) you want to configure. Numbering begins with zero.
The optional argument last-line then is the relative number of the last line in a contiguous group you want to configure.
If you omit type, then first-line and last-line are absolute rather than relative line numbers. To display absolute line numbers, use the EXEC command show users all.
The network server displays an error message if you do not specify a line number.
The line command enables you to easily configure a large group of lines all at once. After you set the defaults for the group, you can use additional line commands and subcommands to set special characteristics, such as location, for individual terminal lines.
The following command starts configuration for the first five virtual terminal lines:
line vty 0 4
The line command keyword aux allows use of an auxiliary RS-232 DTE port available on all processor cards. Use this port to attach to an RS-232 port of a CSU/DSU, protocol analyzer, or modem. You can monitor that port remotely by connecting to the TCP port whose number is 2000 decimal plus the line number of the auxiliary port. For example, if the auxiliary port was line 1 (obtained from the EXEC command show users all), then the TCP port would be 2001. You must order a special cable from Cisco Systems for use with this auxiliary port.
To configure the auxiliary port, use this variation of the line command:
line aux port-addressWhen configuring the auxiliary port, address it as line 0, as in this sample:
line aux 0
The auxiliary port asserts DTR when a Telnet connection is established or when an EXEC becomes active. Flow control is not supported on either the auxiliary port or the console port.
By default, the auxiliary port supports an EXEC process. This default can be re-enabled using the exec line subcommand.
These commands configure the auxiliary port with a line speed of 2400 baud, and enable the EXEC.
line aux 0
exec
speed 2400
No modem control signals are supported on this line. If an auto-answer modem is configured on the line, you must dial up, log in, then hang up. The DTR signal will be active whenever an EXEC is configured on the auxiliary port.
To disable automatic connections, use the following line subcommand:
transport preferred noneThis command prevents the system from assuming that any unrecognized command is a host name. No connection will be attempted if the command is not recognized (by misspelling a command, for example).
When you start an EXEC on a line with password protection, the EXEC prompts for the password. If you enters the correct password, the EXEC prints its normal prompt. You may try three times to enter a password before the EXEC exits and returns the terminal to the idle state.
To specify a password, use the password line subcommand. Its full syntax follows.
password textThe text argument may contain any alphanumeric characters, including spaces, up to 80 characters. The password checking is case sensitive. The password Secret is different than the password secret, for example, and the password two words is an acceptable password.
This command sets the words "Big Easy" as the password on line 1:
line 1
password Big Easy
To establish connection restrictions on the lines to some Internet addresses, use the access-class line subcommand. The full command syntax follows.
access-class list {in|out}The access-class subcommand restricts connections on a line or group of lines to certain Internet addresses. The argument list is an integer from 1 through 99 that identifies a specific access list of Internet addresses. The keyword in applies to incoming connections, such as virtual terminals. The keyword out applies to outgoing Telnet connections. The no access-class command removes access restrictions on the line for the specified connections.
This example subcommand sets restrictions on access list 1 for outgoing Telnet connections:
access-class 1 out
See the section "Configuring IP Access Lists" in the chapter "Routing IP" for information about configuring access lists.
By default, messages defined by the banner motd and banner exec commands are always displayed. This condition is defined by the exec-banner line subcommand. Its full syntax follows:
exec-bannerTo suppress display of a banner, enter the no exec-banner command.
These commands suppresses the banner on virtual terminal lines 0 through 4:
line vty 0 4
no exec-banner
The router will display a message on the console when there is no active EXEC. This message, called the vacant message, is different from the banner message displayed when an EXEC process is activated.
To turn the vacant message banner on or off, use the vacant-message line configuration subcommands. The vacant-message command enables the banner to be displayed on the screen of an idle terminal. The full syntax of this command follows.
vacant-message [c message c]The vacant-message subcommand without any arguments causes the default message to be displayed. If you desire a banner, follow vacant-message with one or more blank spaces and a delimiting character (c) you choose. Then type one or more lines of text (message), terminating the text with the second occurrence of the delimiting character.
The no vacant-message line configuration subcommand suppresses a banner message.
This example will turn on the system banner and display a message.
line 0
vacant-message #
Welcome to Cisco Systems, Inc.
This is the console terminal of the router Dross.
#
The escape-character line subcommand defines the escape character. The following illustrates the full syntax of this command:
escape-character decimal-numberThe argument decimal-number is the ASCII decimal representation of the desired escape character or an escape character (Ctrl-P, for example). Typing the escape character followed by the X key returns you to the EXEC when you are connected to another computer. The default escape character is Ctrl-^. (See the appendix "ASCII Character Set" for a list of ASCII characters.)
The operating software interprets Break on the console as an attempt to halt the system.
The no escape-character line configuration subcommand reinstates the default escape character.
