cc/td/doc/product/lan/cat6000/ios127xe
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Configuring the Supervisor Engine Software

Configuring the Supervisor Engine Software

This chapter describes how to configure the Catalyst 6000 family switch supervisor engine software.


Note For complete syntax and usage information for the commands used in this chapter, refer to the Catalyst 6000 Family IOS Command Reference publication.

This chapter consists of these sections:

Default Supervisor Engine Configuration

Table 3-1 shows the default supervisor engine configuration for the Catalyst 6000 family switch.


Table 3-1: Supervisor Engine Default Configuration
Feature Default Value

Administrative connection

Normal mode

Global switch information

  • No value for system name

  • No value for system contact

  • No value for location

System clock

No value for system clock time

Passwords

No passwords configured for normal mode or enable mode (press the Return key)

Switch prompt

Router>

Configuring the Supervisor Engine

These sections describe how to configure the supervisor engine software on the Catalyst 6000 family switch:

Preparing to Configure the Switch

You can configure the switch using the setup, show, and clear commands. Enter the setup command to set initial configuration parameters. Enter show commands to verify the configuration and enter the clear commands (or, in some cases, no commands) to overwrite or erase configuration parameters.

Before you configure the supervisor engine software, obtain the following information:

Configuring the Switch

You can a configure the switch using one of these procedures:

Follow the procedure that best fits the needs of your network configuration. You will need to acquire the correct network addresses from your system administrator before you can start the configuration.

Configuring the Switch Using the Setup Facility or the setup Command

At initial startup, the switch automatically defaults to the setup facility. (The setup command facility functions exactly the same as a completely unconfigured system functions when you first boot it up.) You can run the setup facility by entering the setup command at the enable prompt (#).

Note that no default or current conditions are shown in square brackets [ ].

The difference between the setup facility and the setup command is that when you enter the setup command, current system configuration defaults are displayed in square brackets [ ] as you move through the setup command process and are queried by the system to make changes.

For example, you will see this display when you use the setup facility:

Configuring interface FastEtherent3/1:
  Is this interface in use?: yes
  Configure IP on this interface?: yes
 

When you use the setup command, you see this display:

Configuring interface FastEthernet4/1:
  Is this interface in use?[yes]: yes
  Configure IP on this interface?[yes]: yes
 

Note that the default or current conditions of the interface are shown in square brackets [ ].

Configuring Global and Interface Parameters

These sections describe global and interface system configuration parameters:

Configuring the Global Parameters

When you first start the setup facility or enter the setup command, you are queried by the system to configure the global parameters, which are used for controlling system-wide settings.

Perform this procedure to boot the switch and enter the global parameters:

Step 1 Connect a console terminal to the console interface on the supervisor engine, and then boot the system to the user EXEC prompt (Router>).

Step 2 Note that when you boot up, the following display appears after 30 seconds. (Depending on your configuration, your display might not exactly match this display.) When you see this display, you have successfully booted your system.

System Bootstrap, Version 5.2(1)CSX
Copyright (c) 1994-1999 by cisco Systems, Inc.
c6k_sup1 processor with 65536 Kbytes of main memory
Restricted Rights Legend
 
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
 
           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706
 
 
 
Cisco Internetwork Operating System Software
IOS (tm) draco-mp Software (draco_mp-JSDBG-M), Version 12.0(6.5)XE1(0.36) INTERI
M TEST SOFTWARE
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Mon 20-Sep-99 01:51 by
Image text-base: 0x60020900, data-base: 0x61108000
 
cisco Cat6k-MSFC (R5000) processor with 57344K/8192K bytes of memory.
Processor board ID 3024158973
R5000 CPU at 200Mhz, Implementation 35, Rev 2.1, 512KB L2 Cache
Last reset from power-on
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
48 FastEthernet/IEEE 802.3 interface(s)
2 Gigabit Ethernet/IEEE 802.3 interface(s)
123K bytes of non-volatile configuration memory.
4096K bytes of packet SRAM memory.
 
16384K bytes of Flash internal SIMM (Sector size 256K).
Building configuration...
[OK]
 
 
Press RETURN to get started!
 
--- System Configuration Dialog ---
 
Continue with configuration dialog? [yes/no]: y
 
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.
 
 
Basic management setup configures only enough connectivity
for management of the system, extended setup will ask you
to configure each interface on the system
 

Step 3 Enter yes or press Return when asked if you want to enter the configuration dialog and if you want to see the current interface summary. Press Return to accept the default (yes):

Would you like to enter the initial configuration dialog? [yes]:
 
First, would you like to see the current interface summary? [yes]:
 

This example of a yes response (displayed during the setup facility) shows a switch at first-time startup; that is, nothing has been configured on the switch.

Current interface summary
 
Interface                  IP-Address      OK? Method Status                Protocol
Vlan1                      unassigned      YES TFTP   administratively down down
 
GigabitEthernet1/1         unassigned      YES TFTP   administratively down down
 
GigabitEthernet1/2         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/1         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/2         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/3         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/4         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/5         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/6         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/7         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/8         unassigned      YES TFTP   administratively down down
 
(Additional displayed text omitted from this example.)
 

This example of a yes response (displayed during the setup command facility) shows a switch with some interfaces already configured.

Current interface summary
 
Interface                  IP-Address      OK? Method Status                Protocol
Vlan1                      unassigned      YES TFTP   administratively down down
 
GigabitEthernet1/1         172.20.52.34    YES NVRAM  up                    up
 
GigabitEthernet1/2         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/1         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/2         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/3         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/4         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/5         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/6         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/7         unassigned      YES TFTP   administratively down down
 
GigabitEthernet3/8         unassigned      YES TFTP   administratively down down
 
(Additional displayed text omitted from this example.)
 

Step 4 Choose which protocols to support on your interfaces. On IP installations only, you can accept the default values for most of the questions.

