|
|
This chapter describes how to initially configure the Cisco DSLAMs, and includes these sections:
The DSLAM default configuration is suitable for operation with most networks. By using network management applications and the text-based command-line interface (CLI), you can configure and customize all aspects of DSLAM operation to suit your needs.
The DSLAM ships with the ATM address autoconfigured, allowing the DSLAM to:
The ILMI and PNNI protocols allow the DSLAM to be entirely self-configured when you use these protocols with an IP address autoconfiguration mechanism such as BOOTP.
You must assign an IP address to allow up to eight simultaneous Telnet sessions to connect to the DSLAM or to use the Simple Network Management Protocol (SNMP) system for the DSLAM. The Ethernet IP address is assigned either manually or by a BOOTP server. See the "Configuring IP Interface Parameters" section.
You can use either of two methods for configuring a DSLAM (Figure 3-1):

The DSLAM contains a single NI-2 card and up to 34 line (modem) cards. The NI-2 card handles the network interfaces. The NI-2 card has either OC3 or DS3 interfaces.
Line cards are assigned ports 1 to 4 or 1 to 8 in consecutive slots. Table 3-1 lists NI-2 port assignments. Figure 3-2 shows the port connection arrangement.
| Port Type | OC3 Configuration Assigned slot/port | DS3 Configuration Assigned slot/port | Function |
|---|---|---|---|
Switch, Ethernet | 0/0 | 0/0 | The ATM switch or Ethernet CPI port (internal). |
Trunk | 0/1 | 0/1 | The trunk port connects to the network, either directly or through a subtended port in another DSLAM. |
Subtend 1 | 0/2 | 0/2 | A subtended port connects a second DSLAM to the network through a primary DSLAM. See Figure 3-3. |
Subtend 2 | N/A | 0/3 | The DS3 configuration has a second subtended port. |

Obtain this information before you configure your DSLAM:
When you first power on your console and DSLAM, a screen similar to this appears:
Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
cisco Systems, Inc.
170 West Tasman Drive
San Jose, California 95134-1706
Cisco Internetwork Operating System Software
IOS (tm) PNNI Software (LS-WP-M), Version XX.X(X.X.WAX.X.XX)
Copyright (c) 1986-1998 by cisco Systems, Inc.
Compiled Tue 11Jan-98 02:59 by
Image text-base: 0x600108D0, data-base: 0x603EE000
8192K bytes of Flash internal SIMM (Sector size 256K).
Press RETURN to get started!
The script then displays the banner information, including the software version, followed by the installed hardware configuration.
cisco ASP1 (R4600) processor with 16384K bytes of memory. Cisco Internetwork Operating System Software IOS (tm) PNNI Software (LS-WP-M), Version XX.X(X.X.WAX.X.XX) Copyright (c) 1986-1998 by cisco Systems, Inc. Compiled Tue 11-Jan-98 02:59 by Image text-base: 0x600108D0, data-base: 0x603EE000 8192K bytes of Flash internal SIMM (Sector size 256K). Press RETURN to get started!
The DSLAM should now be operating correctly and transferring data.
The BOOTP protocol automatically assigns an Ethernet IP address by adding the MAC and IP addresses of the Ethernet port to the BOOTP server configuration file. When the DSLAM boots, it automatically retrieves the IP address from the BOOTP server.
The DSLAM performs a BOOTP request only if the current IP address is set to 0.0.0.0. (This is the default for a new DSLAM or a DSLAM that has had its configuration file cleared using the erase startup-config command.)
To allow the DSLAM to retrieve its IP address from a BOOTP server you must first determine the MAC address of the DSLAM and then add that MAC address to the BOOTP configuration file on the BOOTP server.
These tasks provide an example of how to create a BOOTP server configuration file:
Step | Command | Task |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
This example BOOTP configuration file shows the newly added DSLAM entry:
# /etc/bootptab: database for bootp server (/etc/bootpd) # # Blank lines and lines beginning with '#' are ignored. # # Legend: # # first field -- hostname # (may be full domain name) # # hd -- home directory # bf -- bootfile # cs -- cookie servers # ds -- domain name servers # gw -- gateways # ha -- hardware address # ht -- hardware type # im -- impress servers # ip -- host IP address # lg -- log servers # lp -- LPR servers # ns -- IEN-116 name servers # rl -- resource location protocol servers # sm -- subnet mask # tc -- template host (points to similar host entry) # to -- time offset (seconds) # ts -- time servers <display truncated> ######################################################################### # Start of individual host entries ######################################################################### Switch: tc=netcisco0: ha=0000.0ca7.ce00: ip=192.31.7.97: dross: tc=netcisco0: ha=00000c000139: ip=192.31.7.26: <information deleted>
This section describes how to set the subtend node identifier.
To set the subtend node identifier, use this command:
Command | Task |
|---|---|
|
|
This example sets the DSL subtend node identifier to node 12:
DSLAM# subtend -id 12
The DSLAM is autoconfigured with an ATM address using a hierarchical addressing model similar to the OSI network service access point (NSAP) addresses. PNNI uses this hierarchy to construct ATM peer groups. ILMI uses the first 13 bytes of this address as the switch prefix that it registers with end systems.
![]() |
Note If you manually change an ATM address, you must maintain the uniqueness of the address across the network. |
This section describes the ATM addressing scheme and tells you how to
This section describes the default addressing scheme and the features and implications of using this scheme.
During the initial startup, the DSLAM generates an ATM address using the defaults shown in Figure 3-3.

The default addressing scheme includes:
If you use the default address format, these features and implications apply:
You can configure a new ATM address that replaces the previous ATM address when running IISP software only, or that replaces the previous ATM address and generates a new PNNI node ID and peer group ID:
You can configure multiple addresses for a single switch and use this configuration during ATM address migration. ILMI registers end systems with multiple prefixes during this period until you remove an old address. PNNI automatically summarizes all the switch prefixes in its reachable address advertisement.