This command changes the escape characters to Ctrl-P (ASCII character 17):
line 5
escape-character 17
To set the location of the terminal, use the location line subcommand. The full syntax of this command follows:
location textThis subcommand is for informational purposes only; it is not used by any aspects of the system software. The argument text is the desired description. The description appears in the output of the EXEC command systat. A maximum of 80 characters can be entered.
The no location subcommand removes the information.
This command describes the location of the terminal on line 2 as being Andrea's terminal:
line 2
location Andrea's terminal
The EXEC command interpreter waits for a specified interval of time until the user starts input. If no input is detected, the EXEC resumes the current connection. If no connections exist, the EXEC returns the terminal to the idle state and disconnects the incoming session.
To set this interval, use the exec-timeout line configuration subcommand. The full syntax of the command follows.
exec-timeout minutes [seconds]The argument minutes is the number of minutes, and the optional argument seconds specifies additional interval time in seconds. The default interval is ten minutes; an interval of zero specifies no time-outs.
The no exec-timeout subcommand removes the time-out definition. It is the same as entering exec-timeout 0.
This command sets an interval of 2 minutes, 30 seconds.
exec-timeout 2 30
This command sets an interval of 10 seconds:
exec-timeout 0 10
To set the terminal screen length, use the length line configuration subcommand. The full syntax of the command follows.
length screen-lengthThe argument screen-length is the number of lines on the screen. The network server uses this value to determine when to pause during multiple-screen output. The default length is 24 lines. A value of zero disables pausing between screens of output.
The no length command is the same as entering the command length 0.
To enable the terminal to notify the user about pending output, use the notify line subcommand. The full syntax of the command follows.
notifyThe notify subcommand sets a line to inform a user who has multiple, concurrent Telnet connections when output is pending on a connection other than the current connection.
The no notify line configuration subcommand ends notification and is the default.
To set the padding on characters, use the padding line configuration subcommand. The full syntax of the command follows.
padding decimal-number countThe padding subcommand sets padding for a specified output character. The argument decimal-number is the ASCII decimal representation of the character, and the argument count is the number of NUL bytes sent after that character.
The no padding line configuration subcommand removes padding for the specified output character.
The following command pads Return (ASCII character 13) with 25 NUL bytes:
padding 13 25
This section lists all of the global system configuration commands in alphabetical order.
[no] banner {motd|exec|incoming} c text c
Displays the message that the EXEC command interpreter displays whenever a user starts any EXEC process or activates a line. The motd, exec, and incoming keywords control when the banner message is displayed. The argument c specifies a delimiting character of your choice. The argument text specifies the message to be shown on the screen whenever an interface line is activated.
[no] boot buffersize bytes
Specifies the size of the buffer to be used for netbooting a host or a network configuration file. The argument bytes by default is the size of your nonvolatile memory, or 32 kilobytes if you do not have nonvolatile memory. There is no minimum or maximum size that may be specified.
[no] boot host filename [address]
Specifies the host configuration file name. The argument filename is the new name for the host configuration file. If you omit the argument address, the network server uses the default broadcast address of 255.255.255.255. The optional argument address allows you to specify a specific network host or a subnet broadcast address.
[no] boot network filename [address]
Specifies the network configuration file name. The argument filename is the new name for the network configuration file. If you omit the optional argument address, the network server uses the default broadcast address of 255.255.255.255. The optional argument address allows you to specify a specific network host or a subnet broadcast address.
[no] boot system filename [address]
Specifies a second operating software image from a file that is not in nonvolatile memory. The argument filename is the file name of the operating software to load, and the optional argument address is the address of the network host holding that file.
[no] boot system flash filename
Same as boot system filename [address] but instead the system is booted from the Flash memories. Specify a name to associate with the image from Flash memories with the filename parameter.
[no] boot system rom
Automatically boots the system from the ROM system image. This command is usually used as a backup to other boot system commands that specify system images that exist either on the network or in Flash memories.
[no] buffers {small|middle|big|large|huge} {permanent|max-free|min-free| initial} number
Allows a network administrator to adjust initial buffer pool settings and set limits at which temporary buffers are created and destroyed.The first keyword denotes the size of buffers in the pool; the default number of the buffers in a pool is determined by the hardware configuration. The second keyword specifies the buffer management parameter to be changed, as follows:
The argument number specifies the number of buffers to be allocated.
The no buffers command with appropriate keywords and arguments restores the default buffer values.
[no] buffers huge size number
Dynamically resizes all huge buffers to the value that you supply. The buffer size cannot be lowered below the default. The argument number specifies the number of buffers to be allocated. The no version of the command with the keyword and argument restores the default buffer values.
copy flash tftp
Copies a Flash TFTP image back to a TFTP server.
copy tftp flash
Copies a TFTP image into the current Flash configuration.
enable
Allows you to enter the privileged command level.
enable password password
Assigns a password for the privileged command level. The argument password is case sensitive and specifies the password prompted for in response to the EXEC command enable.