A typical minimal configuration using IP follows and continues through Step 9:

Configuring global parameters: 
 
  Enter host name [Router]: Router
 

Step 5 Enter the enable secret password when the following is displayed (remember this password for future reference):

The enable secret is a password used to protect access to
privileged EXEC and configuration modes. This password, after
entered, becomes encrypted in the configuration.
Enter enable secret: barney
 

Step 6 Enter the enable password when the following is displayed (remember this password for future reference):

The enable password is used when you do not specify an
enable secret password, with some older software versions, and
some boot images.
Enter enable password: wilma
 

The commands available at the user EXEC level are a subset of those available at the privileged EXEC level. Because many privileged EXEC commands are used to set operating parameters, you should password-protect these commands to prevent unauthorized use.

You must enter the correct password to gain access to privileged EXEC commands. When you are running from the boot ROM monitor, the enable password might be used depending on your boot ROM level.

The passwords should be different for maximum security. If you enter the same password for both during the setup script, the system will accept it, but you will receive a warning message indicating that you should enter a different password.

Step 7 Enter the virtual terminal password when the following is displayed (remember this password for future reference):

The virtual terminal password is used to protect
access to the router over a network interface.
Enter virtual terminal password: bambam
 

Step 8 In most cases you will use IP routing. If so, you must also select an interior routing protocol. You can specify Enhanced Interior Gateway Routing Protocol (IGRP) to operate on your system using setup.

Enter yes (the default) or press Return to configure IP, and then select EIGRP:

  Configure IP? [yes]:
    Configure EIGRP routing? [yes]:
      Your IGRP autonomous system number [1]: 301
 

Step 9 Enter yes or no to accept or refuse SNMP management:

  Configure SNMP Network Management? [yes]:
    Community string [public]:

For detailed SNMP configuration information, refer to the IOS Configuration Fundamentals Configuration Guide.

As a review of what you have done, a display, similar to the following, appears and lists all of the configuration parameters you selected in Steps 4 through 9. These parameters and their defaults are shown in the order in which they appeared on your console terminal.

The following configuration command script was created:
 
hostname router
enable secret 5 $1$S3Lx$uiTYg2UrFK1U0dgWdjvxw.
enable password lab
line vty 0 4
password lab
no snmp-server
!
ip routing eigrp 301
 
!
interface Vlan1
shutdown
no ip address
!
interface GigabitEthernet1/1
shutdown
no ip address
!
interface GigabitEthernet1/2
shutdown
no ip address
!
.
(Information Deleted)
.!
end
 
 
[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.
 
Enter your selection [2]: 2
% You can enter the setup, by typing setup at IOS command prompt
Router#
 

This completes the procedure on how to configure global parameters. The setup facility continues with the process to configure interfaces in the next section "Configuring Interfaces."

Configuring Interfaces

This section provides steps for configuring installed interfaces (using the setup facility or setup command facility) to allow communication over your external networks. To configure the interface parameters, you need your interface network addresses, subnet mask information, and which protocols you want to configure; consult with your network administrator for this information. (For additional interface configuration information on each of the modules available for the switch, refer to the individual configuration notes that shipped with your modules.)


Note The examples in this section are intended as examples only. Your configuration might look differently depending on your system configuration.

Perform this procedure to configure the interfaces installed in your switch:

Step 1 At the prompt for the Gigabit Ethernet interface configuration, enter the appropriate responses for your needs, using your own address and subnet mask:

Do you want to configure GigabitEthernet1/1 interface? [no]: yes
  Configure IP on this interface? [no]: yes
    IP address for this interface: 172.20.52.34
    Subnet mask for this interface [255.255.0.0] : 255.255.255.224
    Class B network is 172.20.0.0, 27 subnet bits; mask is /27
 

The Gigabit Ethernet interface, located on the supervisor engine, allows connections to Gigabit Ethernet networks. In this example, the system is being configured for the Ethernet interface using IP. (Note that the Gigabit Ethernet interface does not support external routing functions.)

Step 2 At the prompt for the Fast Ethernet interfaces, enter the appropriate responses for your needs, using your own address and subnet mask:

Do you want to configure FastEthernet5/1  interface? [no]: y
  Configure IP on this interface? [no]: y
    IP address for this interface: 172.20.52.98
    Subnet mask for this interface [255.255.0.0] : 255.255.255.248
    Class B network is 172.20.0.0, 29 subnet bits; mask is /29
 

The Fast Ethernet interfaces allow connections to Fast Ethernet interfaces. In this example, the system is being configured for a Fast Ethernet interface using IP.

Repeat the step for each interface you need to configure. Proceed to Step 3 to check and verify your configuration parameters.

When you reach and respond to the configuration dialog for the last installed interface, your interface configuration is complete.

Step 3 Check and verify the entire list of configuration parameters, which should display on your console terminal and end with the following query:

Use this configuration? [yes/no]:
 

A no response places you back at the enable prompt (#) and you will need to reissue the setup command to reenter your configuration. A yes response saves the running configuration to NVRAM, as follows:

Use this configuration? [yes/no]: yes
[OK]
Use the enabled mode `configure' command to modify this configuration.
Press RETURN to get started!
 

After you press the Return key, this prompt appears:

Router>
 

This completes the procedures for configuring global parameters and interface parameters in your system. Your Ethernet interfaces are now available for limited use.

If you want to modify the currently saved configuration parameters after the initial configuration, enter the setup command; to perform more complex configurations, enter configuration mode and use the configure command. Check the current state of the switch using the show version command, which displays the release of IOS software that is available on the switch and the installed interfaces, as follows:

Router# show version
Cisco Internetwork Operating System Software
IOS (tm) draco-mp Software (draco_mp-JSDBG-M), Version 12.0(6.5)XE1(0.39) INTERI
M TEST SOFTWARE
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Fri 24-Sep-99 02:23 by
Image text-base: 0x60020900, data-base: 0x61110000
 
ROM: System Bootstrap, Version 12.0(3)XE, RELEASE SOFTWARE
BOOTFLASH: draco-mp Software (draco_mp-BOOTDBG-M), Version 12.0(5.4)XE1(0.15) IN
TERIM TEST SOFTWARE
 
Router uptime is 2 days, 18 hours, 16 minutes
System returned to ROM by abort at PC 0x600EB19C
System image file is "sup-bootflash"
 
cisco Cat6k-MSFC (R5000) processor with 57344K/8192K bytes of memory.
Processor board ID 3024158973
R5000 CPU at 200Mhz, Implementation 35, Rev 2.1, 512KB L2 Cache
Last reset from power-on
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
48 FastEthernet/IEEE 802.3 interface(s)
2 Gigabit Ethernet/IEEE 802.3 interface(s)
123K bytes of non-volatile configuration memory.
4096K bytes of packet SRAM memory.
 
