|
|
Product Numbers: GRP-B=, GRP=
This configuration note describes the Gigabit Route Processor (GRP), which is used in the Cisco 12000 series of Gigabit Switch Routers (GSRs), and serves as the main system processor for the GSRs.
Following are the sections in this document:
The Cisco IOS software running your router contains extensive features and functionality that is documented in supporting publications. For additional information on configuring and maintaining the Cisco 12000 series routers and the GRP.
Information about the Gigabit Route Processor (GRP) (see Figure 1), its components, functions and features, and its use as the main system processor for the Cisco 12000 series routers is presented in the following sections.
Product overview:

The GRP is available as Product Number GRP-B=, which includes one GRP, with 128 MB of DRAM (default configuration), and one 20-MB Flash memory card.
The primary functions of the GRP for Cisco 12000 series routers follow:
The GRP contains the following components:
The Cisco IOS software images that run the Cisco 12000 series system reside in Flash memory, which is located on the GRP in the form of a single in-line memory module (SIMM) and on up to two PCMCIA cards (called Flash memory cards), which insert in the two PCMCIA slots (slot 0 and slot 1) on the front of the GRP. (See Figure 2.)
Storing the Cisco IOS images in Flash memory enables you to download and boot from upgraded Cisco IOS software images remotely or from software images reside in GRP Flash memory.
The Cisco 12000 series system supports downloadable system software for most Cisco IOS software upgrades, which enables you to remotely download, store, and boot from a new Cisco IOS software image. The Cisco IOS software runs from within GRP DRAM.
GRP Memory component types are presented in Figure 2, GRP (Horizontal Orientation). Their functions are presented in Table 1, GRP Memory Components.

| Type | Size | Quantity | Description | Location |
|---|---|---|---|---|
DRAM | 641 to 256 MB | 1 or 2 | 64- or 128 MB DIMMs (based on the required DRAM configuration) for main Cisco IOS software functions (default configuration is | U39 (bank 1) |
SRAM3 | 512 KB (fixed) | --- | SRAM for secondary CPU cache memory functions | --- |
NVRAM4 | 512 KB (fixed) | 1 | NVRAM for system configuration files | --- |
Flash memory | 8 MB SIMM5 | 1 | Contains Cisco IOS software images, system configuration files, and other user-defined files on the GRP | U17 |
| 206 MB PCMCIA-based | 1 to 2 | Contains Cisco IOS software images, system configuration files, and other user-defined files on up to two PCMCIA-based Flash memory cards7 | PCMCIA slot 0 |
Flash boot ROM | 512 KB | 1 | Flash EPROM for the ROM monitor program boot image | --- |
| 164 MB of DRAM serves as a replacement for any DRAM DIMM slot on a minimum configuration of 128 MB (both slots populated) for the GRP. 2Default DRAM configuration is 128 MB. Bank 1 (U39) must be populated first; user can use a one or both banks to configure DRAM up 256 MB. 3SRAM is not user configurable or field upgradeable. 4NVRAM is not user configurable or field upgradeable. 5SIMM socket is wired for Cisco's own design and does not accept industry-standard 80-pin Flash SIMMs. 620-MB Flash memory card is the default shipping configuration. 7Type 1 and Type 2 PCMCIA cards can be used in either PCMCIA slot. Refer to Table 2 for specific, allowable PCMCIA card configurations. |
DRAM stores routing tables, protocols, and network accounting applications, and runs the Cisco IOS software. The standard (default) GRP configuration is 128 MB of extended data output (EDO) DRAM, with up to 256 MB available through DIMM upgrades.
![]() | Caution To prevent memory problems, DRAM DIMMs must be +3.3 VDC, 60-nanosecond (ns) EDO devices. Do not attempt to install other devices in the DIMM sockets. We recommend you use Cisco-approved memory options. (Refer to Table 16 in the section "Upgrading GRP Memory.") |
The following DRAM upgrade kits for GRP and line cards are available (listed by product number):
SRAM provides secondary CPU cache memory. The standard GRP configuration is 512 KB. Its principal function is to act as a staging area for routing table updates information to and from the line cards. SRAM is not user configurable or field upgradeable.
System configuration files, software configuration register settings, and environmental monitoring logs are contained in the 512-KB NVRAM, which is backed up with built-in lithium batteries that retain the contents for a minimum of 5 years. NVRAM is not user configurable or field-upgradeable.
Both the onboard and PCMCIA card-based Flash memory allow you to remotely load and store multiple Cisco IOS software and microcode images. You can download a new image over the network or from a local server and then add the new image to Flash memory or replace the existing files. You can then boot the routers either manually or automatically from any of the stored images.
Flash memory also functions as a TFTP server to allow other servers to boot remotely from stored images or to copy them into their own Flash memory. The onboard Flash memory (called bootflash) contains the Cisco IOS software boot image, and the Flash memory card contains the Cisco IOS software image. A Flash memory card is available as Product Number MEM-GRP-FL20=, which is a 20-MB PCMCIA Flash memory card that ships as a spare or as a part of a Cisco 12000 series system.
The two types of system status LEDs used on the GRP.
The GRP has the following eight LED indicators:
The alphanumeric LED displays are organized as two rows of four characters each. The display content is controlled by the GRP's MBus module software. Both rows of the display are powered by the MBus module.
These alphanumeric LED displays provide system status messages that are displayed during the boot process and after the boot process is completed.
During the boot process, the alphanumeric LED displays are controlled directly by the MBus. After the boot process, they are controlled by the Cisco IOS software (via the MBus), and display messages designated by the Cisco IOS software.
The LED displays indicate the following:
A soft reset switch provides a reset to the R5000's software on the GRP. You access the soft reset switch through a small opening in the GRP's faceplate. To depress the switch, you must insert a paperclip or a similar sharp pointed object into the opening.
![]() | Caution To prevent system problems or loss of data, use the soft reset switch only at the advice of Cisco service personnel. |
The GRP has two PCMCIA slots available. Either slot can support a Flash memory card or an input/output (I/O) device as long as the PCMCIA device requires only +5 VDC.
Specific combinations of different PCMCIA cards are supported by the GRP. (See Table 2.) Each PCMCIA slot has an ejector button for ejecting a PCMCIA card from the slot.
| PCMCIA Slot 0 (Left Side) | PCMCIA Slot 1 (Right Side) |
|---|---|
Type 1 or 2 | Empty |
Empty | Type 1 or 2 |
Type 1 or 2 | Type 1 or 2 |
Two asynchronous serial ports on the GRP, the console and auxiliary ports, allow you to connect external serial devices to monitor and manage the system. The console port is an Electronic Industries Association/Telecommunications Industry Association (EIA/TIA)-232 receptacle (female) that provides a data circuit-terminating equipment (DCE) interface for connecting a console terminal.
The auxiliary port is an EIA/TIA-232 plug (male) that provides a data terminal equipment (DTE) interface; the auxiliary port supports flow control and is often used to connect a modem, a channel service unit (CSU), or other optional equipment for Telnet management.
The GRP has one Ethernet port available, using one of the following two connection types:
We recommend that you do the following before beginning any of the procedures in this document:
The GRP line card is initially supported in Cisco IOS Release 11.2(9)GS. See Cisco IOS release notes for more information.
You can use the show version and show hardware commands to display the current hardware configuration of the router, including the system software release that is currently loaded and running.
For complete descriptions of show commands, refer to the Configuration Fundamentals Configuration Guide and Configuration Fundamentals Command Reference publications, which are available on the Documentation CD-ROM or as printed copies.
If the displays indicate that the required system software is not available in your system, refer to the section "Cisco Connection Online" at the end of this configuration note for information on contacting customer service.
The following sections provide safety guidelines you should follow when working with any equipment that connects to electrical power or telephone wiring.
Safety warnings appear throughout this publication in procedures that, if performed incorrectly, may harm you. A warning symbol precedes each warning statement.
![]() | Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. To see translations of the warnings that appear in this publication, refer to the Regulatory Compliance and Safety Information document that accompanied this device. |
Waarschuwing Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij elektrische schakelingen betrokken risico's en dient u op de hoogte te zijn van standaard maatregelen om ongelukken te voorkomen. Voor vertalingen van de waarschuwingen die in deze publicatie verschijnen, kunt u het document Regulatory Compliance and Safety Information (Informatie over naleving van veiligheids- en andere voorschriften) raadplegen dat bij dit toestel is ingesloten.
Varoitus Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja tavanomaisista onnettomuuksien ehkäisykeinoista. Tässä julkaisussa esiintyvien varoitusten käännökset löydät laitteen mukana olevasta Regulatory Compliance and Safety Information -kirjasesta (määräysten noudattaminen ja tietoa turvallisuudesta).
Attention Ce symbole d'avertissement indique un danger. Vous vous trouvez dans une situation pouvant causer des blessures ou des dommages corporels. Avant de travailler sur un équipement, soyez conscient des dangers posés par les circuits électriques et familiarisez-vous avec les procédures couramment utilisées pour éviter les accidents. Pour prendre connaissance des traductions d'avertissements figurant dans cette publication, consultez le document Regulatory Compliance and Safety Information (Conformité aux règlements et consignes de sécurité) qui accompagne cet appareil.
Warnung Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur Vermeidung von Unfällen bewußt. Übersetzungen der in dieser Veröffentlichung enthaltenen Warnhinweise finden Sie im Dokument Regulatory Compliance and Safety Information (Informationen zu behördlichen Vorschriften und Sicherheit), das zusammen mit diesem Gerät geliefert wurde.
Avvertenza Questo simbolo di avvertenza indica un pericolo. La situazione potrebbe causare infortuni alle persone. Prima di lavorare su qualsiasi apparecchiatura, occorre conoscere i pericoli relativi ai circuiti elettrici ed essere al corrente delle pratiche standard per la prevenzione di incidenti. La traduzione delle avvertenze riportate in questa pubblicazione si trova nel documento Regulatory Compliance and Safety Information (Conformità alle norme e informazioni sulla sicurezza) che accompagna questo dispositivo.
Advarsel Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan føre til personskade. Før du utfører arbeid på utstyr, må du vare oppmerksom på de faremomentene som elektriske kretser innebærer, samt gjøre deg kjent med vanlig praksis når det gjelder å unngå ulykker. Hvis du vil se oversettelser av de advarslene som finnes i denne publikasjonen, kan du se i dokumentet Regulatory Compliance and Safety Information (Overholdelse av forskrifter og sikkerhetsinformasjon) som ble levert med denne enheten.
Aviso Este símbolo de aviso indica perigo. Encontra-se numa situação que lhe poderá causar danos físicos. Antes de começar a trabalhar com qualquer equipamento, familiarize-se com os perigos relacionados com circuitos eléctricos, e com quaisquer práticas comuns que possam prevenir possíveis acidentes. Para ver as traduções dos avisos que constam desta publicação, consulte o documento Regulatory Compliance and Safety Information (Informação de Segurança e Disposições Reguladoras) que acompanha este dispositivo.
¡Advertencia! Este símbolo de aviso significa peligro. Existe riesgo para su integridad física. Antes de manipular cualquier equipo, considerar los riesgos que entraña la corriente eléctrica y familiarizarse con los procedimientos estándar de prevención de accidentes. Para ver una traducción de las advertencias que aparecen en esta publicación, consultar el documento titulado Regulatory Compliance and Safety Information (Información sobre seguridad y conformidad con las disposiciones reglamentarias) que se acompaña con este dispositivo.
Varning! Denna varningssymbol signalerar fara. Du befinner dig i en situation som kan leda till personskada. Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och känna till vanligt förfarande för att förebygga skador. Se förklaringar av de varningar som förkommer i denna publikation i dokumentet Regulatory Compliance and Safety Information (Efterrättelse av föreskrifter och säkerhetsinformation), vilket medföljer denna anordning.
Follow these basic guidelines when working with any electrical equipment:
Use the following guidelines when working with any equipment that is connected to telephone wiring or to other network cabling:
Electrostatic discharge (ESD) damage, which can occur when components are improperly handled, can result in complete or intermittent failures. The GRP consists of a printed circuit card that is fixed in a metal carrier. Electromagnetic interference (EMI) shielding and connectors are integral components of the carrier. Although the metal carrier helps to protect the printed circuit card from ESD, use an ESD-preventive wrist or ankle strap whenever you handle any electronic system component.
Following are guidelines for preventing ESD damage:
![]() | Caution For safety, periodically check the resistance value of the antistatic strap. The measurement should be between 1 and 10 megohms. |
You need the following tools and parts to remove and replace a GRP. If you need additional equipment, contact a Cisco customer service representative for ordering information.
The following sections describe the procedures for replacing a GRP in your system.
Before beginning the procedures, verify that your system meets the minimum requirements as described in the section "Installation Prerequisites" on page 9.
When your system meets those requirements, proceed to the section "Removing a GRP" for instructions on removing the GRP, and then to the section "Installing a GRP" section, for reinstallation instructions.
![]() | Caution We recommend you do not remove a GRP while the system is operating. Removing the installed GRP from a system while the system is operating will cause the system to stop forwarding packets and might cause the system to cease network operation. |
When you remove a GRP from a slot, be sure to use the ejector levers, which help to ensure that the GRP is fully dislodged from the backplane connector. (See Figure 3.)