For operation with ATM addresses other than the autoconfigured ATM address, use the atm address command to manually assign a 20-byte ATM address to the switch. The atm address command address_template variable can be a full 20-byte address or a 13-byte prefix followed by ellipses (...). Entering the ellipses automatically adds one of the switch's 6-byte MAC addresses in the ESI portion and 0 in the selector portion of the address.
![]() |
Caution ATM addressing can lead to conflicts if you do not configure it correctly. For example, if you configure a new ATM address, you must remove the old one from the configuration. |
When the switch initially powers on without previous configuration data, the ATM interfaces configure automatically on the physical ports. The DSLAM uses ILMI and the physical card type to automatically derive:
You can accept the default ATM interface configuration or overwrite the default interface configuration using the CLI commands (see "Configuring Virtual Connections").
This section describes how to modify an ATM interface from the default configuration listed in "Configuring In-Band Management." You can accept the ATM interface configuration or overwrite the default interface configuration using the CLI commands, which are described in "Configuring Virtual Connections."
This example describes how to modifying an OC-3 interface from the default settings to
To change the configuration of the example ATM interface, perform these tasks, beginning in global configuration mode:
Step | Command | Task |
|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
This example shows how to disable cell-payload scrambling and STS-stream scrambling and changes the SONET mode of operation to Synchronous Digital Hierarchy/Synchronous Transfer Module 1 (SDH/STM-1) of OC-3 physical interface 0/0:
DSLAM(config)# interface atm 0/0 DSLAM(config-if)# no scrambling cell-payload DSLAM(config-if)# no scrambling sts-stream DSLAM(config-if)# sonet stm-1 DSLAM(config-if)# exit
Use the show controller and show running-config commands to display the interface physical layer configuration.
To display the physical interface configuration, use these privileged EXEC commands:
Command | Task |
|---|---|
|
|
|
|
This example displays the OC-3 physical interface configuration after you modify the defaults:
DSLAM# show controller atm 0/0
Interface ATM0/0 is up
Hardware is ATM Swi/Proc
slot 0, unit 0, subunit 0, fci_type 0x00000000,
max_pak_size 4528
particle size 512, pool size 400, cache size 1024, cache end 1024
NICStAR registers:
data[0]: E0228000
config: 32811838
status: F00804
rxStatQH: 38B0000
cellDropCt: 0
vpiVciLookupErrorCt: 0
invalidCellCt: 0
rawCellHead: 38A41E4
timer: 7B5CE7
tstBase: 40000
txStatQB: 38AC000
txStatQH: 38AC010
txStatQT: 0
genPurpose: 8002
vpiVciMsbMask: 0
abrVbrSchTableDesc: 104C000
abrReadyQueuePtr: 0
vbrReadyQueuePtr: 0
rateTableDesc: 14000
txConnState: 8000068
currentTxSchAddr: 41A24
freeBufQueue0Sz: E000000A
freeBufQueue0Sz: E000000A
freeBufQueue1Sz: E000000A
RECEIVE CONNECTION TABLE:
VCD Control Buffer Handle DMA Address
500 E02A8000 0 0
enabled 0, disabled 0, throttled 0
vc_per_vp 4096, max_vp 1, max_vc 4096, total_vc 1
Device values:
IDT252 device number 0, base addr 0xB2001000,
pci base off 0xA0DEAD01
TX Status Queue Base 0xA38AC000
TX Status Queue Tail 0x0
Segmentation Channel Queue 0xA38AE000
Rcv Stat Queue 0xA38B0000
Rcv Stat Queue tail A38B0000
FreeBufQ0Count 0 FreeBufQ0H 0 FreeBufQ0T 0
FreeBufQ1Count 1 FreeBufQ1H A38B45F0 FreeBufQ1T A38B45F0
Tx Buff Descriptor Sp 0xA38B2000
Tx Buff Descriptor Count 64
Free Buff Queue 0 0xA38B2500
Free Buff Queue 1 0xA38B2600
Tx Buff Queue 0xA38B4600
This example displays the OC-3 physical layer scrambling configuration after you modify the defaults:
ni2-3# show running-config Building configuration... Current configuration: ! ! No configuration change since last restart ! version 12.0 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal ! hostname ni2-3 ! enable password lab ! ! dmt-profile default network-clock-select 1 ATM0/1 network-clock-select 2 system ip subnet-zero ip host-routing ip domain-name cisco.com ip name-server 171.69.204.11 ! atm address 47.0091.8100.0000.007b.f444.7801.007b.f444.7801.00 atm router pnni no aesa embedded-number left-justified node 1 level 56 lowest redistribute atm-static ! clock timezone EST -5 clock summer-time EDT recurring ! process-max-time 200 ! interface ATM0/0 ip address 70.0.0.2 255.0.0.0 no ip directed-broadcast map-group test atm cac service-category abr deny atm maxvp-number 0 ! interface Ethernet0/0 ip address 172.27.32.157 255.255.255.0 no ip directed-broadcast no ip proxy-arp no keepalive ! interface ATM0/1 no ip address no ip directed-broadcast no atm auto-configuration no atm ilmi-keepalive no atm address-registration no atm ilmi-enable atm cac service-category abr deny atm manual-well-known-vc atm nni atm pvc 0 500 interface ATM0/0 0 500 encap aal5snap atm oam 0 500 seg-loopback ! interface ATM0/2 no ip address no ip directed-broadcast no atm ilmi-keepalive atm cac service-category abr deny ! ip default-gateway 172.27.144.4 ip classless ! ! map-list test ip 70.0.0.1 atm-vc 500 ! line con 0 exec-timeout 0 0 transport input none line aux 0 line vty 0 4 exec-timeout 0 0 password lab login ! sntp server 171.69.204.139 end
This section describes how to configure IP addresses on the DSLAM processor interfaces. You configure each IP address for one of these types of connections:
![]() |
Note These IP connections are used only for network management. |
To configure the DSLAM to communicate using the Ethernet interface, provide the IP address and subnet mask bits for the interface as described in this section.
This section provides a summary of IP addressing concepts for those who are familiar with IP addressing.
IP addresses are divided into three classes. These classes differ in the number of bits allocated to the network and host portions of the address:
The default IP address is none.