16384K bytes of Flash internal SIMM (Sector size 256K).
Configuration register is 0x0
 
Router# 
 

For detailed interface configuration information, refer to the IOS Interface Configuration Guide.

Configuring the Switch From Configuration Mode

If you prefer not to use the setup facility, you can configure the switch from configuration mode as follows:

Step 1 Connect a console terminal to the console interface of your supervisor engine.

Step 2 When you are asked if you want to enter the initial dialog, answer no to go into the normal operating mode of the switch as follows:

Would you like to enter the initial dialog? [yes]: no
 

Step 3 After a few seconds you will see the user EXEC prompt (Router>). Type enable to enter enable mode:

Router> enable
 

The prompt will change to the privileged EXEC prompt (#) as follows:

Router#
 

Step 4 At the prompt (#), enter the configure terminal command to enter configuration mode as follows:

Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)#
 

At the prompt, enter the interface type slot/interface command to enter interface configuration mode as follows:

Router(config)# interface fastethernet 5/1
Router(config-if)# 
 

In either of these configuration modes, you can enter any changes to the switch configuration. Enter the end command to exit configuration mode.

Step 5 Save your settings. (See the "Saving the Running Configuration Settings and Reviewing Your Configuration" section.)

Your switch is now minimally configured and can boot with the configuration you entered. To see a list of the configuration commands, enter ? at the prompt or press the help key in configuration mode.

Checking the Running Configuration Settings Before Saving Them

You can check the configuration settings you entered or changes you made by entering show running-config command at the privileged EXEC prompt (#) as follows:

Router# show running-config
Building configuration...
 
Current configuration:
!
version 12.0
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname Router
 
(Information Deleted)
 
!
line con 0
 transport input none
line vty 0 4
 exec-timeout 0 0
 password lab
 login
 transport input lat pad dsipcon mop telnet rlogin udptn nasi
!
end
 
Router#
 

Saving the Running Configuration Settings and Reviewing Your Configuration

To store the configuration or changes to your startup configuration in NVRAM, enter copy running-config startup-config at the privileged EXEC prompt (#) as follows:

Router# copy running-config startup-config
 

This command saves the configuration settings that you created in configuration mode. If you fail to do this, your configuration will be lost the next time you reload the system. To display information stored in NVRAM, enter the show startup-config EXEC command.

The following sample output shows a typical system configuration:

Router# show startup-config
Using 5362 out of 126968 bytes
!
version 12.0
service timestamps debug datetime localtime
service timestamps log datetime localtime
no service password-encryption
!
hostname Router
!
boot system flash sup-bootflash
enable password lab
!
ip subnet-zero
no ip domain-lookup
!
ip cef
mls ipx
mls flow ip destination
mls flow ipx destination
 --More-- 
 
(Information Deleted)
 
!
line con 0
 exec-timeout 0 0
 transport input none
line vty 0 4
 exec-timeout 0 0
 password lab
 login
 transport input lat pad dsipcon mop telnet rlogin udptn nasi
!
end
 
Router# 

Establishing a Console Interface Connection

This section describes how to establish a connection through the console interface on the supervisor engine.


Note For information on connecting a terminal to the supervisor engine console interface, refer to the Catalyst 6000 Family Module Installation Guide.

Make sure the terminal is connected to the switch and that the switch and terminal are on. Perform this task to establish a console interface connection to the switch
Step Command Purpose

1 . 

Access the switch command-line interface (CLI) using the appropriate commands on the terminal (for example, using the tip command on a UNIX system).

2 . 

Press Return to enter user EXEC mode.

3 . 

Router> enable

Change to privileged EXEC mode.

4 . 

Password: password

Enter the privileged EXEC password at the prompt.

:

This example shows how to enter the privileged EXEC mode at the console connection:

Unix> telnet Router1
Trying Router1
Connected to Router1
Escape character is '^]'.
 
 
Press Return for Console prompt
 
 
Router> enable
Password:
Router#

Configuring a Default Gateway

The supervisor engine sends IP packets with unresolved destination IP addresses to the default gateway.

A switch that is not running a routing protocol needs to be able to send data to addresses on subnets other than its own. The default-gateway or default-router parameter is set manually and the value of this parameter is the address of the next-hop router interface. The default gateway should point to the IP address of an interface on a router that is directly connected to the switch where a default gateway is being configured. The switch will have connectivity to the remote networks with which the host needs to communicate.

When your Catalyst 6000 family switch is routing IP, it does not need to have a default gateway set. However, when your Catalyst 6000 family switch is in boot ROM mode (for instance, when upgrading Flash), it is no longer routing IP; it is an IP host. If connectivity is required to remote networks, the Catalyst 6000 family switch needs the ip default-gateway address configured, where the address is the IP address of the next-hop router that can provide connectivity.

To specify a default gateway, perform this task:
Step Command Purpose

1 . 

Router(config)# ip default-gateway A.B.C.D

Configure a default IP gateway address for the switch.

2 . 

Router# show ip route

Verify that the default gateways appear correctly in the IP routing table.

This example shows how to configure a default gateway and how to verify the default gateway configuration:

Router# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)# ip default-gateway 172.20.52.35
Router(config)# end
3d17h: %SYS-5-CONFIG_I: Configured from console by console
Router# show ip route
Default gateway is 172.20.52.35
 
Host               Gateway           Last Use    Total Uses  Interface
ICMP redirect cache is empty
Router# 

Configuring a Static Route

If your Telnet station or SNMP network management workstation is on a different network from your Catalyst 6000 family switch and a routing protocol has not been configured, you might need to add a static routing table entry for the network where your end station is located.

To configure a static route, perform this task:
Step Command Purpose

1 . 

Router(config)# ip route dest-IP-address mask {forwarding-IP | vlan vlan-number} 

Configure a static route to the remote network.