![]() | Caution A GRP that is only partially removed from the backplane can halt the system. |
![]() | Caution Before you replace the GRP, back up the running configuration to a Trivial File Transfer Protocol (TFTP) file server or an installed Flash memory card so that you can retrieve it later. If the configuration is not saved, the entire configuration will be lost---inside the NVRAM on the removed GRP---and you will have to reenter the entire configuration manually. For instructions on how to save the configuration file, refer to the section "Copying Files to Flash Memory" section. This procedure is not necessary if you are temporarily removing a GRP; lithium batteries will retain the configuration in memory until you replace the GRP in the system. |
Figure 4 shows the ejector levers.

Use the following procedure to remove a GRP:
Step 1 Turn off system power.
Step 2 If you are replacing the GRP in a system with one GRP, copy the currently running configuration file to a TFTP server or Flash memory so that you can retrieve it later. (Refer to the section "Copying Files to Flash Memory" section.)
Step 3 Attach an antistatic wrist strap to yourself and to one of the two ESD connection sockets located on the front edges of the upper card cage (Cisco 12012 or Cisco 12016); to the ESD connection socket located on the lower left edge of the upper card cage (Cisco 12008); or to bare metal on the frame.
If you are replacing a GRP, disconnect any devices that are attached to the console or auxiliary ports. If you are removing a GRP for maintenance and will reinstall the same one, you can leave the devices attached, provided that doing so will not strain the cables.
Step 4 Using a 3/16-inch flat-blade screwdriver, loosen the two captive screws on the ends of the GRP. (See Figure 4a.)
Step 5 Place your thumbs on the ends of each of the ejector levers and simultaneously pull them both away from the GRP faceplate (in the direction shown in Figure 4b) to release the GRP from the upper card cage slot, and to dislodge the GRP edge connector from the backplane.
Step 6 Grasp the GRP faceplate with one hand and pull the GRP straight out of the slot, keeping your other hand under the GRP to guide it. (See Figure 4.) Keep the GRP edge connector parallel to the backplane. Avoid touching the GRP printed circuit board, components, or any edge connector pins.
Step 7 Place the removed GRP on an antistatic mat or foam. If you plan to return the GRP to the factory, immediately place it in an antistatic bag to prevent ESD damage.
This completes the GRP removal procedure. If you removed the GRP to replace memory devices, proceed to the appropriate section in this publication, or to your specific Cisco GSR installation and configuration guide.
To replace a GRP, proceed to the section, "Installing a GRP."
When you install a GRP, be sure to use the ejector levers, which help to ensure that the GRP is fully inserted in the backplane connector. (See Figure 3.) When you simultaneously push the ejector levers inward (toward the center of the GRP), the ejector levers push the GRP into the slot and ensure that the GRP backplane connector is fully seated in the backplane.
![]() | Caution A GRP that is only partially connected to the backplane can halt the system. |
Use the following procedure to install a GRP:
Step 1 Always use an ESD-preventive wrist or ankle strap and ensure that it makes good skin contact. Connect the equipment end of the strap to one of the two ESD connection sockets located on the front edges of the upper card cage (Cisco 12012 or Cisco 12016); to the ESD connection socket located on the lower left edge of the upper card cage (Cisco 12008); or to bare metal on the frame.
Step 2 Grasp the GRP faceplate with one hand and place your other hand under the carrier to support and guide it into an upper card cage slot. (See Figure 4.) Avoid touching the GRP printed circuit board, components, or any edge connector pins.
Step 3 Place the bus-connector edge of the GRP in the appropriate slot and align the notches along the edge of the carrier with the grooves at the top and bottom of the slot.
Step 4 While keeping the GRP edge connector parallel to the backplane, carefully slide the carrier into the slot until the GRP faceplate makes contact with the ejector levers, then stop.
Step 5 Using the thumb and forefinger of each hand to pinch each ejector lever, simultaneously push both ejectors toward the center of the GRP faceplate until they are perpendicular to the GRP faceplate. (See Figure 4a.)
Step 6 Using a 3/16-inch flat-blade screwdriver, tighten the captive screws on the ends of the GRP. The captive screws prevent the GRP from becoming partially dislodged from the backplane and ensure proper EMI shielding. (These captive screws must be tightened to meet EMI specifications.)
Step 7 If you disconnected the console terminal to remove the GRP, or if you are installing a new GRP, connect the console terminal to the console port. (Refer to the section "Connecting to the Console Port" on page 17.)
Step 8 Ensure that the console terminal is turned on.
Step 9 Turn on system power.
This completes the GRP replacement procedure.
The system console port on the GRP is a DCE DB-25 receptacle for connecting a data terminal, which you must to configure. The console port is labeled Console, as shown in Figure 5. Before connecting the console port, check your terminal's documentation to determine the baud rate of the terminal you plan to use. The baud rate of the terminal must match the default baud rate (9600 baud). Set up the terminal as follows: 9600 baud, 8 data bits, no parity, and 2 stop bits (9600, 8N2). The console port requires a straight-through EIA/TIA-232 cable. Use the console cable provided to connect the terminal to the console port on the GRP.