[no] enable last-resort {succeed|password}
Allows you to specify what happens if the TACACS servers used by the enable command do not respond. The default action is to fail. The keywords change this default action:
The no version of the command restores the default.
[no] enable use-tacacs
Enables or disables use of TACACS to check the user ID and password supplied to the EXEC enable command.
hostname name
Specifies the name for the network server. The default is Router.
[no] logging internet-address
Identifies a syslog server host to receive logging messages. The argument internet-address is the Internet address of the host.The no logging command deletes the syslog server with the specified address from the list of syslogs.
[no] logging buffered
Copies logging messages to an internal buffer instead of writing them to the console. The no version of the command cancels this behavior and writes messages to the console terminal; this is the default.
[no] logging console level
Limits the logging of messages displayed on the console terminal to messages with a level at or above the specified severity, which is specified by the level argument. The argument level can be one of the following keywords, listed here in order from the most severe to the least severe level.
The no logging console command disables logging to the console terminal.
[no] logging monitor level
Limits the logging messages displayed on terminal lines other than the console line to messages with a level at or above level. The argument level is one of the keywords described for the logging console command. The no logging monitor command disables logging to terminal lines other than the console line.
[no] logging on
Enables or disables message logging to all supported destinations except the console. Enabled message logging is the default.
[no] logging trap level
Limits the logging messages sent to syslog servers to messages with a level at or above level. The argument level is one of the keywords described for the logging console command.
[no] service keyword
Tailors use by the network server of network-based services. The argument keyword is one of the following:
The no service command disables the specified service or function.
no snmp-server
Disables the SNMP operations.
[no] snmp-server access-list list
Sets up an access list that determines which hosts can send requests to the network server. The argument list is an integer from 1 through 99 that specifies an IP access list.
[no] snmp-server community string [RO|RW] [list]
Enables or disables SNMP server operation on the network server. The argument string specifies a community string that acts like a password and permits access to the SNMP protocol.
[no] snmp-server host address community-string [snmp|tty]
Specifies which host or hosts should receive TRAP messages. Issue the snmp-server host command once for each host acting as a TRAP recipient. The argument address is the name or Internet address of the host. The argument community-string is the password-like community string set with the snmp-server community command. These optional keywords direct the TRAP:
[no] snmp-server packetsize bytes
Sets or removes control over the largest SNMP packet size permitted when the SNMP server is receiving a request or generating a reply. The argument bytes is a byte count from 484 through 8192. The default is 484.
[no] snmp-server queue-length length
Defines the length of the message queue for each TRAP host. The argument length is the number of TRAP events that can be held before the queue must be emptied; the default is ten. The no version of the command resets the queue length to the default.
[no] snmp-server system-shutdown
Allows or restricts use of the SNMP message reload feature, and prevents an SNMP system-shutdown request from resetting the Cisco agent.
[no] snmp-server trap-authentication
Allows or restricts the network server from sending a TRAP message when it receives a packet with an incorrect community string.
[no] snmp-server trap-timeout seconds
Defines how often to try resending TRAP messages on the retransmission queue. The argument seconds sets the interval for resending the messages. The default is set to 30 seconds. The no form of the command restores the default.
[no] tacacs-server attempts count
Controls the number of login attempts that may be made on a line set up for TACACS verification. The argument count is the number of attempts. The default is three attempts.
[no] tacacs-server authenticate {connect|slip|enable}
Specifies that a response is required from the network or communications server to indicate whether the user may perform the indicated action. Actions which require a response include the following:
The no form of the command disables the action.
[no] tacacs-server extended
Enables or disables an extended TACACS mode. This mode provides information about the terminal requests for use in setting up UNIX auditing trails and accounting files for tracking use of terminal servers and routers.
[no] tacacs-server host name
Specifies a TACACS host. The argument name is the name or Internet address of the host. You can use multiple commands to specify multiple hosts.
[no] tacacs-server last-resort {password|succeed}
Causes the network server to request the privileged password as verification, or forces successful login without further input from the user, depending upon the keyword specified, as follows.
The no form of the command disables the action.
[no] tacacs-server notify {connect|slip|enable|logout}
Causes a message to be transmitted to the TACACS server, with retransmission being performed by a background process for up to five minutes. The keywords specify notification of the TACACS server whenever a user does one of the following:
The no form of the command disables the messages.
tacacs-server optional-passwords
Specifies that the first TACACS request to a TACACS server is made without password verification. Supports all TACACS requests--login, SLIP, enable, and so on.