2 . 

Router# show running-config

Verify that the static route appears correctly.

This example shows how to use the ip route command to configure a static route to a workstation at IP address 171.10.5.10 on the Catalyst 6000 family switch with a subnet mask and IP address 172.20.3.35 of the forwarding router:

Router# configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)# ip route 171.10.5.10 255.255.255.255 172.20.3.35
Router(config)# end
Router#
 

This example shows how to use the show running-config command to confirm the configuration of the previously configured static route:

Router# show running-config
Building configuration...
.
(Information Deleted)
.
ip default-gateway 172.20.52.35
ip classless
ip route 171.10.5.10 255.255.255.255 172.20.3.35
no ip http server
!
line con 0
 transport input none
line vty 0 4
 exec-timeout 0 0
 password lab
 login
 transport input lat pad dsipcon mop telnet rlogin udptn nasi
!
end
 
Router#
 

This example shows how to use the ip route command to configure a static route to a workstation at IP address 171.20.5.3 on the Catalyst 6000 family switch with subnet mask and connected over VLAN 1:

Router# configure terminal
Router(config)# ip route 171.20.5.3 255.255.255.255 vlan 1
Router(config)# end
Router# 
 

This example shows how to use the show running-config command to confirm the configuration of the previously configured static route:

Router# show running-config
Building configuration...
.
(Information Deleted)
.
ip default-gateway 172.20.52.35
ip classless
ip route 171.20.52.3 255.255.255.255 Vlan1
no ip http server
!
!
x25 host z
!
line con 0
 transport input none
line vty 0 4
 exec-timeout 0 0
 password lab
 login
 transport input lat pad dsipcon mop telnet rlogin udptn nasi
!
end
 
Router# 
 

Configuring the BOOTP Server

The Bootstrap Protocol (BOOTP) automatically assigns an Ethernet IP address by adding the MAC and IP addresses of the Ethernet interface to the BOOTP server configuration file. When the Catalyst 6000 family switch boots, it automatically retrieves the IP address from the BOOTP server.

The switch performs a BOOTP request only if the current IP address is set to 0.0.0.0. (This is the default for a new switch or a switch that has had its startup-config file cleared using the erase command.)

To allow your switch to retrieve its IP address from a BOOTP server, you must first determine the MAC address of the switch and add that MAC address to the BOOTP configuration file on the BOOTP server. Perform these tasks to create a BOOTP server configuration file:

Step 1 Install the BOOTP server code on the workstation, if it is not already installed.

Step 2 Determine the MAC address from the label on the chassis.

Step 3 Add an entry in the BOOTP configuration file (usually /usr/etc/bootptab) for each switch. Press Return after each entry to create a blank line between each entry. See the example BOOTP configuration file that follows.

Step 4 Restart the Catalyst 6000 family switch, using the reload command, to automatically request the IP address from the BOOTP server.

This example BOOTP configuration file shows the added entry:

# /etc/bootptab: database for bootp server (/etc/bootpd)
#
# Blank lines and lines beginning with '#' are ignored.
#
# Legend:
#
#       first field -- hostname
#                       (may be full domain name and probably should be)
#
#       hd -- home directory
#       bf -- bootfile
#       cs -- cookie servers
#       ds -- domain name servers
#       gw -- gateways
#       ha -- hardware address
#       ht -- hardware type
#       im -- impress servers
#       ip -- host IP address
#       lg -- log servers
#       lp -- LPR servers
#       ns -- IEN-116 name servers
#       rl -- resource location protocol servers
#       sm -- subnet mask
#       tc -- template host (points to similar host entry)
#       to -- time offset (seconds)
#       ts -- time servers
#
<information deleted>
#
#########################################################################
# Start of individual host entries
#########################################################################
Router:         tc=netcisco0:   ha=0000.0ca7.ce00:      ip=172.31.7.97:
dross:          tc=netcisco0:   ha=00000c000139:        ip=172.31.7.26:
 
<information deleted> 

Protecting Access to Privileged EXEC Commands

The following tasks provide a way to control access to the system configuration file and privileged EXEC commands:

Setting or Changing a Static Enable Password

To set or change a static password that controls access to the privileged EXEC mode, perform this task:
Command Purpose
Router(config)# enable password password

Set a new password or change an existing password for the privileged EXEC mode.

This example shows how to configure an enable password as "lab" at the privileged EXEC mode:

Router# configure terminal
Router(config)# enable password lab
Router(config)#
 

To display the password or access level configuration, see the "Displaying the Password and Privilege Level Configuration" section.

Using the Enable Password and Enable Secret Commands

To provide an additional layer of security, particularly for passwords that cross the network or that are stored on a TFTP server, you can use either the enable password or enable secret commands. Both commands accomplish the same thing; that is, they allow you to establish an encrypted password that users must enter to access enable mode (the default), or any privilege level you specify.

We recommend that you use the enable secret command because it uses an improved encryption algorithm.

If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously.

To configure the Catalyst 6000 family switch to require an enable password, perform either of these tasks:
Command Purpose
Router(config)# enable password [level level] {password | encryption-type encrypted-password}
or
Router(config)# enable secret [level level] {password | encryption-type encrypted-password}

Establish a password for the privileged EXEC mode.

Specify a secret password, saved using a nonreversible encryption method. (If enable password and enable secret commands are both set, users must enter the enable secret password.)

Use either of these commands with the level option to define a password for a specific privilege level. After you specify the level and set a password, give the password only to users who need to have access at this level. Use the privilege level configuration command to specify commands accessible at various levels.

If you enable the service password-encryption command, the password you enter is encrypted. When you display it with the more system:running-config command, it displays in encrypted form.

If you specify an encryption type, you must provide an encrypted password---an encrypted password you copy from another Catalyst 6000 family switch configuration.


Note You cannot recover a lost encrypted password. You must clear NVRAM and set a new password. See the "Recovering a Lost Enable Password" section if you lose or forget your password.

To display the password or access level configuration go to the "Displaying the Password and Privilege Level Configuration" section.

Setting or Changing a Line Password

To set or change a password on a line, perform this task:
Command Purpose
Router(config-line)# password password

Set a new password or change an existing password for the privileged level.