The console port on the GRP is an EIA/TIA-232, DCE DB-25 receptacle. Both Data Set Ready (DSR) and Data Carrier Detect (DCD) signals are active when the system is running. The console port does not support modem control or hardware flow control. Table 3 lists the pinout for this port.
| Console Port Pin | Signal | Direction | Description |
|---|---|---|---|
1 | GND | --- | Signal Ground |
2 | TxD | <--- | Transmit Data (from DTE) |
3 | RxD | ---> | Receive Data (to DTE) |
6 | DSR | ---> | Data Set Ready (always on) |
7 | GND | --- | Signal Ground |
8 | DCD | ---> | Data Carrier Detect (always on) |
The auxiliary port on the GRP is an EIA/TIA-232 DTE, DB-25 plug for connecting a modem or other DCE device (such as a CSU/DSU or another router) to the router. The port is labeled Auxiliary. An example of a modem connection is shown in Figure 5. The asynchronous auxiliary port supports hardware flow control and modem control. Table 4 lists the pinout for this port.
| Auxiliary Port Pin | Signal | Direction | Description |
|---|---|---|---|
2 | TxD | ---> | Transmit Data (to DCE) |
3 | RxD | <--- | Receive Data (from DCE) |
4 | RTS | ---> | Request To Send (used for hardware flow control) |
5 | CTS | <--- | Clear To Send (used for hardware flow control) |
6 | DSR | <--- | Data Set Ready |
7 | GND | - | Signal Ground |
8 | CD | <--- | Carrier Detect (used for modem control) |
20 | DTR | ---> | Data Terminal Ready (used for modem control only) |
This section provides information you need to make connections to the Ethernet port on your GRP.
The two Ethernet interface receptacles on the GRP are a single media independent interface (MII), 40-pin, D-shell type receptacle, and a single RJ-45 receptacle. The RJ-45 receptacle provides a media dependent interface (MDI) Ethernet port. You can use either one or the other, but not both at the same time. Each connection supports IEEE 802.3 and IEEE 802.3u interfaces compliant with the 10Base-T and 100Base-TX standards. The transmission speed of the Ethernet port is auto-sensing and is determined by the network to which the Ethernet interface is connected; transmission speed is not user-configurable.
Figure 6 shows the GRP RJ-45 receptacle and cable connectors. The RJ-45 connection does not require an external transceiver. The RJ-45 connection requires Category 5 unshielded twisted-pair (UTP) cables, which are not available from Cisco Systems, but are available from commercial cable vendors. Table 5 lists the pinout for the RJ-45 receptacle.

![]() | Warning The ports labeled Ethernet, 10BASE-T, Token Ring, Console, and AUX are safety extra-low voltage (SELV) circuits. SELV circuits should only be connected to other SELV circuits. Because the BRI circuits are treated like telephone-network voltage, avoid connecting the SELV circuit to the telephone network voltage (TNV) circuits. |
| Pin | Description |
|---|---|
1 | TxD+ |
2 | TxD- |
3 | RxD+ |
4 | Termination Network |
5 | Termination Network |
6 | RxD- |
7 | Termination Network |
8 | Termination Network |
Depending on your RJ-45 cabling requirements, use the cable pinouts shown in Figure 7 and Figure 8.


The MII connection requires an external physical sublayer (PHY) and an external transceiver. Depending on the type of media you use between the MII connection on the GRP and your switch or hub, the network side of your 100Base-T transceiver should be appropriately equipped---with SC-type or ST-type connectors (for optical fiber), BNC connectors, and so forth. Figure 9 shows the pin orientation of the female MII receptacle on GRP.
The MII receptacle uses two 56 screw-type locks, called jackscrews (see in Figure 9), to secure the cable or transceiver to the MII port. MII cables and transceivers have knurled thumbscrews (screws that you can tighten with your fingers) that you fasten to the jackscrews on the GRP's MII connector. Use the jackscrews to provide strain relief for your MII cable. (The RJ-45 modular plug has strain relief functionality incorporated into the design of its standard plastic connector.)

Table 6 lists the MII connector pinout and signals. MII cables and transceivers are not available from Cisco Systems, but are available commercially.
| Pin1 | Signal | Input | Output | Input/Output | Description |
|---|---|---|---|---|---|
14 to 17 | TxD | --- | Yes | --- | Transmit Data |
12 | Tx_CLK | Yes | --- | --- | Transmit Clock2 |
11 | Tx_ER | --- | Yes | --- | Transmit Error |
13 | Tx_EN | --- | Yes | --- | Transmit Enable |
3 | MDC | --- | Yes | --- | MII Data Clock |
4 to 7 | RxD | Yes | --- | --- | Receive Data |
9 | Rx_CLK | Yes | --- | --- | Receive Clock |
10 | Rx_ER | Yes | --- | --- | Receive Error |
8 | Rx_DV | Yes | --- | --- | Receive Data Valid |
18 | COL | Yes | --- | --- | Collision |
19 | CRS | Yes | --- | --- | Carrier Sense |
2 | MDIO | --- | --- | Yes | MII Data Input/Output |
22 to 39 | GND | --- | --- | --- | Common ground |
1, 20, 21, 40 | V | --- | --- | --- | +5.0 VDC |
| 1Any pins not indicated are not used. 2The signals Tx_CLK and Rx_CLK are generated by the external transceiver. |
Table 7 lists the cabling specifications for 100-Mbps transmission over unshielded twisted-pair (UTP) and shielded twisted-pair (STP) cables.
| Parameter | RJ-45 | MII |
|---|---|---|
Cable specification | Category 3, 4, or 5, 150-ohm UTP or STP, or multimode optical fiber | |
Cable length (maximum) | --- | 1.64 ft (0.5 m) (MII-to-MII cable4) |
Segment length (maximum) | 328 ft (100 m) for 100Base-TX | 3.28 ft (1 m)5 or 1312 ft (400 m) for 100Base-FX |
Network length (maximum) | 656 ft (200 m)5 (with 1 repeater) | --- |
| 1EIA/TIA-568 or EIA-TIA-568 TSB-36 compliant. 2Cisco Systems does not supply Category 5 UTP RJ-45 or 150-ohm STP MII cables or MII transceivers; these items are available commercially. 3AWG = American Wire Gauge. This gauge is specified by the EIA/TIA-568 standard. 4This is the cable between the MII port on the GRP and the appropriate transceiver. 5This length is specifically between any two stations on a repeated segment. |
Table 8 lists IEEE 802.3u physical characteristics for 100Base-TX.
| Parameter | 100Base-TX |
|---|---|
Data rate (Mbps) | 100 |
Signaling method | Baseband |
Maximum segment length (meters) | 100 m between DTE1 and repeaters |
Category 5 UTP (for RJ-45) or MII | |
Topology | Star/Hub |
| 1DTE = data terminal equipment. |
Use the following procedure to connect cables to the GRP's Ethernet interface:
MII connections---Attach an MII cable directly to the MII receptacle on the GRP or attach a 100Base-T transceiver with the media appropriate to your application to the MII port on the GRP. (See Figure 10.) Be sure to use the appropriate strain relief on cable connections.
RJ-45 connections---Attach the Category 5 UTP cable directly to the RJ-45 receptacle on the GRP. (See Figure 10.)
The Ethernet interface on the GRP is an end station device, not a repeater; therefore, you must connect the Ethernet interface to a repeater or hub.