Enter your Internet address in dotted decimal format for each interface you plan to configure.
Subnetting is an extension of the Internet addressing scheme which allows multiple physical networks to exist within a single Class A, B, or C network. The subnet mask determines whether subnetting is in effect on a network. The usual practice is to use a few of the far-left bits in the host portion of the network address to assign a subnet field.
Internet addressing conventions allow a total of 24 host bits for Class A addresses, 16 host bits for Class B addresses, and 8 host bits for Class C addresses. When you are further subdividing your network (that is, subnetting your network), the number of host addressing bits is divided between subnetting bits and actual host address bits. You must specify a minimum of two host address bits, or the subnetwork is not populated by hosts.
![]() |
Note Because all zeros in the host field specifies the entire network, subnetting with subnet address 0 is illegal and is strongly discouraged. |
Table 3-2 provides a summary of subnetting parameters.
| First Class | First Byte | Network Bits | Host Bits | |
|---|---|---|---|---|
| Max Subnet Bits | Min Address Bits | |||
A | 1 to 126 | 8 | 22 | 2 |
B | 128 to 191 | 16 | 14 | 2 |
You define subnet mask bits as a decimal number between
![]() |
Note Do not specify 1 as the number of bits for the subnet field. That specification is reserved by Internet conventions. |
To configure the IP address, perform these tasks, beginning in global configuration mode:
Step | Command | Task |
|---|---|---|
|
|
|
|
|
|
This example shows how to configure the Ethernet CPU interface 0/0 with IP address 172.20.40.93 and subnetwork mask 255.255.255.0, and displays the interface information:
DSLAM# config term
Enter configuration commands, one per line. End with CNTL/Z.
DSLAM(config)#
DSLAM(config)# interface ethernet ?
<0-13> Ethernet interface number
/
DSLAM(config)# interface ethernet 0/0 ?
<cr>
DSLAM(config)# interface ethernet 0/0
DSLAM(config-if)# ip address ?
A.B.C.D IP address
DSLAM(config-if)# ip address 172.20.40.93 ?
A.B.C.D IP subnet mask
DSLAM(config-if)# ip address 172.20.40.93 255.255.255.0
DSLAM(config-if)#
DSLAM# show interface ethernet 0/0
Ethernet 0/0 is up, line protocol is up
Hardware is SonicT, address is 0040.0b0a.1080 (bia 0040.0b0a.1080)
Internet address is 172.20.40.93/24
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, rely 255/255, load 1/255
Encapsulation ARPA, loopback not set, keepalive set (10 sec)
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output 00:00:07, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
58426 packets input, 18346098 bytes, 0 no buffer
Received 58373 broadcasts, 0 runts, 0 giants
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 input packets with dribble condition detected
9350 packets output, 915319 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Use the show running-config command to display the CPU IP address:
DSLAM# show running-config Building configuration... Current configuration: ! version XX.X no service pad service udp-small-servers service tcp-small-servers ! hostname DSLAM ! boot bootldr bootflash:/tftpboot/rbhide/ls-wp-mz.XXX-X.X.WA4.X.XX ! ip host-routing ip rcmd rcp-enable ip rcmd rsh-enable ip rcmd remote-username dplatz ip domain-name cisco.com ip name-server 198.92.30.32 atm filter-set tod1 index 4 permit time-of-day 0:0 0:0 atm qos default cbr max-cell-loss-ratio clp1plus0 12 atm qos default vbr-nrt max-cell-loss-ratio clp1plus0 12 atm address 47.0091.8100.0000.0041.0b0a.1081.0041.0b0a.1081.00 atm address 47.0091.8100.5670.0000.0000.0000.0040.0b0a.1081.00 atm route-optimization percentage-threshold 250 atm router pnni node 1 level 56 lowest redistribute atm-static ! <Information Deleted> ! interface ATM0/1 no keepalive ! interface ATM0/0 no ip address no keepalive atm maxvp-number 0 atm pvc 0 any-vci encap aal5snap ! interface Ethernet0/0 ip address 172.20.40.93 255.255.255.0 ! no ip classless atm route 47.0091.8100.0000... ATM0/0 scope 1 atm route 47.0091.8100.0000.00... ATM0/0 e164-address 1234567 ! line con 0 line aux 0 line vty 0 4 login ! end
Command | Task |
|---|---|
|
|
For example, to test Ethernet connectivity from the DSLAM to a workstation with an IP address of 172.20.40.201, enter the command ping ip 172.20.40.201. If the DSLAM receives a response, this message appears:
DSLAM# ping ip 172.20.40.201 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.20.40.201, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/202/1000 ms
This section describes how to configure network clocking and network clocking for the DSLAM. Each port has a transmit clock and derives its receive clock from the receive data. You can configure transmit clocking for each port in one of these ways:
The DSLAM receives derived clocking, along with data, from a specified interface. For example, in Figure 3-4 the DSLAM extracts transmit clocking, configured as priority one, from the data received at interface 0/1 and distributed as the transmit clock to the rest of the DSLAM. Interface 0/2 then uses network-derived transmit clocking received from interface 0/1.
![]() |
Note Cisco IOS Release 12.1DA does not support network clocking. |

Because the port providing the network clock source could fail, Cisco IOS software provides the ability to configure additional interfaces as clock sources with priorities 1 to 4.
If the network clock source interface stops responding, the software switches to the next highest-configured priority network clock source. For example, Figure 3-5 shows:
![]() |
Note The network clock is, by default, configured as non-revertive. Non-revertive means that if a clock fails, the software selects the next-higher clock until that clock fails, then the next-highest, and so forth. The algorithm to switch to the highest priority best clock only runs if you configure the network-clock-select command as revertive. |

These sections describe network clocking:
To configure the network clocking priorities and sources, use these command in global configuration mode:
Command | Task |
|---|---|
|
|
|
|
|
|
This example sets up the DSLAM's building-integrated time source (BITS) interface as the highest-priority clock source, then configures the BITS interface for T1 at 0.6db (0 to 133 feet, or 0 to 40.5 meters).