To display the password or access level configuration, see the "Displaying the Password and Privilege Level Configuration" section.

Setting TACACS+ Password Protection for Privileged EXEC Mode

To set the TACACS+ protocol to determine whether a user can access privileged EXEC mode, perform this task:
Command Purpose
Router(config)# enable use-tacacs

Set the TACACS-style user ID and password-checking mechanism for the privileged EXEC mode.

When you set TACACS password protection at the privileged EXEC mode, the enable EXEC command prompts for both a new username and a password. This information is then passed to the TACACS+ server for authentication. If you are using the extended TACACS+, it also passes any existing UNIX user identification code to the TACACS+ server.

Caution If you use the enable use-tacacs command, you must also specify tacacs-server authenticate enable, or you will be locked out of the privileged EXEC mode.

Note When used without extended TACACS, the enable use-tacacs command allows anyone with a valid username and password to access the privileged EXEC mode, creating a potential security problem. This problem occurs because the query resulting from entering the enable command is indistinguishable from an attempt to log in without extended TACACS.

For detailed TACACS+ configuration information, see "Configuring Network Security."

Encrypting Passwords

Because protocol analyzers can examine packets (and read passwords), you can increase access security by configuring the IOS software to encrypt passwords. Encryption prevents the password from being readable in the configuration file.

To configure the IOS software to encrypt passwords, perform this task:
Command Purpose
Router(config)# service password-encryption

Encrypt a password.

Encryption occurs when the current configuration is written or when a password is configured. Password encryption is applied to all passwords, including authentication key passwords, the privileged command password, console and virtual terminal line access passwords, and Border Gateway Protocol (BGP) neighbor passwords. The service password-encryption command keeps unauthorized individuals from viewing your password in your configuration file.

Caution The service password-encryption command does not provide a high level of network security. If you use this command, you should also take additional network security measures.

Although you cannot recover a lost encrypted password (that is, you cannot get the original password back), you can regain control of the switch after having lost or forgotten the encrypted password. See the "Recovering a Lost Enable Password" section if you lose or forget your password.

To display the password or access level configuration, see the "Displaying the Password and Privilege Level Configuration" section.

Configuring Multiple Privilege Levels

By default, the IOS software has two modes of password security: user EXEC mode and privileged EXEC mode. You can configure up to 16 hierarchical levels of commands for each mode. By configuring multiple passwords, you can allow different sets of users to have access to specified commands.

For example, if you want many users to have access to the clear line command, you can assign it level 2 security and distribute the level 2 password fairly widely. But if you want more restricted access to the configure command, you can assign it level 3 security and distribute that password to more restricted users.

These tasks describe how to configure additional levels of security:

Setting the Privilege Level for a Command

To set the privilege level for a command mode, perform this task:
Step Command Purpose

1 . 

Router(config)# privilege mode level level command

Set the privilege level for a command.

2 . 

Router(config)# enable password level level [encryption-type] password

Specify the enable password for a privilege level.

To display the password or access level configuration, see the "Displaying the Password and Privilege Level Configuration" section.

Changing the Default Privilege Level for Lines

To change the default privilege level for a given line or a group of lines, perform this task:
Command Purpose
Router(config-line)# privilege level level

Change the default privilege level for the line.

To display the password or access level configuration, see the "Displaying the Password and Privilege Level Configuration" section.

Logging In to a Privilege Level

To log in to a Catalyst 6000 family switch at a specified privilege level, perform this task:
Command Purpose
Router# enable level 

Log in to a specified privilege level.

Exiting a Privilege Level

To exit to a specified privilege level, perform this task:
Command Purpose
Router# disable level 

Exit to a specified privilege level.

Displaying the Password and Privilege Level Configuration

To display the password and privilege level configuration for the switch, perform this task:
Command Purpose
Router# show running-config

Display the password and access level configuration.

Router# show privilege

Show the privilege level configuration.

This example shows how to display the password and access level configuration of the switch:

Router# show running-config
Building configuration...
 
Current configuration:
!
version 12.0
service timestamps debug datetime localtime
service timestamps log datetime localtime
no service password-encryption
!
hostname Router
!
boot system flash sup-bootflash
enable password lab
!
(Information Deleted)
 

This example shows how to display the privilege level configuration of the switch:

Router# show privilege
Current privilege level is 15
Router# 

Recovering a Lost Enable Password

You can perform password recovery on most of the platforms without changing hardware jumpers, but all platforms require the configuration to be reloaded. Password recovery can be done only from the console interface on the Catalyst 6000 family switch.

Both password recovery procedures involve the following basic steps:

Step 1 Configure the Catalyst 6000 family switch to boot up without reading the configuration memory (NVRAM). This is sometimes called the test system mode.

Step 2 Reboot the system.

Step 3 Access enable mode (which can be done without a password if you are in test system mode).

Step 4 View or change the password, or erase the configuration.

Step 5 Reconfigure the Catalyst 6000 family switch to boot up and read the NVRAM as it normally does.

Step 6 Reboot the system.


Note Password recovery requires that a terminal issue a Break signal; you must be familiar with how your terminal or PC terminal emulator issues this signal. For example, in ProComm, the keys Alt-B, by default, generates the Break signal, and in a Windows terminal you press Break or press Ctrl and Break keys simultaneously.

Modifying the Supervisor Engine Startup Configuration

These sections describe how the startup configuration on the supervisor engine works and how to modify the configuration register and BOOT variable:

Understanding the Supervisor Engine Boot Configuration

These next sections describe how the boot configuration works on the supervisor engine.

Understanding the Supervisor Engine Boot Process

The supervisor engine boot process involves two software images: ROM monitor and supervisor engine software. When the switch is powered up or reset, the ROM-monitor code is executed. Depending on the NVRAM configuration, the supervisor engine either stays in ROM-monitor mode or loads the supervisor engine software.

Two user-configurable parameters determine how the switch boots: the configuration register and the BOOT environment variable. The configuration register is described in the "Modifying the Boot Field and Using the boot Command" section. The BOOT environment variable is described in the "Specifying the Startup System Image" section.