![]() | Caution To prevent problems on your system and network, do not simultaneously connect RJ-45 and MII cables to one GRP's Ethernet interface. On a single GRP, only one Ethernet connection can be used at one time. Only connect cables that comply with EIA/TIA-568 standards. (Refer to Table 7 and Table 8 for cable recommendations and specifications.) |
Step 10 Attach the network end of your RJ-45 or MII cable to your transceiver, switch, hub, repeater, DTE, or other external equipment. Be sure to use the appropriate strain relief on cable connections.
Figure 11 shows an example of the functionality of the Ethernet port. In this example, you cannot access Network 2.0.0.0 via the Ethernet port (E0) on the GRP in Router A; you can only access the hosts and Router C, which are in Network 1.0.0.0. (See dotted arrows in Figure 11.)
To access Network 2.0.0.0 from Router A, you must use an interface port on one of your line cards (in this example, a packet-over-SONET line card in Router A) to go through Router B, through Router C, and into Network 2.0.0.0. (See solid arrows in Figure 11.)

This completes the procedure for Ethernet cable connection.
The following sequence describes a typical GRP boot process:
This section describes the initial system startup processes and procedures.
Use the following procedure to start your system:
Step 1 Turn on each installed power supply by turning its system power switch to the ON (|) position.
For AC-input power supplies, the green AC OK LED should go on. For DC-input power supplies, the green input OK LED should go on. For both types of power supplies, the output fail LED should be off.
Step 2 Listen for the system blower modules in the Cisco 12012 or Cisco 12016, or fan trays in the Cisco 12008; you should immediately hear them operating. In a noisy environment, the Cisco 12012 or Cisco 12016 blowers or 12008 fans might be difficult to hear; therefore, place your hand in front of the exhaust vents to verify that the blower modules are operating.
Step 3 During the GRP boot process, observe the GRP alphanumeric LED displays, which are located at one end of the GRP, near the ejector lever. (See Figure 12.)
Each 4-digit display is capable of showing system messages, and displays a sequence similar to that shown in Table 9.

| LED Display | Indications |
|---|---|
MRAM | GRP microcode loads into MBus random-access memory (RAM); where nnnn is the microcode version. For example, Microcode Version 1.17 displays as 0117.1 |
MSTR | This GRP is enabled and recognized by the system. |
| 1The version of microcode running on your GRP might be different. |
Step 4 During the line card boot process, which occurs immediately after the GRP boots, observe the alphanumeric LED indicators on each line card. The system attempts to boot identical line cards in parallel. Further, the system boots line cards as soon as they are powered on and become available for a system boot. (The physical location of the alphanumeric LED displays on the line cards is the same as on the GRP, which is shown in Figure 12.)
Each line card displays a sequence similar to that shown in Table 10.
| LED Display1 | Indication |
FABL | Line card waits for the fabric downloader to begin loading into DRAM.2 |
FABL | Fabric downloader loads into DRAM. |
FABL | Fabric downloader launches from DRAM. |
FABL | Fabric downloader runs in DRAM. |
IOS | Cisco IOS software downloads. |
IOS | Cisco IOS software launches. |
IOS | Cisco IOS software runs in DRAM. |
IOS | Line card is enabled and ready for use. |
| 1The sequence shown in Table 10 might occur too quickly for you to view; therefore, this sequence is provided as a baseline for how the line cards should function at startup. 2The fabric downloader loads the Cisco IOS software image onto the line card. |
You must meet the following criteria:
The system automatically boots this Cisco IOS software image. The system then enters the setup facility, where you are prompted to perform a basic configuration of the system (as shown in Step 6).
Otherwise, the system enters the ROM monitor and the appropriate prompt appears (rommon>); you must then proceed to Step 5.
Step 5 If the ROM monitor prompt (rommon>) appears, you must boot the Cisco IOS software image you want to use by entering the appropriate b command at the ROM monitor prompt (>):
![]() | Caution To prevent system problems, use the b flash command option carefully; otherwise, you might instruct the system to boot a non-Cisco IOS software image from Flash memory. |
While the system boots, the console screen displays a script and system banner similar to the following:
Cisco Internetwork Operating System Software IOS (tm) GS Software (GSR-P-MZ), Released Version 11.2(9)GS Copyright (c) 1986-1997 by cisco Systems, Inc. Compiled Sat 10-May-97 06:02a
Observe the system startup banner. When you start up an unconfigured system for the first time, the system automatically enters the setup facility, which determines which interfaces are installed and prompts you for configuration information for each one.
On the console terminal, after the system displays the system banner and hardware configuration, the following System Configuration Dialog prompt appears:
--- System Configuration Dialog ---At any point you may enter a question mark '?' for help.Use ctrl-c to abort configuration dialog at any prompt.Default settings are in square brackets '[]'.Continue with configuration dialog? [yes/no]:
You have the option of proceeding with the setup facility or exiting from setup and using configuration commands to configure global (system-wide) and interface-specific parameters. You do not have to configure the interfaces immediately; however, you cannot enable the interfaces or connect them to any networks until you have configured them.
The interface-specific LEDs on line cards might not go on until after you configure the line card interfaces. In order to verify correct operation of each interface, complete the first-time setup procedures and configuration, then refer to the LED descriptions in the configuration notes for each line card to check the status of the interfaces.
This section provides functional descriptions of the LED indicators on the GRP (see Figure 13) and the behavior you should observe.
The LEDs on the GRP indicate system and GRP status, which Flash memory card slot is active, and which Ethernet connection is in use and what is occurring on the Ethernet interface. (A successful boot is indicated by the alphanumeric LED displays as shown in Table 9; however, this does not necessarily mean that the system has reached normal operation.)
The GRP has the following eight LED indicators:

