|
|
System management screens configure the overall parameters of an Cisco MGX 8260 node and define its interactions with other nodes and servers.
Before you can configure the Cisco MGX 8260, you must log on as a user with the privilege to change system parameters. You need SuperUser privileges to change most system-level settings.
To log on, follow these steps:
Step 2 Connect to the MGX 8260 HTTP server using the conventional http:// notation. You need to know the host name or IP address for the desired MGX 8260 node.
Step 3 The logon screen is displayed.
Step 4 In the User Id field, enter SuperUser.
Step 5 In the Password field, enter cisco or the new password you assigned to this account.
The Cisco MGX 8260 displays the chassis view (see Figure 14-1).

From the Navigation pane on the left, select the operation you want to perform. To set node parameters click Node and then click a submenu item.
See the following sections for configuration tasks for nodes:
To view or change system-wide parameters, follow these steps:
Step 2 Click System.
The system form opens, displaying existing settings (see Figure 14-2).

The form displays the system up time, a read-only value, representing the length of time the system has operated without interruption.
Step 3 Change the following system parameters:
| Parameter | Description |
|---|---|
Node Name | The name of this node. Enter up to 15 characters |
Node Number | The node number of this shelf |
BackPlaneType | The MGX 8260 backplane type (read-only) |
System Contact | The name of the system administrator |
System Location | The physical location of the MGX 8260 chassis |
Rack Number | The rack number of this shelf |
Node Type | The node type---MGX 8260 |
BackPlane Serial Number | The backplane serial number (read-only) |
System Description | A user-defined description of the system |
System Time Zone | Time zone, expressed as the number of hours before or after GMT1 (see Table 14-1) |
Set System Date | The system date, specified in month (mm), date (dd), and year (yyyy) fields |
Set System Time | The current time, set in hour, minute, and second fields |
| 1GMT = Greenwich Mean Time |
Step 4 Click Modify. The system applies the changes.
| Zone | Value | Zone | Value | |
|---|---|---|---|---|
gmtplus12 | 1 |
| gmtminus01 | 14 |
gmtplus11 | 2 | gmtminus02 | 15 | |
gmtplus10 | 3 | gmtminus03 | 16 | |
gmtplus09 | 4 | gmtminus04 | 17 | |
gmtplus08 | 5 | est | 18 | |
gmtplus07 | 6 | cst | 19 | |
gmtplus06 | 7 | pdt | 20 | |
gmtplus05 | 8 | pst | 21 | |
gmtplus04 | 9 | gmtminus9 | 22 | |
gmtplus03 | 10 | gmtminus10 | 23 | |
gmtplus02 | 11 | gmtminus11 | 24 | |
gmtplus01 | 12 | gmtminus12 | 25 | |
gmt | 13 |
|
|
|
You configure the MGX 8260 management interface for local or remote operation by setting the appropriate IP addresses and management paths. Assign management IP addresses for each of the following management interfaces that you plan to use:
![]() |
Note If you change the IP address of the port the WebViewer is using, you will interrupt the session. |
To view management interface parameters, follow these steps:
Step 2 Click Management IP.
The Management IP Settings form opens, displaying existing settings.

Step 3 Interpret the information as follows:
| Displayed Information | Description |
|---|---|
Management Ethernet IP Address | The IP address for the 10BaseT port, expressed in standard IP dot notation |
Management Ethernet IP Mask | The IP address mask for the 10BaseT port, expressed in standard IP dot notation |
Management Gateway IP Address | The gateway for IP traffic to this node |
Management Ethernet Mac Address | The MGX 8260 MAC address |
In-band Management IP Address | The IP address for the inband management virtual port, expressed in standard IP dot notation |
In-band Management IP Mask | The IP address mask for the inband management virtual port, expressed in standard IP dot notation |
To change the Ethernet parameters, follow these steps:
Step 2 Click Management IP.
The Management IP form opens.
Step 3 On the Management IP form, click Change Ethernet Setting.
The Management Ethernet IP Setting form opens.