Understanding the ROM Monitor

The ROM monitor executes upon switch power-up, reset, or when a fatal exception occurs. The switch enters ROM-monitor mode if the switch does not find a valid software image, if the NVRAM configuration is corrupted, or if the configuration register is set to enter ROM-monitor mode. From ROM-monitor mode, you can manually load a software image from bootflash or a Flash PC card.


Note For complete syntax and usage information for the ROM monitor commands, refer to the Catalyst 6000 Family IOS Command Reference publication.

You can also enter ROM-monitor mode by restarting the switch and then pressing the Break key during the first 60 seconds of startup. If you are connected through a terminal server, you can escape to the Telnet prompt and enter the send break command to enter ROM-monitor mode.


Note The Break key is always enabled for 60 seconds after rebooting the switch, regardless of whether the configuration-register setting has the Break key disabled.

The ROM monitor has these features:

Configuring the Software Configuration Register

The Catalyst 6000 family switch uses a 16-bit software configuration register, which allows you to set specific system parameters. Settings for the software configuration register are written into NVRAM.

Following are some reasons for changing the software configuration register settings:

Table 3-2 lists the meaning of each of the software configuration memory bits, and Table 3-3 defines the boot field.

Caution To avoid confusion and possibly halting the switch, remember that valid configuration register settings might be combinations of settings and not just the individual settings listed in Table 3-2. For example, the factory default value of 0x0102 is a combination of settings.

Table 3-2: Software Configuration Register Bit Meanings
Bit Number1 Hexadecimal Meaning

00 to 03

0x0000 to 0x000F

Boot field (see Table 3-3)

06

0x0040

Causes system software to ignore NVRAM contents

07

0x0080

OEM2 bit enabled

08

0x0100

Break disabled

09

0x0200

Use secondary bootstrap

10

0x0400

Internet Protocol (IP) broadcast with all zeros

11 to 12

0x0800 to 0x1000

Console line speed (default is 9600 baud)

13

0x2000

Boot default Flash software if network boot fails

14

0x4000

IP broadcasts do not have network numbers

15

0x8000

Enable diagnostic messages and ignore NVRAM contents

1The factory default value for the configuration register is 0x0102. This value is a combination of the following: binary bit 8 = 0x0100 and binary bits 00 through 03 = 0x0002 (see Table 3-3).
2OEM = original equipment manufacturer.

Table 3-3:
Explanation of Boot Field (Configuration Register Bits 00 to 03)
Boot Field Meaning

00

Stays at the system bootstrap prompt

01

Boots the first system image in onboard Flash memory

02 to 0F

Specifies a default filename for booting over the network; enables boot system commands that override the default filename

Modifying the Boot Field and Using the boot Command

The configuration register boot field determines whether or not the Catalyst 6000 family switch loads an operating system image, and if so, where it obtains this system image. The following sections describe using and setting the configuration register boot field, and the tasks you must perform to modify the configuration register boot field.

Bits 0 through 3 of the software configuration register form the boot field, specified as a binary number.


Note The factory default configuration register setting for systems and spares is 0x0102.

When the boot field is set to either 0 or 1 (0-0-0-0 or 0-0-0-1), the system ignores any boot instructions in the system configuration file and the following occurs:

You can enter the boot command only, or enter the command and include additional boot instructions, such as the name of a file stored in Flash memory, or a file that you specify for booting from a network server. If you use the boot command without specifying a file or any other boot instructions, the system boots from the default Flash image (the first image in onboard Flash memory). Otherwise, you can instruct the system to boot from a specific Flash image (using the boot system flash filename command).

You can also use the boot command to boot images stored in the Flash PC cards located in Flash PC card slot 0 or slot 1 on the supervisor engine. If you set the boot field to any bit pattern other than 0 or 1, the system uses the resulting number to form a filename for booting over the network.

You must set the boot field for the boot functions you require.

Performing the Boot Field Modification Tasks

You modify the boot field from the software configuration register. To modify the software configuration register boot field, perform this task:
Step Command Purpose

1 . 

Router# show version

Determine the current configuration register setting.

2 . 

Router# configure terminal 

Enter configuration mode, selecting the terminal option.

3 . 

Router(config)# config-register value

Modify the existing configuration register setting to reflect the way in which you want the switch to load a system image.

4 . 

Router(config)# end

Exit configuration mode.

5 . 

Router# reload

Reboot the switch to make your changes take effect.

Follow this procedure to change the configuration register while running the system software:

Step 1 Enter the enable command and your password to enter privileged level as follows:

Router> enable
Password: 
Router#
 

Step 2 Enter the configure terminal command at the EXEC mode prompt (#) as follows:

Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# 
 

Step 3 Configure the configuration register to 0x102 as follows:

Router(config)# config-register 0x102
 

Set the contents of the configuration register by entering the config-register value configuration command, where value is a hexadecimal number preceded by 0x (see Table 3-2).

Step 4 Enter the end command to exit configuration mode. The new value settings are saved to memory; however, the new settings do not take effect until the system software is reloaded by rebooting the system.

Step 5 Enter the show version EXEC command to display the configuration register value currently in effect and that will be used at the next reload. The value is displayed on the last line of the screen display, as in this example:

Configuration register is 0x141 (will be 0x102 at next reload)
 

Step 6 Save your settings. (See the "Saving the Running Configuration Settings and Reviewing Your Configuration" section. However, note that configuration register changes take effect only after the system reloads, such as when you enter a reload command from the console.)

Step 7 Reboot the system. The new configuration register value takes effect with the next system boot.

This completes the procedure for making configuration register changes.

Verifying the Configuration Register Setting

Enter the show version EXEC command to verify the current configuration register setting. In ROM-monitor mode, enter the o command to verify the value of the configuration register boot field.

To verify the configuration register setting for the Catalyst 6000 family switch, perform this task:
Command Purpose
Router# show version

Display the configuration register configuration.

In this example, the show version command indicates that the current configuration register is set so that the Catalyst 6000 family switch does not automatically load an operating system image. Instead, it enters ROM-monitor mode and waits for user-entered ROM monitor commands. The new setting instructs the Catalyst 6000 family switch to a load a system image from commands in the startup configuration file or from a default system image stored on a network server.