The IEEE 802.3 Ethernet interface, located on the GRP, allows connections to external Ethernet networks and is capable of data transmission rates of 10 Mbps and 100 Mbps. At the auto-sensed data transmission rate of 100 Mbps, the Ethernet port provides maximum usable bandwidth that is less than 100 Mbps; a maximum usable bandwidth of approximately 20 Mbps can be expected if you are using either the MII or RJ-45 connection. Transmission speed which is not user-configurable is determined by the network to which the Ethernet interface is connected.
Further, the Ethernet interface does not provide external routing functions; it is primarily designed as a Telnet port into the GRP, and for booting and/or accessing Cisco IOS software images over a network to which the Ethernet interface is directly connected.
The following sections provide two methods for configuring the Ethernet interface.
Use the following procedure to perform a basic configuration of the Ethernet interface in configuration mode:
Step 1 At the privileged-level prompt, enter configuration mode and specify that the console terminal is the source of the configuration subcommands as follows:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#
Step 2 At the configuration mode prompt, specify the Ethernet interface by entering the subcommand interface, followed by the type (ethernet) and port (0) as follows:
Router(config)# interface ethernet 0 Router(config-if)#
Step 3 Determine the physical Ethernet connection you want to use (RJ-45 or MII), then use the media-type type command as appropriate for your physical Ethernet connection:
Router(config-if)# media-type type
Where type is RJ45 or MII. The system default is RJ45.
Step 4 If IP routing is enabled on the system, you can assign an IP address and subnet mask to the interface with the ip address configuration subcommand, as in the following example:
Router(config-int)# ip address 1.1.1.10 255.255.255.0
Step 5 Add any additional configuration subcommands required to enable or disable routing protocols (such as the no ip mroute-cache command) and to set other interface characteristics.
Step 6 Change the shutdown state to up and enable the Ethernet interface as follows:
Router(config-int)# no shutdown
Step 7 When you have included all of the configuration subcommands to complete the configuration, press Ctrl-Z to exit configuration mode.
Step 8 Write the new configuration to nonvolatile memory as follows:
Router# copy running-config startup-config [OK] Router#
In the following example of an Ethernet configuration using the setup command facility, the Ethernet interface is configured using IP and CLNS. (In this example, you want to use IP, CLNS, and the default RJ-45 Ethernet connection.)
Enter the setup facility using the setup command and respond as appropriate for your needs, using your own address and mask for the setup prompts.
(Additional displayed text omitted from this example.) Configuring interface Ethernet0: Is this interface in use?: yes Configure IP on this interface?: yes IP address for this interface: 3.3.1.1 Number of bits in subnet field: 8 Class A network is 3.0.0.0, 8 subnet bits; mask is 255.255.0.0 Configure CLNS on this interface?: yes
This completes the procedures for configuring the Ethernet port on a GRP installed in a Cisco 12000 series system.
This section contains information on the following additional configuration, troubleshooting, and maintenance tasks:
The system uses a 16-bit software configuration register, which allows you to set specific system parameters. Settings for the software configuration register are written into NVRAM.
Following are some reasons for changing the software configuration register settings:
Table 11 lists the meaning of each of the software configuration memory bits, and Table 12 defines the boot field, specified as a binary number which consists of bits 0 through 3 of the software configuration register.
![]() | Caution To avoid confusion and possibly halting the Cisco 12000 series router, remember that valid configuration register settings might be combinations of settings and not just the individual settings listed in Table 11. For example, the factory default value of 0x0102 is a combination of settings. |
| Bit Number1 | Hexadecimal | Meaning |
|---|---|---|
00 to 03 | 0x0000 to 0x000F | Boot field (see Table 12) |
06 | 0x0040 | Causes system software to ignore NVRAM contents |
07 | 0x0080 | OEM2 bit enabled |
08 | 0x0100 | Break disabled |
09 | 0x0200 | Use secondary bootstrap |
10 | 0x0400 | Internet Protocol (IP) broadcast with all zeros |
11 to 12 | 0x0800 to 0x1000 | Console line speed (default is 9600 baud) |
13 | 0x2000 | Boot default Flash software if network boot fails |
14 | 0x4000 | IP broadcasts do not have network numbers |
15 | 0x8000 | Enable diagnostic messages and ignore NVRAM contents |
| 1The factory default value for the configuration register is 0x0102. This value is a combination of the following: binary bit 8 = 0x0100 and binary bits 00 through 03 = 0x0002 (see Table 12). 2OEM = original equipment manufacturer |
| Boot Field | Meaning |
|---|---|
00 | Stays at the system bootstrap prompt. |
01 | Boots the first system image in onboard Flash memory. |
02 to 0F | Specifies a default filename for booting over the network. Enables boot system commands that override the default filename. |
Bits 0 through 3 of the software configuration register form the boot field, specified as a binary number.
Boot field---When the boot field is set to either 0 or 1 (0-0-0-0 or 0-0-0-1), the system ignores any boot instructions in the system configuration file and the following occurs:
You can enter the boot command only, or include additional boot instructions with the command such as the name of a file stored in Flash memory or a file that you specify for booting from a network server. If you use the boot command without specifying a file or any other boot instructions, the system boots from the default Flash image (the first image in onboard Flash memory). Otherwise, you can instruct the system to boot from a specific Flash image (using the boot system flash filename command), or boot from a network server by sending broadcast TFTP requests (using the boot system filename command), or send a direct TFTP request to a specific server (using the boot system filename ip-address command).
You can also use the boot command to boot images stored in the Personal Computer Memory Card International Association (PCMCIA) Flash memory cards located in PCMCIA slot 0 or slot 1 on the GRP. If you set the boot field to any bit pattern other than 0 or 1, the system uses the resulting number to form a filename for booting over the network.
To form this filename, the system starts with cisco and links the octal equivalent of the boot field value and the processor type in the following format: cisco<bootfieldvalue>-<processorname>; for example, cisco2-grp. The system uses this filename to invoke the system image by booting over the net. However, if the configuration file contains any boot instructions, the system uses those boot instructions instead of the filename it computed from the configuration register settings.
You must set the boot field for the boot functions you require.
Use the following procedure to change the configuration register while running the system software:
Step 1 Enter the enable command and your password to enter privileged level as follows:
Router> enable Password: Router#
Step 2 Enter the configure terminal command at the privileged-level system prompt (#), also called the enabled prompt. You are prompted, as shown in the following example:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#
Step 3 Set the contents of the configuration register by entering the config-register value configuration command, where value is a hexadecimal number preceded by 0x (see Table 11), as in the following example:
Router(config)# config-register 0xvalue
Step 4 Exit configuration mode by entering Ctrl-Z.
The new value settings are saved to memory; however, the new settings do not take effect until the system software is reloaded by rebooting the system.
Step 5 Display the configuration register value currently in effect, which will be used at the next reload by entering the show version EXEC command.
The value is displayed on the last line of the screen display, as in the following example:
Configuration register is 0x141 (will be 0x102 at next reload)
Step 6 Save your settings.
Configuration register changes take effect only after the system reloads, such as when you issue a reload command from the console.
Step 7 Reboot the system. The new configuration register value takes effect with the next system boot.
This completes the procedure for making configuration register changes.
The lowest 4 bits of the software configuration register (bits 3, 2, 1, and 0) form the boot field. (See Table 12.) The boot field specifies a number in binary form. If you set the boot field value to 0, you must boot the operating system manually by entering the b command at the bootstrap prompt (>).
If you set the boot field value to 0x2 through 0xF and there is a valid boot system command stored in the configuration file, the Cisco 12000 series router boots the system software as directed by that value. If there is no boot system command, the Cisco 12000 series router forms a default boot filename for booting from a network server. (See Table 13 for the format of these default filenames.)
In the following example, the software configuration register is set to boot the system from onboard Flash memory and to ignore Break at the next reboot of the system:
Router# conf term Enter configuration commands, one per line. End with CNTL/Z. Router(config)# config-register 0x0102 Router(config)# boot system flash [filename] Crtl-z Router#
The server creates a default boot filename as part of the automatic configuration process. To form the boot filename, the server starts with the name cisco and adds the octal equivalent of the boot field number, a hyphen, and the processor-type name (grp).
Table 13 lists the default boot filenames. A boot system configuration command in the configuration file in NVRAM overrides the default filename created for booting over the network.
| Action/File Name | Bit 3 | Bit 2 | Bit 1 | Bit 0 |
|---|---|---|---|---|
Bootstrap mode | 0 | 0 | 0 | 0 |
Default software | 0 | 0 | 0 | 1 |
cisco2-grp | 0 | 0 | 1 | 0 |
cisco3-grp | 0 | 0 | 1 | 1 |
cisco4-grp | 0 | 1 | 0 | 0 |
cisco5-grp | 0 | 1 | 0 | 1 |
cisco6-grp | 0 | 1 | 1 | 0 |
cisco7-grp | 0 | 1 | 1 | 1 |
cisco10-grp | 1 | 0 | 0 | 0 |
cisco11-grp | 1 | 0 | 0 | 1 |
cisco12-grp | 1 | 0 | 1 | 0 |
cisco13-grp | 1 | 0 | 1 | 1 |
cisco14-grp | 1 | 1 | 0 | 0 |
cisco15-grp | 1 | 1 | 0 | 1 |
cisco16-grp | 1 | 1 | 1 | 0 |
cisco17-grp | 1 | 1 | 1 | 1 |
Bit 8 controls the console Break key. Setting bit 8 (the factory default) causes the system to ignore the console Break key. Clearing bit 8 causes the system to interpret the Break key as a command, which forces the system into the bootstrap (or ROM) monitor, thereby halting normal operation. Regardless of the setting of the break enable bit, a break causes a return to the ROM monitor during the first few seconds (approximately 5 seconds) of booting.
Bit 9 is unused.
Bit 10 controls the host portion of the IP broadcast address. Setting bit 10 causes the processor to use all zeros; clearing bit 10 (the factory default) causes the processor to use all ones. Bit 10 interacts with bit 14, which controls the network and subnet portions of the broadcast address.
Table 14 shows the combined effect of bits 10 and 14.
| Bit 14 | Bit 10 | Address (<net> <host>) |
|---|---|---|
Off | Off | <ones> <ones> |
Off | On | <zeros> <zeros> |
On | On | <net> <zeros> |
On | Off | <net> <ones> |
Bits 11 and 12 in the configuration register determine the data transmission rate of the console terminal. Table 15 shows the bit settings for the four available rates. (The factory-set default data transmission rate is 9600.)
| Baud | Bit 12 | Bit 11 |
|---|---|---|
9600 | 0 | 0 |
4800 | 0 | 1 |
2400 | 1 | 1 |
1200 | 1 | 0 |
Bit 13 determines the server response to a bootload failure. Setting bit 13 causes the server to load operating software from Flash memory after five unsuccessful attempts to load a boot file from the network. Clearing bit 13 causes the server to continue attempting to load a boot file from the network indefinitely. By factory default, bit 13 is cleared to 0.
Procedures for using Flash memory cards in the Gigabit Route Processor (GRP) and information on the following Flash memory card functions is presented in the following sections:
The GRP has two PCMCIA slots---slot 0 and slot 1---into which you can install a Flash memory card. The slots are positioned with slot 0 on the left and slot 1 on the right. (See Figure 14.)