DSLAM# config term Enter configuration commands, one per line. End with CNTL/Z. DSLAM(config)# network-clock-select 1 BITS DSLAM(config)# network-clock-select BITS T1 0.6db
This example configures interface 0/1, the trunk, as the second-highest priority timing source.
DSLAM# config term Enter configuration commands, one per line. End with CNTL/Z. DSLAM(config)# network-clock-select 2 atm 0/1
This example configures the DSLAM's own system clock as the third-highest priority timing source.
DSLAM# config term Enter configuration commands, one per line. End with CNTL/Z. DSLAM(config)# network-clock-select 3 system
This example shows how to configure the network clock to revert back to the highest priority clock source after a failure:
DSLAM(config)# network-clock-select revertive DSLAM(config)#
To configure the location from which an interface receives its transmit clocking, perform these tasks, beginning in global configuration mode:
Step | Command | Task |
|---|---|---|
|
|
|
|
|
|
![]() |
Note Network-derived means the highest-priority clock that is both configured and functional. |
This example configures ATM interface 0/1 to receive its transmit clocking from a network-derived source:
DSLAM(config)# interface atm 0/1 DSLAM(config-if)# clock source network-derived DSLAM(config-if)#
This example displays the network clocking configuration shown in Figure 4-3:
DSLAM# show network-clocks Priority 1 clock source: ATM0/0 Priority 2 clock source: ATM0/2 Priority 3 clock source: ATM 0/1 Priority 4 clock source: No clock Priority 5 clock source: internal clock Current clock source: ATM0/0, priority: 1
This example displays the clock source configuration of ATM interface 0/2:
DSLAM# show running-config Building configuration... Current configuration: ! version ZZ.X no service pad service udp-small-servers service tcp-small-servers ! hostname DSLAM ! boot bootldr bootflash:/tftpboot/ls-wp-mz.11X-X.X.WA4.X.XX ! network-clock-select 2 ATM0/1 <Information Deleted> ! interface ATM0/2 no keepalive atm manual-well-known-vc atm access-group tod1 in atm pvc 0 35 rx-cttr 3 tx-cttr 3 interface ATM0/2 0 any-vci encap qsaal atm route-optimization soft-vc interval 360 time-of-day 18:0 5:0 clock-source network-derived ! <Information Deleted>
This example displays the interface controller status of interface 0/0:
DSLAM# show controllers atm 0/0
IF Name: ATM0/0 Chip Base Address: A8808000
Port type: 155UTP Port rate: 155 Mbps Port medium: UTP
Port status:SECTION LOS Loopback:None Flags:8300
TX Led: Traffic Pattern RX Led: Traffic Pattern TX clock source: network-derived
Framing mode: sts-3c
Cell payload scrambling on
Sts-stream scrambling on
OC3 counters:
Key: txcell - # cells transmitted
rxcell - # cells received
b1 - # section BIP-8 errors
b2 - # line BIP-8 errors
b3 - # path BIP-8 errors
ocd - # out-of-cell delineation errors - not implemented
g1 - # path FEBE errors
z2 - # line FEBE errors
chcs - # correctable HEC errors
uhcs - # uncorrectable HEC errors
txcell:0, rxcell:0
b1:0, b2:0, b3:0, ocd:0
g1:0, z2:0, chcs:0, uhcs:0
OC3 errored secs:
b1:0, b2:0, b3:0, ocd:0
g1:0, z2:0, chcs:0, uhcs:0
OC3 error-free secs:
b1:0, b2:0, b3:0, ocd:0
g1:0, z2:0, chcs:0, uhcs:0
Clock reg:8F
mr 0x30, mcfgr 0x70, misr 0x00, mcmr 0x0F,
mctlr 0x48, cscsr 0x50, crcsr 0x48, rsop_cier 0x00,
rsop_sisr 0x47, rsop_bip80r 0x00, rsop_bip81r 0x00, tsop_ctlr 0x80,
tsop_diagr 0x80, rlop_csr 0x02, rlop_ieisr 0x00, rlop_bip8_240r 0x02,
rlop_bip8_241r 0x00, rlop_bip8_242r 0x00, rlop_febe0r 0x00, rlop_febe1r 0x00,
rlop_febe2r 0x00, tlop_ctlr 0x80, tlop_diagr 0x80, rpop_scr 0x1C,
rpop_isr 0x00, rpop_ier 0x50, rpop_pslr 0xFF, rpop_pbip80r 0x00,
rpop_pbip81r 0x00, rpop_pfebe0r 0x00, rpop_pfebe1r 0x00, tpop_cdr 0x00,
tpop_pcr 0x00, tpop_ap0r 0x00, tpop_ap1r 0x90, tpop_pslr 0x13,
tpop_psr 0x00, racp_csr 0x84, racp_iesr 0x00, racp_mhpr 0x00,
racp_mhmr 0x00, racp_checr 0x00, racp_uhecr 0x00, racp_rcc0r 0x00,
racp_rcc1r 0x00, racp_rcc2r 0x00, racp_cfgr 0xFC, tacp_csr 0x04,
tacp_iuchpr 0x00, tacp_iucpopr 0x6A, tacp_fctlr 0x00, tacp_tcc0r 0x00,
tacp_tcc1r 0x00, tacp_tcc2r 0x00, tacp_cfgr 0x08,
phy_tx_cnt:0, phy_rx_cnt:0
Any module in a DSLAM chassis capable of receiving and distributing a network timing signal can propagate that signal to any similarly capable module in the chassis. These entities are capable of receiving and distributing a PRS:
![]() |
Note A trunk port can propagate a clocking signal in either direction. |
If you issue the network-clock-select command with the appropriate parameters, you can define a particular port in a DSLAM chassis (subject to the above limitations) to serve as the source of a PRS for the entire chassis or for other devices in the networking environment. This command is described in the section "Configuring Network Clock Priorities and Sources".
You can also use the network-clock-select command to designate a particular port in a DSLAM chassis to serve as a master clock source for distributing a single clocking signal throughout the chassis or to other network devices. You can distribute this reference signal in any location the network needs to globally synchronize the flow of CBR data.
