Cisco IOS XR Command Modes Reference

4m ago
15 Views
1 Downloads
1,016.29 KB
74 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Abby Duckworth
Transcription

Cisco IOS XR Command Modes Reference Cisco IOS XR Software Release 3.3 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Text Part Number: OL-8536-01

THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. CCSP, CCVP, the Cisco Square Bridge logo, Follow Me Browsing, and StackWise are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn, and iQuick Study are service marks of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, FormShare, GigaDrive, GigaStack, HomeLink, Internet Quotient, IOS, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, LightStream, Linksys, MeetingPlace, MGX, the Networkers logo, Networking Academy, Network Registrar, Packet, PIX, Post-Routing, Pre-Routing, ProConnect, RateMUX, ScriptShare, SlideCast, SMARTnet, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0601R) Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental. Cisco IOS XR Multicast Configuration Guide 2006 Cisco Systems, Inc. All rights reserved.

C O N T E N T S Preface ix Changes to This Document ix Obtaining Documentation ix Cisco.com x Documentation DVD x Ordering Documentation x Documentation Feedback xi Cisco Product Security Overview xi Reporting Security Problems in Cisco Products Obtaining Technical Assistance xii Cisco Technical Support Website xii Submitting a Service Request xii Definitions of Service Request Severity xiii Obtaining Additional Publications and Information Cisco IOS XR Command Mode Descriptions xi xiii CMR-1 Base Command Modes CMR-1 EXEC Mode CMR-1 ROM Monitor Mode CMR-1 Setup Mode CMR-2 User Configuration Modes CMR-2 Address Family Configuration Mode CMR-2 Address Family Group Configuration Mode CMR-3 Administration Configuration Mode CMR-3 Administration EXEC Mode CMR-3 APS Group Configuration Mode CMR-4 Area Configuration Mode CMR-4 BGP Confederation Peers Configuration Mode CMR-4 Class Map Configuration Mode CMR-5 Crypto IPSec Transport CMR-5 Distributed Route Processor Pairing Mode CMR-5 DWDM Controller Mode CMR-5 Explicit Path Configuration Mode CMR-6 Global Address Family Configuration Mode CMR-6 Global Configuration Mode CMR-6 Cisco IOS XR Command Modes Reference iii

Contents HSRP Interface Configuration Mode CMR-6 Interface Address Family Configuration Mode CMR-7 Interface Configuration Mode CMR-7 Interface Configuration Mode (Protocol Areas) CMR-8 Interface IGMP Configuration Mode CMR-8 Interface Management Configuration Mode CMR-8 Interface Mulitcasting Mode CMR-9 Interface PIM Configuration Mode CMR-9 Interface Preconfiguration Mode CMR-9 Interface RIP Configuration Mode CMR-9 Interface Session Border Controller Configuration Mode CMR-10 Interface Tunnel Configuration Mode CMR-10 IP SLA ICMP Echo Configuration Mode CMR-10 IP SLA ICMP Path-Echo Configuration Mode CMR-10 IP SLA ICMP Path-Jitter Configuration Mode CMR-11 IP SLA Operation Configuration Mode CMR-11 IP SLA Operation History Configuration Mode CMR-11 IP SLA Operation Statistics Configuration Mode CMR-12 IP SLA Reaction Condition Configuration Mode CMR-12 IP SLA Reaction Configuration Mode CMR-12 IP SLA Responder Configuration Mode CMR-13 IP SLA Schedule Configuration Mode CMR-13 IP SLA UDP Echo Configuration Mode CMR-13 IP SLA UDP Jitter Configuration Mode CMR-13 IPv4 Access List Configuration Mode CMR-14 IPv4 Prefix List Configuration Mode CMR-14 IPv4 VRF Address Family Command Mode CMR-14 IPv6 Access List Configuration Mode CMR-15 IPv6 Prefix List Configuration Mode CMR-15 ISAKMP Group Configuration Mode CMR-15 ISAKMP Policy Configuration Mode CMR-16 Key Chain Mode CMR-16 Keychain-Key Mode CMR-16 Line (Template) Configuration Mode CMR-17 LMP Datalink Adjacency Configuration Mode CMR-17 LMP Neighbor Configuration Mode CMR-17 MPLS LDP Configuration Mode CMR-17 MPLS LDP Interface Configuration Mode CMR-18 MPLS LDP Label Accept Configuration Mode CMR-18 MPLS LDP Label Advertise Configuration Mode CMR-19 Cisco IOS XR Command Modes Reference iv