Both slots can be used at the same time. The following procedure is a generic one and can be used for a Flash memory card in either slot position.
Use the following procedures for installing a Flash memory card:
Step 1 Facing the GRP front panel, hold the Flash memory card with the connector end of the card toward the slot and the label facing right. (See Figure 14a.)
Step 2 Insert the card into the appropriate slot until the card completely seats in the connector at the back of the slot, and the ejector button pops out toward you. (See Figure 14b.)
Note that the card does not insert all the way inside the GRP; a portion of the card remains outside of the slot. Do not attempt to force the card past this point.
Use the following procedures for removing a Flash memory card:
Step 1 To eject the card, press the ejector button until the card is free of the connector at the back of the slot. (See Figure 14c.)
Step 2 Remove the card from the slot and place it in an antistatic bag to protect it.
The Flash memory card that shipped with your router contains the Cisco IOS software image you need to boot your router. In some cases, you might need to insert a new Flash memory card and copy images or backup configuration files onto it. Before you can use a new Flash memory card, you must format it.
![]() | Caution The following formatting procedure erases all information on the Flash memory card. To prevent the loss of important data that might be stored on a Flash memory card, proceed carefully. If you want to save the data on a Flash memory card, copy the data to a server before you format the card. |
Use the following procedure to format a new Flash memory card:
Step 1 Insert the Flash memory card into slot 0. (Use the procedure in the section "Installing and Removing Flash Memory Card in GRP" on page 34.) If slot 0 is not available, use slot 1.
Step 2 Enter the format slot0: (or format slot1:) command as follows:
Router# format slot0: All sectors will be erased, proceed? [confirm] Enter volume id (up to 30 characters): MyNewCard Formatting sector 1 Format device slot0 completed Router#
The new Flash memory card is now formatted and ready to use.
For complete command descriptions and configuration information, refer to the Configuration Fundamentals Command Reference and the Configuration Fundamentals Configuration Guide. (For information on obtaining these publications, refer to the section "More Information" section.)
Use the following series of commands to specify that a Cisco IOS software image is bootable. (In this example, the file is named new.image.) Note that because the configuration register must be set to 0x2102, the config-register command is part of the sequence.
Router# config terminal Router(config)# no boot system Router(config)# boot system flash slot0:new.image Router(config)# config-register 0x2102 Crtl-z Router# copy running-config startup-config Router# reload
When the system reloads, it will boot the Cisco IOS software image from the Flash memory card in slot 0.
Following are software commands related to the onboard Flash memory on the GRP and the Flash memory cards.
You can determine which memory media you are accessing using the pwd command as follows:
Router# pwd slot0
You can move between Flash memory media using the cd device-name command, where device-name can be slot1:, slot0:, or bootflash:. Examples follow:
Router# cd slot1: Router# pwd slot1 Router# cd slot0: Router# pwd slot0
You can list the directory of Flash memory media using the dir [device-name] command, where device-name can be slot0:, slot1:, or bootflash:. An example of the dir command follows:
Router# dir -#- -length- -----date/time------ name 1 4601977 May 10 1997 09:42:19 myfile1 6 679 May 10 1997 05:43:56 todays-config 7 1 May 10 1997 09:54:53 fun1
You can delete a file from any Flash memory media using the delete filename command, where filename is any file within Flash memory. An example of deleting the file fun1 from the Flash memory card in slot 0 follows:
Router# delete fun1 Router# dir -#- -length- -----date/time------ name 1 4601977 May 10 1997 09:42:19 myfile1 6 679 May 10 1997 05:43:56 todays-config
Files that are deleted are marked as deleted, but still occupy space in Flash memory. The command squeeze device-name (where device-name can be slot0:, slot1:, or bootflash:), removes them permanently and pushes all other undeleted files together to eliminate spaces between them.
An example of the squeeze command follows:
Router# squeeze slot0: All deleted files will be removed, proceed? [confirm] Squeeze operation may take a while, proceed? [confirm] ebESZ
To prevent loss of data due to sudden power loss, the "squeezed" data is temporarily saved to another location of Flash memory, which is specially used by the system.
In the preceding command display output, the character
The configuration register setting 0x0101 tells the system to boot the default image (the first image) from onboard Flash memory, but not reset the Break disable or check for a default filename to be booted over the network. The configuration register setting 0x0102 tells the system to boot from Flash memory if netboot fails, disable Break, and check for a default netboot filename.
For more information on the copy tftp:filename [bootflash: | slot0: | slot1: ]:filename command and other related commands, refer to the set of configuration and reference publications.
To enable booting from Flash memory, set configuration register bits 3, 2, 1, and 0 to a value between 2 and 15 in conjunction with the boot system flash device-name:filename configuration command, where device-name is bootflash:, slot0:, or slot1:, and filename is the name of the file from which you want to boot the system.
To enter configuration mode while in the system software image and specify a Flash filename from which to boot, enter the configure terminal command at the enable prompt as follows:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)# boot system flash device:filename
To disable Break and enable the boot system flash device:filename command, enter the config-register command with the value shown in the following example:
Router(config)# config-reg 0x0102 Crtl-z Router#
Use the command copy tftp:filename [ bootflash: | slot0: | slot1: ]:filename for the copy procedure, where tftp:filename is the source of the file, and [ bootflash: | slot0: |
slot1: ]:filename is the destination in onboard Flash memory or on either of the Flash memory cards.
An example of the copy tftp:filename command follows:
Router# copy tftp:myfile1 slot0:myfile1 20575008 bytes available on device slot0, proceed? [confirm] Address or name of remote host [1.1.1.1]? Loading new.image from 1.1.1.1 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!![OK - 7799951/15599616 bytes] CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Router#
In the preceding example, the exclamation points (!!!) appear as the file is downloaded, and the C characters signify calculation of the cyclic redundancy check (CRC) value, which is a verification that the file has been correctly downloaded to the Flash memory card.
You can copy a Cisco IOS software image into Flash memory; however, you must first format the Flash memory card and make the image in the Flash memory card bootable. (If you have not already done this, refer to the sections "Formatting Flash Memory Card" and "Specifying Cisco IOS Image Used to Boot the System" on page 37.)
To copy a Cisco IOS software image, use the procedure in this section, which is based on the following assumptions:
Use the following procedure to copy a bootable image into the Flash memory card:
Step 1 Boot the router and allow it to initialize.
Step 2 Enable the router and copy the image new.image to the Flash memory card in slot 0 using the following series of commands:
Router> en Password: Router# copy tftp:new.image slot0:new.image 20575008 bytes available on device slot0, proceed? [confirm] Address or name of remote host [1.1.1.1]? Loading new.image from 1.1.1.1 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK - 7799951/15599616 bytes] CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Router#
In the preceding example, the exclamation points (!!!) appear as the file is downloaded, and the "C" characters signify calculation of the cyclic redundancy check (CRC) value, which is a verification that the file has been correctly downloaded to the Flash memory card. You must now reboot the system.
This completes the procedure for copying a bootable image into a Flash memory card.
As future releases of Cisco IOS software become available, you will receive these images either as a file booted from a network server, a file on floppy disk, or a file on a Flash memory card.
The following scenario describes how to use a newly released Cisco IOS software image on a Flash memory card in a system that has an older image on a Flash memory card in slot 0 and a default boot Cisco IOS software image in the onboard Flash memory.
For this scenario, the filenames are as follows:
You will copy the new Cisco IOS software image from the new Flash memory card onto the Flash memory card that contains the old Cisco IOS software image.
Use the following procedure to copy bootable Cisco IOS software images between Flash memory cards:
Step 1 Boot the router. (For this example, the file image.boot is used.)
Step 2 Enable the router as follows:
Router> en Password: Router#
Step 3 Insert the new Flash memory card in slot 1.
Step 4 Use the following command to copy the file image.new in slot 1 to the Flash memory card in slot 0, only if there is enough memory space for the two images to coexist:
Router# copy slot1:image.new slot0:image.new
You can also enter the previous command as copy slot1:image.new slot0:.
Step 5 Use the following series of commands to designate the file image.new (in the Flash memory card in slot 0) as the default boot image:
Router# config t Router(config)# no boot system Router(config)# boot system flash slot0:image.new Crtl-z Router# copy running-config startup-config Router# reload
When the system reloads, it will boot the file image.new from the Flash memory card in slot 0.
This completes the procedure for copying bootable images between Flash memory cards.
Use the procedures in the following sections to first copy the configuration file from either NVRAM or DRAM to a Flash memory card, and then to copy the configuration file from a Flash memory card back to NVRAM.
Use the following procedure to copy a configuration file from GRP NVRAM to a Flash memory card:
Step 1 Use the show boot command to display the current setting for the environmental variable CONFIG_FILE as follows:
Router# show boot (display text omitted) CONFIG_FILE variable = Current CONFIG_FILE variable = (display text omitted)
The preceding example shows that the environmental variable CONFIG_FILE is set for NVRAM, by default.
Step 2 Enter the copy startup-config slot0:filename command as follows:
Router# copy startup-config slot0:myfile2 20575008 bytes available on device slot0, proceed? [confirm] Address or name of remote host [1.1.1.1]? Loading new.image from 1.1.1.1 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!![OK - 7799951/15599616 bytes] CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Router#
Step 3 Verify that the file was copied correctly using the dir command as follows:
Router# dir slot0: -#- -length- -----date/time------ name 1 5200084 May 10 1997 19:24:12 gsr-p-mz.112-8 3 1215 May 10 1997 20:30:52 myfile1 4 6176844 May 10 1997 23:04:10 gsr-p-mz.112-8.1 5 1186 May 10 1997 16:56:50 myfile2 9197156 bytes available (11381148 bytes used) Router#
This completes the procedure for copying a configuration file between GRP NVRAM and a Flash memory card.
You can use the command copy running-config [ slot0: | slot1: ]:filename, where running-config is the file's source (the temporary configuration in DRAM), and [slot0: | slot1: ]:filename is the file's destination in either of the Flash memory cards.
Use the copy running-config slot0:filename command as follows:
Router# copy running-config slot0:myfile2 20575008 bytes available on device slot0, proceed? [confirm] Address or name of remote host [1.1.1.1]? Loading new.image from 1.1.1.1 (via Ethernet0): !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!![OK - 7799951/15599616 bytes] CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC Router#
In the preceding example, the exclamation points (!!!) appear as the file is copied. The C characters signify calculation of the checksum---a verification that the file was correctly copied.
Use the dir command to verify the file was copied correctly as follows:
Router# dir slot0: -#- -length- -----date/time------ name 1 5200084 May 10 1997 19:24:12 gsr-p-mz.112-8 3 1215 May 10 1997 20:30:52 myfile1 4 6176844 May 10 1997 23:04:10 gsr-p-mz.112-8.1 5 1186 May 10 1997 16:56:50 myfile2 9197156 bytes available (11381148 bytes used)
This completes the example showing how to copy a configuration file from GRP DRAM to a Flash memory card.
Following is an example of copying your startup configuration file from a Flash memory card in PCMCIA slot 0 or slot 1 back to NVRAM.
You can use the command copy [ slot0: | slot1: ]:filename startup-config, where [slot0 | slot1]:filename is the source of the file (Flash memory card), and startup-config is the destination (NVRAM).
Use the copy slot0:filename startup-config command as follows:
Router# copy slot0:myfile startup-config [ok] Router#
Use the copy startup-config running-config command to ensure that the startup configuration file, now stored in NVRAM, is the default running configuration file used by the system as follows:
Router# copy startup-config running-config Router# %SYS-5-CONFIG_I: Configured from memory by console Router#
This completes the example of copying a configuration file from a Flash memory card to NVRAM.
A locked block in Flash memory cards occurs when power is lost, or a Flash memory card is unplugged during a write or erase operation. When a block of Flash memory is locked, it cannot be written to or erased, and the operation will consistently fail at a particular block location. The only way to recover from locked blocks is to reformat the Flash memory card with the format command. (Refer to the section "Formatting Flash Memory Card" on page 36.)
![]() | Caution Formatting a Flash memory card causes data it contains to be lost. |
This section provides information on how to recover a lost password.
The following overview describes this process:
Use the following procedure to recover a lost password.
Step 1 Attach an ASCII terminal to the GRP console port.
Step 2 Configure the terminal to operate at 9600 bps, 8 data bits, no parity, 2 stop bits (or to whatever settings the console port is set).
Step 3 Enter the show version command to display the existing configuration register value. Note this value for later use in Step 13.
Step 4 If Break is disabled, power cycle the router. (To power cycle, turn off power, wait
5 seconds, and then turn it on again.) If Break is enabled on the router, press the Break key or send a break by holding down the Control key and pressing the right square bracket key (^]); then proceed to Step 5.
Step 5 Within 5 seconds of turning on the router, press the Break key. This action causes the terminal to display the bootstrap program prompt as follows:
rommon 1>
Step 6 Set the configuration register to ignore the configuration file information as follows:
rommon 1> confreg Configuration Summary enabled are: console baud: 9600 boot: image specified by the boot system command or default to: cisco2-grp do you wish to change the configuration? y/n [n]: y enable "diagnostic mode"? y/n [n]: enable "use net in IP bcast address"? y/n [n]: enable "load rom after netbootfails"? y/n [n]: enable "use all zero broadcast"? y/n [n]: enable "break/abort has effect?" y/n [n]: enable "ignore system config info?" [n]: y change console baud rate? y/n [n]: change boot characteristics? y/n [n] Configuration Summary enabled are: console baud: 9600 boot: image specified by the boot system command or default to: cisco2-grp Do you wish to change the configuration? y/n [n] You must reset or power cycle for the new config to take effect
Step 7 Initialize the router by entering the i command as follows:
rommon 1> i
The router power cycles, the configuration register is set to ignore the configuration file, and the router boots the boot system image and prompts you with the system configuration dialog as follows:
--- System Configuration Dialog ---
Step 8 Enter no in response to the system configuration dialog prompts until the following system message is displayed:
Press RETURN to get started!
Step 9 Press Return.
After some interface information displays, the prompt appears as follows:
Router>
Step 10 Enter the enable command to enter enabled mode.
The prompt changes to the following:
Router#
Step 11 Enter the show start-up config EXEC command to display the enable password in the configuration file.
Step 12 Enter the configure terminal command at the EXEC prompt.
You are prompted as follows:
Router# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Router(config)#
Change the configuration register value back to its original value (noted from Step 3.)
Change it to a value of 0x0102 (factory default) using the config-register 0x value command.
Step 13 Enter Ctrl-Z to exit configuration mode.
Step 14 Reboot the router and enable it using the recovered password.
This completes the procedure for recovering a lost password.
This section provides the procedure for increasing the amount of extended data output (EDO) DRAM on a GRP by replacing up to two dual in-line memory modules (DIMMs). The system DRAM resides on up to two DIMMs on the GRP. The DRAM DIMM sockets are U39 (bank 1) and U42 (bank 2). (See Figure 15 and Table 16.)
The default DRAM configuration is 128 MB (one 128-MB DIMM in U39).