The default software image for the DSLAM contains the PNNI routing protocol. The PNNI protocol provides the route dissemination mechanism for complete plug-and-play capability. This section describes modifications you can make to the default PNNI or Interim-Interswitch Signaling Protocol (IISP) routing configurations.
Use the atm route command to configure a static route. Static route configuration allows ATM call setup requests to be forwarded on a specific interface if the addresses match a configured address prefix.
![]() |
Note An interface must be UNI or IISP if it is configured with a static route. Static routes configured as PNNI interfaces default as down. |
This example shows how to use the atm route command to configure the 13-byte peer group prefix = 47.0091.8100.567.0000.0ca7.ce01 at interface 0/1:
DSLAM(config)# atm route 47.0091.8100.567.0000.0ca7.ce01 atm 0/1 DSLAM(config)#
Step | Command | Task |
|---|---|---|
|
|
|
|
|
|
|
|
|
This example shows how to configure the time, date, and month using the clock set command:
DSLAM# clock set 15:01:00 17 October 1997
This example shows how to configure the host name using the hostname command:
DSLAM# configure terminal Enter configuration commands, one per line. End with CNTL/Z. DSLAM(config)# hostname Publications Publications#
This example shows how to confirm the clock setting using the show clock command:
Publications# show clock .15:03:12.015 UTC Fri Oct 17 1997 Publications#
The SNMP system consists of three parts:
The SNMP manager can be part of a network management system (NMS), such as CiscoWorks.
The agent and MIB reside on the DSLAM. To configure SNMP on the DSLAM, you define the relationship between the manager and the agent.
An agent can send unsolicited traps to the manager. Traps are messages that alert the SNMP manager to a condition on the network. Traps can indicate improper user authentication, restarts, link status (up or down), closing of a TCP connection, or loss of connection to a neighbor router or DSLAM.
Figure 3-6 illustrates the communications relationship between the SNMP manager and agent.

Figure 3-6 shows that a manager can send the agent requests to get and set MIB values. The agent can respond to these requests. Independent of this interaction, the agent can send unsolicited traps to the manager notifying the manager of network conditions.
Cisco supports the SNMP Version 1 protocol, referred to as SNMPv1, and the SNMP Version 2 protocol, referred to as SNMPv2. Cisco's implementation of SNMP supports all MIB II variables (as described in RFC 1213) and SNMP traps (as described in RFC 1215).
RFC 1447, "SNMPv2 Party MIB" (April 1993), describes the managed objects that correspond to the properties associated with SNMPv2 parties, SNMPv2 contexts, and access control policies, as defined by the SNMPv2 Administrative Model. RFC 1450, "SNMPv2 MIB," (April 1993) describes the managed objects that instrument the behavior of an SNMPv2 implementation. Cisco supports the MIB variables as required by the conformance clauses specified in these MIBs.
Cisco provides its own MIB with every system. One of the set of MIB objects provided is the Cisco Entity Asset MIB that enables the SNMP manager to gather data on system card descriptions, serial numbers, hardware and software revision levels, and slot locations.
Although SNMPv2 offers more robust support than SNMPv1, Cisco continues to support SNMPv1. Not all management stations have migrated to SNMPv2, and you must configure the relationship between the agent and the manager to use the version of SNMP supported by the management station.
SNMPv1 offers a community-based form of security defined through an IP address access control list and password. SNMPv2 offers richer security configured through an access policy that defines the relationship between a single manager and agent. SNMPv2 security includes message authentication support using the Message Digest 5 (MD5) algorithm, but because of the Data Encryption Standard (DES) export restrictions, it does not include encryption support through DES. SNMPv2 security provides data origin authentication, ensures data integrity, and protects against message stream modification.
In addition to enhanced security, SNMPv2 support includes a bulk retrieval mechanism and more detailed error message reporting to management stations. The bulk retrieval mechanism supports the retrieval of tables and large quantities of information, minimizing the number of round-trips required.
The SNMPv2 improved error handling support includes expanded error codes that distinguish different kinds of error conditions; these conditions are reported through a single error code in SNMPv1. Error return codes now report the error type. Three kinds of exceptions are also reported:
There is no specific command to enable SNMP. The first snmp-server command that you enter enables both versions of SNMP.
To configure SNMP support, perform the tasks in the appropriate sections:
To configure the relationship between the agent and the manager on the DSLAM, you need to know the version of the SNMP protocol that the management station supports. An agent can communicate with multiple managers, so you can configure the Cisco IOS software to support communications with one management station using the SNMPv1 protocol and another using the SNMPv2 protocol.
This section tells you how to configure support for both SNMPv1 and SNMPv2. The topics are:
This section tells you how to enable a reload from the network after a system shutdown.
Using SNMP packets, a network management tool can send messages to users on virtual terminals and the console. This facility operates in a similar fashion to the EXEC send command, but the SNMP request that causes the message to be issued to the users also specifies the action to be taken after the message is delivered. One possible action is a shutdown request. After a system shuts down, it is typically reloaded.
Because the ability to cause a reload from the network is a powerful feature, it is protected by the snmp-server system-shutdown global configuration command. If you do not issue this command, the shutdown mechanism does not enable.
To enable the SNMP agent shutdown mechanism, use this command in global configuration mode:
Command | Task |
|---|---|
|
To understand how to use this feature with SNMP requests, read the document mib.txt available by anonymous FTP from Cisco Connection Online.
You can set the system contact, location, and serial number of the SNMP agent so that these descriptions can be accessed through the configuration file. Use one or more of these commands in global configuration mode:
Command | Task |
|---|---|
|
|
| |
|
You can set the maximum packet size permitted when the SNMP agent is receiving a request or generating a reply. To do so, use this command in global configuration mode:
Command | Task |
|---|---|
|
To monitor SNMP input and output statistics, including the number of illegal community string entries, errors, and requested variables, use this command in EXEC mode:
Command | Task |
|---|---|
|
To disable both versions of SNMP (SNMPv1 and SNMPv2) concurrently, use this command in global configuration mode:
Command | Task |
|---|---|
|
|
Step 2 Define a context to identify the object resources that can be acted on.