[no] tacacs-server retransmit retries
Specifies the number of times the server will search the list of TACACS server hosts before giving up. The argument retries is the retransmit count. The default is two retries. The no form of the command restores the default.
[no] tacacs-server timeout seconds
Sets the interval the server waits for a server host to reply. The argument seconds specifies the number of seconds. The default interval is five seconds. The no form of the command restores the default.
[no] tftp-server system filename ip-access-list
Specifies or removes TFTP server operation for a communications server. The argument filename is the name given to the network server ROM file, and the argument access-list is an IP access list number.
username name [nopassword|password encryptiontype password]
username name [accesslist number]
username name [autocommand command]
username name [noescape] [nohangup]
Create special case user name-based authentications. Multiple username commands can be used to specify options for a single user.
The nopassword keyword means that no password is required for this user to log in. This is usually most useful in combination with the autocommand keyword.
The password keyword specifies a possibly encrypted password for this user name.
The encryptiontype argument is a single digit number. Currently defined encryption types are 0, which means no encryption, and 7, which specifies a Cisco-defined encryption algorithm. Passwords entered unencrypted are written out with the Cisco encryption. Passwords can contain imbedded spaces and must be the last option specified in the username command.
The accesslist keyword specifies an outgoing access list that overrides the access list specified in the access class line configuration subcommand. It is used for the duration of the user's session. The access list number is specified by the number argument.
The autocommand keyword causes the command specified by the command argument to be issued automatically after the user logs in. When the command is complete, the session is terminated. As the command can be any length and contain imbedded spaces, commands using the autocommand keyword must be the last option on the line.
The noescape keyword prevents a user from using an escape character on the host to which he is connected.
The nohangup keyword prevents the network server from disconnecting the user after an automatic command (set up with the autocommand keyword) has completed. Another login prompt is provided to the user.
This section contains a summary of all the line configuration subcommands in alphabetical order.
[no] access-class list {in|out}
Restricts or permits connections on a line or group of lines to certain Internet addresses. The argument list is an integer from 1 through 99 that identifies a specific access list of Internet addresses. The keyword in applies to incoming connections; the keyword out applies to outgoing Telnet connections.
[no] escape-character decimal-number
Sets or removes the escape character on the specified line. The argument decimal-number is either the ASCII decimal representation of the character or a control sequence
(Ctrl-E, for example). The default escape character is Ctrl-^.
[no] exec-banner
Enables or disables a banner. By default, a banner is displayed on the console. To suppress display of a banner, enter the no variation of the command.
[no] exec-timeout minutes [seconds]
Sets the interval the EXEC waits for user input before resuming the current connection, or if no connections exist, before returning the terminal to the idle state and disconnecting the incoming session. The argument minutes is the number of minutes, and the optional argument seconds specifies additional interval time in seconds. The default interval is ten minutes; an interval of zero specifies no time-outs. The no form of the command restores the default.
[no] length screen-length
Sets the terminal screen length. The argument screen-length is the number of lines on the screen. The network server uses this value to determine when to pause during multiple-screen output. The default length is 24 lines. A value of 0 (zero) or the no form of the command disables pausing between screens of output.
line [type-keyword] first-line [last-line]
Identifies a specific line for configuration and starts line configuration command collection. The optional argument type-keyword specifies the type of line to be configured, it is console, aux, or vty. When the line type is specified, the argument first-line is the relative number of the terminal line (or the first line in a contiguous group) you want to configure. The optional argument last-line then is the relative number of the last line in a contiguous group you want to configure. If you omit type, then first-line and last-line are absolute rather than relative line numbers.
line aux port-address
This variation of the line command configures the auxiliary port. When configuring the auxiliary port, address it as line 0.
[no] location text
Enters or removes informational only information about the terminal location and/or status. The argument text is the desired description.
[no] login
Enables or disables password checking for the password specified by the password command.
[no] login tacacs
Causes the TACACS user ID and password checking mechanism to be used instead of the regular password checking. The no form of the command disables this mechanism.
[no] notify
Enables or disables line notification of when a user who has multiple, concurrent Telnet connections has output pending on a connection other than the current line.
[no] padding decimal-number count
Sets or unsets padding for a specified output character. The argument decimal-number is the ASCII decimal representation of the character, and the argument count is the number of NUL bytes sent after that character.
[no] password text
Specifies a password. The text argument specifies a password. It may contain any alphanumeric characters, including spaces, up to 80 characters. The no version of the command removes the specified password.
[no] vacant-message [c message c]
Controls whether or not a banner is displayed on the screen of an idle terminal. The command without any arguments causes the default message to be displayed. The no vacant-message command suppresses a banner message. To display a banner, follow vacant-message with one or more blank spaces and a delimiting character (c) you choose, then type one or more lines of text (message), and terminate the text with the second occurrence of the delimiting character.
|