Router1# show version
Cisco Internetwork Operating System Software
IOS (tm) draco-mp Software (draco_mp-JSDBG-M), Version 12.0(5.4)XE1(0.18) INTERIM TEST SOFTWARE
Copyright (c) 1986-1999 by cisco Systems, Inc.
Compiled Mon 09-Aug-99 03:40 by
Image text-base: 0x60020900, data-base: 0x60FF0000
 
ROM: System Bootstrap, Version 12.0(3)XE, RELEASE SOFTWARE
BOOTFLASH: draco-mp Software (draco_mp-BOOTDBG-M), Version 12.0(5.4)XE1(0.15) IN
TERIM TEST SOFTWARE
 
Router uptime is 2 days, 4 minutes
System returned to ROM by power-on
System image file is "slot0:rp.halley"
 
cisco Cat6k-MSFC (R5000) processor with 57344K/8192K bytes of memory.
Processor board ID 3024158973
R5000 CPU at 200Mhz, Implementation 35, Rev 2.1, 512KB L2 Cache
Last reset from power-on
Bridging software.
X.25 software, Version 3.0.0.
SuperLAT software (copyright 1990 by Meridian Technology Corp).
TN3270 Emulation software.
10 Gigabit Ethernet/IEEE 802.3 interface(s)
123K bytes of non-volatile configuration memory.
4096K bytes of packet SRAM memory.
 
16384K bytes of Flash internal SIMM (Sector size 256K).
Configuration register is 0x0
 
Router# 

Specifying the Startup System Image

You can enter multiple boot commands in the startup configuration file or in the BOOT environment variable to provide backup methods for loading a system image onto the Catalyst 6000 family switch.


Note Store the Catalyst 6000 family switch system software image in the file system sup-bootflash: or slot0:, not in the file system bootflash:, as described in the IOS Configuration Fundamentals Configuration Guide. Store the boot loader image in file system bootflash:.

The BOOT environment variable is also described in the "Specify the Startup System Image in the Configuration File" section in the "Loading and Maintaining System Images and Microcode" chapter of the IOS Configuration Fundamentals Configuration Guide.

Use the following sections to configure your Catalyst 6000 family switch to boot from Flash memory. Flash memory might be single in-line memory modules (SIMMs) or Flash memory cards. Check the appropriate hardware installation and maintenance guide for information about types of Flash memory.

What You Can Do from Flash Memory

Flash memory allows you to do the following:

Flash Memory Features

Flash memory features include the following:

Security Precautions

Note the following security precautions when loading from Flash memory:

Flash Memory Configuration Process

To configure your Catalyst 6000 family switch to boot from Flash memory, follow this general procedure. Refer to the appropriate hardware installation and maintenance publication for complete instructions on installing the hardware and for information about the jumper settings required for your configuration.

Step 1 Copy a system image to Flash memory using TFTP or rcp. See the "Additional File Transfer Features" section, for more information on performing this step.

Step 2 Configure the system to boot automatically from the desired file in Flash memory. You might need to change the configuration register value. See the "Modifying the Boot Field and Using the boot Command" section, for more information on modifying the configuration register.

Step 3 Save your configurations.

Step 4 Power cycle and reboot your system to ensure that all is working as expected.

BOOTLDR Environment Variable

The BOOTLDR environment specifies the Flash file system and filename containing the boot loader image required to load software on the MSFC.

Caution Do not erase the boot loader image (c6msfc-boot-mz.120-7.xe.bin) from the MSFC bootflash: device. The boot loader must be present for the switch to boot successfully.

CONFIG_FILE Environment Variable

For Class A Flash file systems, the CONFIG_FILE environment variable specifies the file system and filename of the configuration file to use for initialization (startup). Valid file systems can include nvram:, slot0:, and sup-bootflash:.

For detailed file management configuration information, refer to the IOS Configuration Fundamentals Configuration Guide.

After you save the CONFIG_FILE environment variable to your startup configuration, the switch checks the variable upon startup to determine the location and filename of the configuration file to use for initialization.

The switch uses the NVRAM configuration during initialization when the CONFIG_FILE environment variable does not exist or when it is null (such as at first-time startup). If the switch detects a problem with NVRAM or a checksum error, the switch enters setup mode. See the "Configuring the Switch Using the Setup Facility or the setup Command" section for more information on the setup command facility.

Controlling Environment Variables

Although the ROM monitor controls environment variables, you can create, modify, or view them with certain commands. To create or modify the BOOT, BOOTLDR, and CONFIG_FILE environment variables, use the boot system, boot bootldr, and boot config global configuration commands, respectively.

Refer to the "Specify the Startup System Image in the Configuration File" section in the "Loading and Maintaining System Images and Microcode" chapter of the Configuration Fundamentals Configuration Guide for details on setting the BOOT environment variable. Refer to the "Specify the Startup Configuration File" section in the "Modifying, Downloading, and Maintaining Configuration Files" chapter of the Configuration Fundamentals Configuration Guide for details on setting the CONFIG_FILE variable.


Note When you use the boot system, boot bootldr, and boot config global configuration commands, you affect only the running configuration. You must save the environment variable settings to your startup configuration to place the information under ROM monitor control and for the environment variables to function as expected. Enter the
copy system:running-config nvram:startup-config command to save the environment variables from your running configuration to your startup configuration.

You can view the contents of the BOOT, BOOTLDR, and the CONFIG_FILE environment variables using the show bootvar command. This command displays the settings for these variables as they exist in the startup configuration as well as in the running configuration if a running configuration setting differs from a startup configuration setting.

This example shows how to check the BOOT, BOOTLDR, and the CONFIG_FILE environment variables on the switch:

Router# show bootvar
BOOT variable = sup-bootflash:c6sup-js-mz.120-7.XE.bin,1;
CONFIG_FILE variable does not exist
BOOTLDR variable = bootflash:c6msfc-boot-mz.120-7.XE.bin
Configuration register is 0x0
 
Router# 
 

Enter the more nvram:startup-config command to display the contents of the configuration file pointed to by the CONFIG_FILE environment variable.