Step 4 Enter the management Ethernet parameters:
| Parameter | Description |
|---|---|
Management Ethernet IP Address | The IP address for the 10BaseT port, expressed in standard IP dot notation. |
Management Ethernet IP Mask | The IP address mask for the 10BaseT port, expressed in standard IP dot notation. |
Step 5 Click Modify. The system updates the management IP interface.
Step 6 Click Back.
Step 7 If your system uses redundant management networks, click Change Ethernet IP2 Setting.
The Management Ethernet IP Setting 2 form opens.
Step 8 Enter the Ethernet IP address and subnet mask for the second management interface.
To change the in-band IP address, follow these steps:
Step 2 Click Management IP.
The Management IP form opens.
Step 3 On the Management IP form, click Change In-band Setting.
The Management In-band IP Setting form opens.

Step 4 Enter the in-band parameters:
| Parameter | Description |
|---|---|
In-band Management IP Address | The IP address for the inband management virtual port, expressed in standard IP dot notation |
In-band Management IP Mask | The IP address mask for the inband management virtual port, expressed in standard IP dot notation |
Step 5 Click Modify. The system updates the management IP interface.
The MGX 8260 clock module has three synchronization options:
You assign one clock source as the primary source and another as the secondary source. When using the line clock source, specify both the line and slot associated with the source.
During normal operation, the primary clock is the active source and the secondary clock is the backup source. If the active source fails, the Cisco MGX 8260 switches to the backup clock and reports an alarm. You can also switch to the backup source manually. This section explains how to set primary and secondary clocks and view clock status.
You view clock status with a single command. The clock parameters include:
To view clock source information, follow these steps:
Step 2 Click Clock Source.
The Clock Source screen opens.

Step 3 Interpret clock settings as follows:
| Setting | Description |
|---|---|
Primary and Secondary Clock Source Slot | The slot number for the clock source |
Primary and Secondary Clock Source Line | The line number for the clock source |
Primary and Secondary Clock Source Type | The clock source type:
|
Primary and Secondary Clock Status | The clock status:
|
Current Clock | The current clock source:
|
Current Clock Stratum | The level of Stratum clock:
|
Clock Source Card Type | The type of card for the clock source:
|
![]() |
Note The selected clock source may not be the active clock source if the selected clock fails. |
To set the clock source, follow these steps
Step 2 Click Clock Source.
The Clock Source screen opens.
Step 3 Click either Primary Setting or Secondary Setting, as appropriate.
The corresponding clock source setting dialog box opens.

The form displays the following read-only values:
| Parameter | Description |
|---|---|
Current Clock | The current clock source:
|
Primary (or Secondary) Clock Status | The operational status of the primary clock source:
|
Current Clock Stratum | The level of Stratum clock:
|
Step 4 Change the clock parameters as follows:
| Parameter | Description |
|---|---|
Primary (or Secondary) Clock Source Slot | The slot supplying the clock. This argument is ignored if the clock source type is external (BITS) or internal. Valid entries: 1 to 16 |
Primary (or Secondary) Clock Source Line | The line number for the clock source. This argument is ignored if the clock source type is external (BITS) or internal. Valid entries:
|
Primary (or Secondary) Clock Source Type | The clock source type:
|
Clock Source Card Type | The type of card for the clock source:
|
Step 5 Click Modify.
The system updates the clock settings.
You can force the system to switch between the primary and secondary clock. During normal operation, the current clock is the primary clock. Typically you switch clocks to restore the primary clock source after an automatic switchover to the secondary clock.To switch to the secondary clock, follow these steps:
Step 2 Click Clock Source.
The Clock Source screen opens.
Step 3 On the Clock Source screen, click Switch Clock Source and confirm your action.
When managing the Cisco MGX 8260 from a SNMP manager, security is enforced with password-like community strings. SNMP communities are groupings of workstations and servers (or gateways) that can manage the Cisco MGX 8260. Community strings are important when managing the Cisco MGX 8260 from a Network Management System, like HP Openview. You can configure up to 15 community strings.
To view all community strings, follow these steps:
Step 2 Click SNMP.
Step 3 From the SNMP options, click Community String.
The Community String screen opens.

Step 4 Interpret the table as follows:
| Table Entry | Description |
|---|---|
Manager IP Address | The IP address of the manager associated with this string |
Community String | The name of the community string |
Privilege | The manager's privilege, either read-write or read-only |
To add a community string, follow these steps:
Step 2 Click SNMP.
Step 3 From the SNMP options, click Community String.
The Community String screen opens.
Step 4 Click the "+" icon.
.The Add Community String form opens.