Before proceeding, ensure that you have the proper tools and ESD-prevention equipment available. To upgrade DRAM, you install DIMMs in one or two banks (U39 and U42). Table 16 lists the various available configurations of DRAM DIMMs, the number of DIMMs for each configuration, and the DRAM banks they occupy. Note which banks you should use given the combinations of available DIMM sizes and the maximum DRAM you require.
| Total DRAM | Product Numbers | DRAM Sockets | Number of DIMMs |
|---|---|---|---|
64 MB1 | MEM-GRP/LC-64(=) | U39 (bank 1) | 1 64-MB DIMM |
128 MB | MEM-GRP/LC-64(=) | U39 (bank 1) and U42 (bank 2) | |
128 MB | MEM-GRP/LC-128(=) | U39 (bank 1) | 1 128-MB DIMM |
256 MB | MEM-GRP/LC-256(=) | U39 (bank 1) and U42 (bank 2) | |
| 164 MB is the standard (default) DRAM configuration for the GRP. |
![]() | Caution To prevent system and memory problems when installing DRAM, make sure that the card's DRAM DIMMS are +3.3VDC, 60-ns, EDO devices. Do not attempt to install other DRAM devices in the GRP's DIMM sockets. |
This section provides the procedure for removing DIMMs. As you remove DIMMs, place them on an antistatic mat or store them in an antistatic bag. You can use the DIMMs that you remove in other compatible equipment.
![]() | Caution To prevent ESD damage, handle DIMMs by the card edges only. |
Use the following procedure to remove the existing DIMM(s):
Step 1 Turn off the system power.
Step 2 Attach an antistatic wrist strap to yourself and to one of the two ESD connection sockets located on the front edges of the upper card cage (Cisco 12012 or Cisco 12016); to the ESD connection socket located on the lower left edge of the upper card cage (Cisco 12008); or to bare metal on the frame.
Step 3 Remove the GRP. (Follow the steps in the section "Removing a GRP" on page 14.)
Step 4 Place the GRP on an antistatic mat or pad.
Step 5 Position the GRP so that the faceplate is toward you, and the backplane connector is away from you. (See Figure 15.)
Step 6 Locate the DRAM DIMMs on the GRP. The DIMMs occupy U39 (bank 1) and U42 (bank 2). (See Figure 15.)
Step 7 For the DIMM you want to remove, pull down the lever on the DIMM socket to release the DIMM from the socket. (See Figure 16.)
Step 8 When one end of the DIMM is released from the socket, grasp each end of the DIMM with your thumb and forefinger and pull the DIMM completely out of the socket. Handle the edges of the DIMM only (see Figure 17); avoid touching the memory module or pins and the metal traces, or fingers, along the socket edge.
Step 9 Place the DIMM in an antistatic bag to protect it from ESD damage.
Step 10 Repeat Steps 6 through 9 for the remaining DIMM, if required for your upgrade.
This completes the DIMM removal procedure. Proceed to "Installing New DIMMs" to install the new DIMMs.
This section provides the procedure for installing new DIMMs.
![]() | Caution To prevent system and memory problems when installing DRAM, make sure that the card's DRAM DIMMS are +3.3VDC, 60-ns, EDO devices. Do not attempt to install other DRAM devices in the GRP's DIMM sockets. |
![]() | Caution DIMMs are sensitive components that can be shorted by mishandling; they are susceptible to ESD damage. Handle DIMMs by the edges only (see Figure 17); avoid touching the DIMMs, pins, or traces (the metal fingers along the connector edge of the DIMM). |