Setting the BOOTLDR Environment Variable

To set the BOOTLDR environment variable, perform this task:
Step Command Purpose

1 . 

Router# dir bootflash: 

Verify that bootflash contains the boot loader image.

2 . 

Router# configure terminal 

Enter the configuration mode from the terminal.

3 . 

Router(config)# boot bootldr bootflash:boot_loader 

Set the BOOTLDR environment variable to specify the Flash device and filename of the boot loader image. This step modifies the runtime BOOTLDR environment variable.

4 . 

Router# end 

Exit configuration mode.

5 . 

Router# copy system:running-config nvram:startup-config 

Save this runtime BOOTLDR environment variable to your startup configuration.

6 . 

Router# show bootvar 

(Optional) Verify the contents of the BOOTLDR environment variable.

This example shows how to set the BOOTLDR variable.

Router# dir bootflash:
Directory of bootflash:/
 
  1  -rw-     1599488   Nov 29 1999 11:12:29  c6msfc-boot-mz.120-7.XE.bin
 
15990784 bytes total (14391168 bytes free)
Router# configure terminal
Router (config)# boot bootldr bootflash:c6msfc-boot-mz.120-7.XE.bin 
Router (config)# end
Router# copy system:running-config nvram:startup-config
[ok]
Router# show bootvar
BOOT variable = sup-bootflash:c6sup-js-mz.120-7.XE.bin,1;
CONFIG_FILE variable does not exist
BOOTLDR variable = bootflash:c6msfc-boot-mz.120-7.XE.bin
Configuration register is 0x0     

Redundancy and Enhanced High System Availability

The Catalyst 6000 family switch supports dual supervisor engines or Enhanced High System Availability (EHSA). This feature is described in these sections:

Supervisor Engine Redundant Operation

Catalyst 6000 family switches support fault resistance by allowing a secondary supervisor engine to take over if the primary supervisor engine fails. This secondary, or redundant, supervisor engine runs in EHSA standby mode.


Note The EHSA feature is not supervisor engine mirroring or load balancing. Network services are disrupted until the standby supervisor engine takes over and the switch recovers.

EHSA standby mode provides the following features:


Note The two Gigabit Ethernet interfaces on the standby supervisor engine are always active and can be used.

When the switch is powered on, EHSA runs between the two supervisor engines. The supervisor engine that boots first, either in slot 1 or 2, becomes the EHSA active supervisor engine. The Multilayer Switch Feature Card (MSFC) and Policy Feature Card (PFC) become fully operational. The MSFC and Policy Feature Card (PFC) on the standby supervisor engine come out of reset but are not operational.

The following events cause an EHSA switchover:

In a switchover, the standby supervisor engine become fully operational and the following occurs:


Note In a switchover, there is a disruption of traffic because some address states are lost and then restored after they are dynamically redetermined.

Supervisor Engine Redundancy Requirements

For redundant operation, the following requirements must be met:

The active and standby supervisor engines must be in slots 1 and 2 of the switch chassis.


Note EHSA does not support booting from the network.

If these requirements are met, the switch functions in EHSA mode by default.

Synchronizing the Supervisor Engine Configurations

During normal operation, the startup-config, config-registers, and bootvar configurations are synchronized by default between the two supervisor engines. In a switchover, the new active supervisor engine uses the current configuration.

To manually synchronize the configurations used by the two supervisor engines, perform this task on the active supervisor engine:
Step Command Purpose
1
Router(config)# redundancy

Enter redundancy configuration mode.

2
Router(config-r)# main-cpu

Enter main-cpu configuration submode.

3
Router(config-r-mc)# auto-sync {startup-config | config-register | bootvar | standard}

Synchronize the configuration elements.

4
Router(config-r-mc)# end

Return to privileged EXEC mode.

5
Router# copy running-config startup-config

Force a manual synchronization of the configuration files in NVRAM.

Note This step is unnecessary to synchronize the running configuration file in DRAM.

This example shows how to reenable the default automatic synchronization feature using the auto-sync standard command to synchronize the startup-config, config-register, and bootvar configuration of the active supervisor engine with the redundant supervisor engine:

Router(config)# redundancy
Router(config-r)# main-cpu
Router(config-r-mc)# auto-sync standard
Router(config-r-mc)# end
Router# copy running-config startup-config

Note To manually synchronize only individual elements of the standard auto-sync configuration, disable the default automatic synchronization feature.

This example shows how to disable default automatic synchronization of all three redundant configuration elements and only allow automatic synchronization of the startup-config and config-registers of the active supervisor engine to the redundant supervisor engine while disallowing synchronization of the bootvars:

Router(config)# redundancy
Router(config-r)# main-cpu
Router(config-r-mc)# no auto-sync standard
Router(config-r-mc)# auto-sync startup-config 
Router(config-r-mc)# auto-sync config-register
Router(config-r-mc)# end
Router# copy running-config startup-config
 

Displaying the Supervisor Engine Redundancy

To display both supervisor engines, perform this task:
Command Purpose
Router# show module all

Display the redundancy configuration.

This example shows how to display the supervisor engine redundancy configuration:

Router# show module all 
slot ports card type                       model                 serial number
 1     2   Catalyst 6000 supervisor 1      WS-X6K-SUP1-2GE       SAD03130407
 2     2   Catalyst 6000 supervisor 1      WS-X6K-SUP1-2GE       SAD03230569
 8    48   48 port 10/100 mb RJ-45 ethern  WS-X6248-RJ-45        SAD03242620
 
slot MAC addresses                      Hw    Fw           Sw
 1   0050.f0aa.0100 to 0050.f0aa.0102   2.0   4.2(0.24)VAI 5.3(2)CSX 19
 2   00d0.bce8.03bc to 00d0.bce8.03be   4.0   4.2(0.24)VAI 5.3(2)CSX 19
 8   0050.f0ae.bc10 to 0050.f0ae.bc40   1.1   4.2(0.24)VAI 5.3(2)CSX 19
Router#


hometocprevnextglossaryfeedbacksearchhelp
Posted: Mon Jan 3 14:58:44 PST 2000
Copyright 1989-1999©Cisco Systems Inc.