Step 5 Enter the following parameters:
| Parameter | Description |
|---|---|
Manager IP Address | The IP address of an SNMP manager, expressed in standard IP dot notation. When set to 0.0.0.0, the community string applies to all IP addresses. |
Community String | The SNMP community, expressed as a text string of up to 20 characters. Typical strings are Public and Private. |
Access Level | The privilege assigned to this community string:
|
Step 6 Click the Add button.
The system adds the community string.
To delete a community string, follow these steps:
Step 2 Click SNMP.
Step 3 From the SNMP options, click Community String.
The Community String screen opens.
Step 4 Click the "-" icon of the community string you want to delete and confirm your action.
The system deletes the community string.
To view trap registrations, follow these steps:
Step 2 Click Trap Registration.
The Trap Registration screen opens.

Step 3 Interpret the table as follows:
| Table Entry | Description |
|---|---|
Manager IP Address | The address of the SNMP manager you want to receive trap event messages. |
UDP Port Num | Port to which the traps are transmitted. |
Interface | The default interface for initially sending traps if the routing table has no trap manager:
|
Community String | SNMP community string for the trap. For more information, see the "Setting and Viewing SNMP Communities" section. |
Subscribed Bitmap | A bitwise specification of trap subscription categories (see Table 14-2). |
Latest Seq. Num | Latest sequence number. |
| Bit | Description |
|---|---|
0 | Major (trap severity selection) |
1 | Minor (trap severity selection) |
2 | Information (trap severity selection) |
3 | Shelf |
4 | Card |
5 | SNMP |
6 | Dsx1 Line |
7 | Dsx3 Line |
8 | Sonet Line |
9 | Ether Line |
10 | Voice Port |
11 | Ether Channel |
12 | Voice Channel |
13 | EMM |
14 | Clock |
15 | DSP |
16 | DMCMAP |
To add SNMP trap subscriptions, follow these steps:
Step 2 Click Trap Registration.
The Trap Registration screen opens.
Step 3 Click the "+" icon.
The Add Trap Registration form opens.

Step 4 Enter the trap parameters:
| Parameter | Description |
|---|---|
Manager IP Address | The address of the SNMP manager you want to receive trap event messages. |
Mgr. UDP Port Num | Port to which the traps are transmitted. The default is 162. |
Interface | The default interface for initially sending traps if the routing table has no trap manager:
|
Community String | SNMP community string for the trap. For more information, see "Setting and Viewing SNMP Communities" section. |
Severity Selection | Checkbox selections for the alarm severity that triggers a notification:
|
Type Selection | Checkbox selections for the type of alarm that triggers a notification:
|
Step 5 Click Add.
The system registers the traps for the specified manager.
To change SNMP trap subscriptions, follow these steps:
Step 2 Click Trap Registration.
The Trap Registration screen opens.
Step 3 Click the "i" icon.
The Modify Trap Registration form opens.

Step 4 Modify the trap parameters:
| Parameter | Description |
|---|---|
Manager IP Address | The address of the SNMP manager you want to receive trap event messages. |
Mgr. UDP Port Num | Port to which the traps are transmitted. The default is 162. |
Interface | The default interface for initially sending traps if the routing table has no trap manager:
|
Community String | SNMP community string for the trap. For more information, see the "Setting and Viewing SNMP Communities" section. |
Trap Subscription Setting | Checkbox selections for trap registration:
|
Step 5 Click Modify.
The system modifies the trap registration for the specified manager.
To delete SNMP trap registrations, follow these steps:
Step 2 Click Trap Registration.
The Trap Registration screen opens.
Step 3 Click the "-" icon of the trap registration you want to delete and confirm your action.
The system deletes the registration.
The Cisco MGX 8260 enforces security with user accounts and access levels. Users must log onto the Cisco MGX 8260 before performing any task, and authenticated users can perform only those tasks permitted by their access level. The Cisco MGX 8260 supports up to 20 user accounts, each with access privileges ranging from full control to guest.
| Access Level | Account type | Command groups |
|---|---|---|
1 | SuperUser | Access all features |
2 | Administrator | Configure and view all features except user profiles and community strings |
3 | Provisioning | Configure and view system, port, lines, end points, and connections |
4 | Maintenance | Access selected level 3 commands |
5 | Operator | View system, port, lines, end points, and connections |
6 | Guest | View system, common lines and ports |
A new system has a default SuperUser account. To prohibit unauthorized access to the equipment, replace the default account with a unique one and create new accounts for other personnel.
To view all user accounts, follow these steps:
Step 2 Click User Profile.
The User Profile screen opens.