Step 3 Define a party for both the manager and the agent to identify them.
Step 4 Using the definitions created in the previous tasks, configure the access policy that characterizes the communications that can occur between the manager and the agent. The privileges that you define for the access policy depend on whether the agent is defined as the source or the destination. For example:
Figure 3-7 shows the information exchanged between the manager and the agent.

The agent sends trap messages to the manager in response to certain network conditions. Trap messages are unsolicited and are not related to the request/response communication exchange between the manager and the agent that occurs in relation to MIB variables. For any given manager and agent relationship, the privileges defined in the access policy constrain communications to a specific set of operations.
You must create access policies for
Each time a network address changes on a management station, you must reconfigure the access policy to reflect the new information for the management station.
To configure support for SNMPv2, perform these tasks:
After you create a record, you can modify the record contents by changing one or more of the record values. To do this, issue the command again, naming the record that you created originally. You must fully specify the record values, including the argument values, to remain unchanged.
To create or modify an SNMP view record, use this command in global configuration mode:
Command | Task |
|---|---|
|
To remove a view record, use the no snmp-server view command.
To create or modify an SNMP context record, use this command in global configuration mode:
Command | Task |
|---|---|
|
To remove a context entry, use the no snmp-server context command. Specify only the name of the context. The name identifies the context to be deleted.
To create or modify an SNMPv2 party record, use this command in global configuration mode:
Command | Task |
|---|---|
|
|
To remove a party record, use the no snmp-server party command.
To create or modify an SNMPv2 access policy, use this command in global configuration mode:
Command | Task |
|---|---|
|
|
A trap is an unsolicited message sent by an SNMP agent to an SNMP manager indicating that some event has occurred. The SNMP trap operations allow you to configure the Cisco IOS software to send information to a network management application when a particular event occurs. You can specify these features for SNMPv2 agent trap operations:
To define the recipient of the trap message, configure a party record for the manager, including the protocol address, and specify the party record as the destination party for the snmp-server access policy command.
Command | Task |
|---|---|
|
|
|
|
| |
| |
|
Because SNMP traps are inherently unreliable but too important to lose, the DSLAM stores at least one syslog message (the most recent trap), in a history table. You can specify the level of syslog traps (Cisco Syslog MIB) stored in the history table and sent to the SNMP network management station.
Using the snmp-server community command, specify a string and, optionally, a MIB view and an access list. The string is used as a password. The MIB view defines the subset of all MIB objects that the given community can access. The access list identifies the IP addresses of systems on which SNMPv1 managers reside that might use the community string to gain access to the SNMPv1 agent.
To configure support for SNMPv1, perform the tasks in these sections:
To configure a community string, use this command in global configuration mode:
Command | Task |
|---|---|
|
|
You can configure one or more community strings. To remove a specific community string, use the no snmp-server community command.
The SNMP trap operations allow a system administrator to configure the agent to send information to a manager when a particular event occurs. You can specify these features for SNMP server trap operations:
Step | Command | Task |
|---|---|---|
|
|
|
|
|
|
|
| |
|
| |
|
|
Because SNMP traps are inherently unreliable but too important to lose, at least one syslog message, the DSLAM stores the most recent trap in a history table. You can specify the level of syslog traps (Cisco Syslog MIB) stored in the history table and sent to the SNMP network management station.
RMON, used in conjunction with the SNMP agent in the DSLAM, allows you to
Combining RMON alarms and events with existing MIBs allows you to choose where monitoring occurs.
RMON can be very data- and processor-intensive. Measure usage effects to ensure that DSLAM performance is not degraded and to minimize excessive management traffic overhead. Native mode is less intensive than promiscuous mode.
Cisco IOS software images are available in versions with or without the explicit RMON option. Images without the explicit RMON option include limited RMON support (RMON alarms and event groups only). Images with the RMON option include support for all nine groups (statistics, history, alarms, hosts, hostTopN, matrix, filter, capture, and event). As a security precaution, support for the packet capture group allows capture of packet header information only; data payloads are not captured.
![]() |
Note This section describes general SNMP RMON configuration. See "Configuring ATM Accounting and ATM RMON," for ATM RMON configuration. |
To set an RMON alarm or event, use one of these commands in global configuration mode:
Command | Task |
|---|---|
| |
|
You can set an alarm on any MIB object in the access server. To disable an alarm, you must enable the no form of this command on each alarm you configure. You cannot disable all the alarms you configure at one time.
Refer to RFC 1757 to learn more about alarms and events and how they interact with each other.
To display the current RMON status, use these EXEC commands:
Command | Task |
|---|---|
|
|
| |
|
This example shows how to enable the rmon event command:
DSLAM# rmon event 1 log trap eventtrap description "High ifOutErrors" owner sdurham
This example shows how to configure this RMON event:
This example shows how to configure an RMON alarm using the rmon alarm command:
DSLAM# rmon alarm 10 ifEntry.20.1 20 delta rising-threshold 15 1 falling-threshold 0 owner jjjohnson
This example shows how to configure this RMON alarm:
Possible events include a log entry or an SNMP trap. If the ifEntry.20.1 value changes by 0, the alarm is reset and can be triggered again.
After you complete autoconfiguration and any manual configurations, copy the configuration into nonvolatile random-access memory (NVRAM). If you power off your DSLAM prior to saving the configuration in NVRAM you lose all manual configuration changes.