Use the following procedure to install the new DIMMs:
Step 1 Attach an antistatic wrist strap to yourself and to one of the two ESD connection sockets located on the front edges of the upper card cage (Cisco 12012 or Cisco 12016); to the ESD connection socket located on the lower left edge of the upper card cage (Cisco 12008); or to bare metal on the frame.
Step 2 Place the GRP on an antistatic mat or pad.
Step 3 Position the GRP so that the faceplate is toward you, and the backplane connector is away from you. (See Figure 15.)
Step 4 Remove a new DIMM from the antistatic bag.
Step 5 Hold the DIMM component-side up, with the connector edge (the metal fingers) closest to you. Hold the ends of the DIMM between your thumb and forefinger. (See Figure 17.)
Step 6 Tilt the DIMM to approximately the same angle as the socket and insert the entire connector edge into the socket.
Note the two notches (keys) on the connector edge of the DIMM. (See Figure 17.) These keys are intended to ensure correct orientation of the DIMM in the socket.
Step 7 Gently push the DIMM into the socket until the lever is flush against the side of the DIMM socket (see Figure 16), and the DIMM's backplane connector is fully inserted. If necessary, rock the DIMM gently back and forth to seat it properly.
Step 8 When the DIMM is installed, check that the release lever is flush against the side of the DIMM socket. If it is not, the DIMM might not be seated properly. If the DIMM appears misaligned, carefully remove it and reseat it in the socket. Push the DIMM firmly back into the socket until the release lever is flush against the side of the DIMM socket.
![]() | Caution When inserting DIMMs, use firm but not excessive pressure. If you damage a socket, you will have to return the GRP to the factory for repair. |
Step 9 Repeat Steps 4 through 8 for the remaining DIMM, as required.
This completes the DIMM replacement procedure. Replace the GRP in the slot from which you removed it. (See the section "Installing a GRP" on page 16.) Then restart the system for an installation check.
After you install the new DIMMs and replace the GRP, turn on system power and allow the system to reboot.
If the system fails to boot properly, or if the console terminal displays a checksum or memory error, check the following:
If after several attempts the system fails to restart properly, contact a service representative for assistance. Before you call, make note of any error messages, unusual LED states, or any other indications that might help solve the problem.
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case users will be required to correct the interference at their own expense.
You can determine whether your equipment is causing interference by turning it off. If the interference stops, it was probably caused by the Cisco equipment or one of its peripheral devices. If the equipment causes interference to radio or television reception, try to correct the interference by using one or more of the following measures:
Modifications to this product not authorized by Cisco Systems, Inc. could void the FCC approval and negate your authority to operate the product.
This class A digital apparatus complies with Canadian ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
This Apparatus complies with EN55022 Class B and EN50082-2 standard requirements in Europe.
This is a class B product based on the standard of the Voluntary Control Council for Interference from Information Technology Equipment (VCCI). If this is used near a radio or television receiver in a domestic environment, it may cause radio interference. Install and use the equipment according to the instruction manual.

Cisco Connection Online (CCO) is Cisco Systems' primary, real-time support channel. Maintenance customers and partners can self-register on CCO to obtain additional information and services.
Available 24 hours a day, 7 days a week, CCO provides a wealth of standard and value-added services to Cisco's customers and business partners. CCO services include product information, product documentation, software updates, release notes, technical tips, the Bug Navigator, configuration notes, brochures, descriptions of service offerings, and download access to public and authorized files.
CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.
You can access CCO in the following ways:
For a copy of CCO's Frequently Asked Questions (FAQs), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.
If you are a network administrator and need personal technical assistance with a Cisco product that is under warranty or covered by a maintenance contract, contact Cisco's Technical Assistance Center (TAC) at 800 553-2447, 408 526-7209, or tac@cisco.com. To obtain general information about Cisco Systems, Cisco products, or upgrades, contact 800 553-6387, 408 526-7208, or cs-rep@cisco.com.

![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue Jul 4 04:38:41 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.