Step 3 Interpret the table as follows:
| Table Entry | Description |
|---|---|
User Num | The table entry for the user. |
User Name | The user logon name. |
Access Level | The security level for the account. See Table 14-3. |
To add a new user, follow these steps:
Step 2 On the Navigation pane, click Node.
Step 3 Click User Profile.
The User Profile screen opens.
Step 4 On the User Profile screen, click the"+" icon.
The Add User form opens.

Step 5 Enter the new user parameters:
| Parameter | Description |
|---|---|
User Name | The name for the new user, expressed as a case-sensitive alphanumeric string of four to ten characters. Special characters such as @, #, and $ are allowed. |
Set Password | The account password, expressed as a case-sensitive alphanumeric string of one to ten characters. Special characters such as @, #, and $ are allowed. |
Retype Password | Password verification. |
Access level | The access privilege for the user. See Table 14-3. |
Step 6 Click Add.
The system adds the new user account.
Step 7 Repeat these steps for other users you want to authorize.
To change a user account, follow these steps:
Step 2 On the Navigation pane, click Node.
Step 3 Click User Profile.
The User Profile screen opens.
Step 4 On the User Profile screen, click the "i" icon for the account you want to modify.
The Modify User form opens.

Step 5 Change the user parameters:
| Parameter | Description |
|---|---|
User Name | The name for the user, expressed as a text string. |
Set Password | The account password, expressed as an alphanumeric text string of one to ten characters. Special characters such as @, #, and $ are allowed. |
Retype Password | Password verification. |
Access level | The access privilege for the user. See Table 14-3. |
Step 6 Click Modify.
The system applies the changes to the user account.
You can always change your own password, but you need SuperUser privilege to change the password of others.
To change a password, follow these steps:
The Change Password form opens.

Step 2 Enter the following parameters:
| Parameters | Description |
|---|---|
User Name | The account you want to change. |
Original Password | The old password. |
Set Password | The new password, expressed as an alphanumeric text string of one to ten characters. Special characters such as @, #, and $ are allowed. |
Retype Password | Password verification. |
Step 3 Click Modify Password. The system changes the account password.
To delete a user, follow these steps:
Step 2 On the Navigation pane, click Node.
Step 3 Click User Profile.
The User Profile screen opens.
Step 4 On the User Profile screen, click the "-" icon on the row of the user you want to delete and then confirm your action.
The system removes the user from the database. Level 1 users return to their original SuperUser account.
Use this procedure to upgrade the software image for an MGX 8260 card. To upgrade software, you must conform to the Cisco file-naming convention and supply a security key. The security system disables tftp file transfers if the key is not configured or does not match. You can download up to 10 software images per card type.
![]() |
Warning This is a service-affecting action. Perform this task during light traffic periods or in a pre-arranged maintenance window. |
To download files to the Cisco MGX 8260, follow these steps:
Step 2 Click the File Download submenu.
The File Download screen opens.

Step 3 Type the complete path and filename for the file to download.
Step 4 Set the following parameters:
| Parameters | Description |
|---|---|
Card Image Type | The name of the card to restore:
|
Rev | A configuration revision number expressed as a hexadecimal number, such as 1A or 3F |
File Type | The type of file:
|
Security Key | The six-character alphanumeric security key for the target Cisco MGX 8260 (reserved for future use) |
File Name | The fully-qualified path and file name of the file to download. File names typically identify the card type, version, and file type. The following is an example of a software image file: SCC_R01.01.01.IMG |
Step 5 Click Start Download.
The system loads the new software image and reboots the card.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Mar 30 20:29:03 PST 2000
Copyright 1989 - 2000©Cisco Systems Inc.