An example of the copy running-config command is:
DSLAM# copy running-config startup-config Building configuration... [OK]
After you finish configuring the DSLAM, you can use the commands described in this section to confirm the hardware, software, and interface configuration:
Use the show hardware command to confirm the correct hardware installation. For example:
DSLAM# show hardware Chassis Type: Unknown Chassis Type Slot 1 : EMPTY Slot 17: EMPTY Slot 2 : EMPTY Slot 18: EMPTY Slot 3 : EMPTY Slot 19: EMPTY Slot 4 : EMPTY Slot 20: EMPTY Slot 5 : EMPTY Slot 21: EMPTY Slot 6 : EMPTY Slot 22: EMPTY Slot 7 : EMPTY Slot 23: EMPTY Slot 8 : EMPTY Slot 24: EMPTY Slot 9 : EMPTY Slot 25: EMPTY Slot 10: EMPTY Slot 26: EMPTY Slot 11: NI-2-155SM-155SM Slot 27: EMPTY Slot 12: EMPTY Slot 28: EMPTY Slot 13: EMPTY Slot 29: EMPTY Slot 14: EMPTY Slot 30: EMPTY Slot 15: EMPTY Slot 31: EMPTY Slot 16: EMPTY Slot 32: EMPTY Fan Module 1: Not Present 2: Not Present Power Supply Module 1: Not Present 2: Not Present
Use the show version command to confirm the correct version and type of software and the configuration register are installed. For example:
DSLAM# show version Cisco Internetwork Operating System Software IOS (tm) C6100 Software (C6100-NI2-M), Experimental Version 12.0(19990524:174246) [lali-ni2b 160] Copyright (c) 1986-1999 by cisco Systems, Inc. Compiled Thu 10-Jun-99 10:10 by lali Image text-base: 0x800082C0, data-base: 0x80ACA000 ROM: System Bootstrap, Version 11.2(19990524:154730) [fyang-ni2b 1003], DEVELOPMENT SOFTWARE BOOTFLASH: C6100 Software (C6100-NI2-M), Experimental Version 12.0(19990522:204121) [visavla-ni2b 128] ni2-3 uptime is 8 minutes System restarted by reload at 10:18:56 EDT Thu Jun 10 1999 System image file is "tftp://171.69.209.28/lali/c6100-ni2-mz.policer" cisco 6100 (NI2) processor with 57344K/8192K bytes of memory. RC64475 processor, Implementation 48, Revision 0.0 1 Ethernet/IEEE 802.3 interface(s) 3 ATM network interface(s) 522232 bytes of non-volatile configuration memory. 4096K bytes of Boot Flash (Sector size 256K). 16384K bytes of Flash internal SIMM (Sector size 256K). Configuration register is 0x0
Use the show interface ethernet command to confirm the Ethernet interface is configured correctly. For example:
DSLAM# show interface ethernet 0/0
Ethernet0/0 is up, line protocol is up
Hardware is SonicT, address is 0000.0000.0000 (bia 0000.0000.0000)
Internet address is 172.20.52.20/26
MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, rely 255/255, load 1/255
Encapsulation ARPA, loopback not set, keepalive set (10 sec)
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Queueing strategy: fifo
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 1000 bits/sec, 2 packets/sec
5 minute output rate 0 bits/sec, 1 packets/sec
69435 packets input, 4256035 bytes, 0 no buffer
Received 43798 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
0 input packets with dribble condition detected
203273 packets output, 24079764 bytes, 0 underruns
0 output errors, 0 collisions, 2 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
Use the show atm addresses command to confirm correct configuration of the ATM address for the DSLAM. For example:
DSLAM# show atm addresses DSLAM Address(es): 47.009181000000007BF4447801.007BF4447801.00 active Soft VC Address(es): 47.0091.8100.0000.007b.f444.7801.4000.0c80.0010.00 ATM0/1 47.0091.8100.0000.007b.f444.7801.4000.0c80.0020.00 ATM0/2 ILMI Switch Prefix(es): 47.0091.8100.0000.007b.f444.7801 ILMI Configured Interface Prefix(es): LECS Address(es):
Command | Task |
|---|---|
|
|
For example, to test Ethernet connectivity from the DSLAM to a workstation with an IP address of 172.20.40.201, enter the command ping ip 172.20.40.201. If the DSLAM receives a response, this message appears:
DSLAM# ping ip 172.20.40.201 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 172.20.40.201, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/202/1000 ms
Use the ping atm command to confirm that the ATM interfaces are configured correctly. For example:
DSLAM# ping atm interface atm 0/1 5 seg-loopback Type escape sequence to abort. Sending Seg-Loopback 5, 53-byte OAM Echoes to a neighbour,timeout is 5 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/4 ms DSLAM#
Use the show atm interface command to confirm the atm interfaces are configured correctly. For example:
DSLAM# show atm interface
Interface: ATM0/0 Port-type: cpu
IF Status: UP Admin Status: up
Automation :-config: disabled AutoCfgState: not applicable
IF-Side: not applicable IF-type: not applicable
Uni-type: not applicable Uni-version: not applicable
Max-VPI-bits: 8 Max-VCI-bits: 14
Max-VP: 0 Max-VC: 16383
ConfMaxSvpcVpi: 0 CurrMaxSvpcVpi: 0
ConfMaxSvccVpi: 0 CurrMaxSvccVpi: 0
ConfMinSvccVci: 35 CurrMinSvccVci: 35
Configured virtual links:
PVCLs SoftVCLs SVCLs TVCLs PVPLs SoftVPLs SVPLs Total-Cfgd Inst-Conns
3 0 0 0 0 0 0 3 1
Logical ports(VP-tunnels): 0
Input cells: 0 Output cells: 0
5 minute input rate: 0 bits/sec, 0 cells/sec
5 minute output rate: 0 bits/sec, 0 cells/sec
Input AAL5 pkts: 0, Output AAL5 pkts: 0, AAL5 crc errors: 0
Interface: ATM0/1 Port-type: suni_dual
IF Status: UP Admin Status: up
Automation :-config: disabled AutoCfgState: not applicable
IF-Side: Network IF-type: NNI
Uni-type: not applicable Uni-version: not applicable
Max-VPI-bits: 8 Max-VCI-bits: 14
Max-VP: 255 Max-VC: 16383
ConfMaxSvpcVpi: 255 CurrMaxSvpcVpi: 255
ConfMaxSvccVpi: 255 CurrMaxSvccVpi: 255
ConfMinSvccVci: 35 CurrMinSvccVci: 35
Svc Upc Intent: pass Signalling: Enabled
ATM Address for Soft VC: 47.0091.8100.0000.007b.f444.7801.4000.0c80.0010.00
Configured virtual links:
PVCLs SoftVCLs SVCLs TVCLs PVPLs SoftVPLs SVPLs Total-Cfgd Inst-Conns
1 0 0 0 0 0 0 1 1
Logical ports(VP-tunnels): 0
Input cells: 1112 Output cells: 0
5 minute input rate: 0 bits/sec, 0 cells/sec
5 minute output rate: 0 bits/sec, 0 cells/sec
Input AAL5 pkts: 0, Output AAL5 pkts: 0, AAL5 crc errors: 0
[additional interfaces deleted]
Use the show atm status command to confirm the status of ATM interfaces. For example:
DSLAM# show atm status
NUMBER OF INSTALLED CONNECTIONS: (P2P=Point to Point, P2MP=Point to MultiPoint, MP2P=Multipoint to Point)
Type PVCs SoftPVCs SVCs TVCs PVPs SoftPVPs SVPs Total
P2P 1 0 0 0 0 0 0 1
P2MP 0 0 0 0 0 0 0 0
MP2P 0 0 0 0 0 0 0 0
TOTAL INSTALLED CONNECTIONS = 1
PER-INTERFACE STATUS SUMMARY AT 10:27:54 EDT Thu Jun 10 1999:
Interface IF Admin Automation :-Cfg ILMI Addr SSCOP Hello
Name Status Status Status Reg State State State
------------- -------- ------------ -------- ------------ --------- --------
ATM0/0 UP up n/a UpAndNormal Idle n/a
ATM0/1 UP up n/a n/a Idle down
ATM0/2 DOWN down waiting n/a Idle n/a
Use the show atm vc command to confirm the status of ATM virtual channels. For example:
DSLAM# show atm vc Interface VPI VCI Type X-Interface X-VPI X-VCI Encap Status ATM0/0 0 36 PVC ATM0/2 0 16 ILMI DOWN ATM0/0 0 38 PVC ATM0/2 0 5 QSAAL DOWN ATM0/0 0 500 PVC ATM0/1 0 500 SNAP UP ATM0/1 0 500 PVC ATM0/0 0 500 SNAP UP ATM0/2 0 5 PVC ATM0/0 0 38 QSAAL DOWN ATM0/2 0 16 PVC ATM0/0 0 36 ILMI DOWN
Use the show running-configuration command to confirm that the configuration being used is configured correctly. For example:
DSLAM# show running-config Building configuration... Current configuration: ! ! No configuration change since last restart ! version XX.X no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal ! hostname ni2-3 ! enable password lab ! ! dmt-profile default network-clock-select 1 ATM0/1 network-clock-select 2 system ip subnet-zero ip host-routing ip domain-name cisco.com ip name-server 171.69.204.11 ! atm address 47.0091.8100.0000.007b.f444.7801.007b.f444.7801.00 atm router pnni no aesa embedded-number left-justified node 1 level 56 lowest redistribute atm-static ! clock timezone EST -5 clock summer-time EDT recurring ! process-max-time 200 ! interface ATM0/0 ip address 70.0.0.2 255.0.0.0 no ip directed-broadcast map-group test atm cac service-category abr deny atm maxvp-number 0 ! interface Ethernet0/0 ip address 172.27.32.157 255.255.255.0 no ip directed-broadcast no ip proxy-arp no keepalive ! interface ATM0/1 no ip address no ip directed-broadcast no atm auto-configuration no atm ilmi-keepalive no atm address-registration no atm ilmi-enable atm cac service-category abr deny atm manual-well-known-vc atm nni atm pvc 0 500 interface ATM0/0 0 500 encap aal5snap atm oam 0 500 seg-loopback ! interface ATM0/2 no ip address no ip directed-broadcast no atm ilmi-keepalive atm cac service-category abr deny ! ip default-gateway 172.27.144.4 ip classless ! ! map-list test ip 70.0.0.1 atm-vc 500 ! line con 0 exec-timeout 0 0 transport input none line aux 0 line vty 0 4 exec-timeout 0 0 password lab login ! sntp server 171.69.204.139 end
Use the show startup-configuration command to confirm that the configuration saved in NVRAM is configured correctly. For example:
DSLAM# show startup-config Using 1657 out of 522232 bytes ! ! Last configuration change at 11:35:31 EDT Thu Jun 3 1999 ! NVRAM config last updated at 11:40:08 EDT Thu Jun 3 1999 ! version XX.X no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption service internal ! hostname ni2-3 ! enable password lab ! ! dmt-profile default network-clock-select 1 ATM0/1 network-clock-select 2 system ip subnet-zero ip host-routing ip domain-name cisco.com ip name-server 171.69.204.11 ! atm address 47.0091.8100.0000.007b.f444.7801.007b.f444.7801.00 atm router pnni no aesa embedded-number left-justified node 1 level 56 lowest redistribute atm-static ! clock timezone EST -5 clock summer-time EDT recurring ! process-max-time 200 ! interface ATM0/0 ip address 70.0.0.2 255.0.0.0 no ip directed-broadcast map-group test atm cac service-category abr deny atm maxvp-number 0 ! interface Ethernet0/0 ip address 172.27.32.157 255.255.255.0 no ip directed-broadcast no ip proxy-arp no keepalive ! interface ATM0/1 no ip address no ip directed-broadcast no atm auto-configuration no atm ilmi-keepalive no atm address-registration no atm ilmi-enable atm cac service-category abr deny atm manual-well-known-vc atm nni atm pvc 0 500 interface ATM0/0 0 500 encap aal5snap atm oam 0 500 seg-loopback ! interface ATM0/2 no ip address no ip directed-broadcast no atm ilmi-keepalive atm cac service-category abr deny ! ip default-gateway 172.27.144.4 ip classless ! ! map-list test ip 70.0.0.1 atm-vc 500 ! line con 0 exec-timeout 0 0 transport input none line aux 0 line vty 0 4 exec-timeout 0 0 password lab login ! sntp server 171.69.204.139 end
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue Sep 19 11:02:19 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.