Contents MPLS LDP Label Configuration Mode CMR-19 MPLS LDP Log Configuration Mode CMR-19 MPLS OAM Configuration Mode CMR-20 MPLS O-UNI Configuration Mode CMR-20 MPLS O-UNI Interface Configuration Mode CMR-20 MPLS TE Configuration Mode CMR-21 MPLS TE Interface Configuration Mode CMR-21 Multicast Routing Configuration Mode CMR-21 Neighbor Address Family Configuration Mode CMR-21 Neighbor Configuration Mode CMR-22 Neighbor Group Address Family Configuration Mode CMR-22 Neighbor Group Configuration Mode CMR-22 NTP Configuration Mode CMR-23 NTP Interface Configuration Mode CMR-23 O-UNI LMP Datalink Adjacency Configuration Mode CMR-23 O-UNI LMP Neighbor Adjacency Configuration Mode CMR-23 O-UNI LMP Neighbor Configuration Mode CMR-24 Peer Configuration Mode CMR-24 Placement Program Mode CMR-24 Policy Map Class Configuration Mode CMR-24 Policy Map Configuration Mode CMR-25 POS Interface Configuration Mode CMR-25 Process Configuration Mode CMR-25 Profile Configuration Mode CMR-26 Public Key Chain Configuration Mode CMR-26 Public Key Configuration Mode CMR-27 QoS FAX Configuration Mode CMR-27 QoS Video Configuration Mode CMR-27 QoS Voice Configuration Mode CMR-28 RADIUS Server Group Configuration Mode CMR-28 Route Distinguisher Configuration Mode CMR-28 Route-policy Configuration Mode CMR-28 Router Address Family Configuration Mode CMR-29 Router Configuration Mode CMR-29 Router HSRP Configuration Mode CMR-29 Router IGMP Configuration Mode CMR-30 Router MLD Configuration Mode CMR-30 Router MSDP Configuration Mode CMR-30 Router PIM Configuration Mode CMR-30 Router VRRP Configuration Mode CMR-31 Cisco IOS XR Command Modes Reference v

Contents RSVP Configuration Mode CMR-31 RSVP Interface Configuration Mode CMR-31 Session Border Controller Configuration Mode CMR-32 SBC DBE Configuration Mode CMR-32 SBC DBE Media Address Configuration Mode CMR-32 SBC Virtual DBE Configuration Mode CMR-32 SBC Virtual DBE H248 Configuration Mode CMR-33 Session Border Controller SBE Configuration Mode CMR-33 SBC SBE Routing Policy Configuration Mode CMR-33 SBC RADIUS Account Configuration Mode CMR-34 SBC H.323 Adjacency Configuration Mode CMR-34 SBC SIP Adjacency Configuration Mode CMR-34 SBC CAC Policy Configuration Mode CMR-35 SBC CAC Table Configuration Mode CMR-35 SBC CAC Table Entry Configuration Mode CMR-35 SBC Local Billing Configuration Mode CMR-36 SBC Media Gateway Configuration Mode CMR-36 SBC Remote Billing Configuration Mode CMR-36 SBC RADIUS Accounting Server Configuration Mode CMR-37 SBC RADIUS Authentication Configuration Mode CMR-37 SBC RADIUS Authentication Server Configuration Mode CMR-37 SBC Routing Policy Number Analysis Configuration Mode CMR-38 SBC Routing Policy Number Analysis Entry Configuration Mode CMR-38 Secure Domain Router Configuration Mode CMR-39 SBC Routing Policy Routing Table Configuration Mode CMR-39 SBC Routing Policy Routing Table Entry Configuration Mode CMR-39 Session Group Configuration Mode CMR-40 SONET/SDH Configuration Mode CMR-40 SONET/SDH Path Configuration Mode CMR-41 Subinterface Configuration Mode CMR-41 TACACS Server Group Configuration Mode CMR-41 Task Group Configuration Mode CMR-41 Template Configuration Mode CMR-42 Transport Configuration Mode CMR-42 Trustpoint Configuration Mode CMR-42 Tunnel Configuration Mode CMR-43 User Group Configuration Mode CMR-43 Username Configuration Mode CMR-43 Virtual-link Configuration Mode CMR-43 Virtual Private Network Routing and Forwarding Mode CMR-44 Cisco IOS XR Command Modes Reference vi

Contents Virtual Private Network Routing and Forwarding Neighbor Mode CMR-44 VPNv4 Address Family Group Command Mode CMR-44 VPNv4 Neighbor Group Address Family Command Mode CMR-45 VRRP Interface Configuration Mode CMR-45 Cisco IOS XR Command Prompts CMR-47 Cisco IOS XR Command Modes Reference vii

Contents Cisco IOS XR Command Modes Reference viii

Preface This reference contains descriptions of the modes that are available in the user command-line interface (CLI) that is supported by Cisco IOS XR software. The first chapter describes the command and configuration modes used in the CLI. These descriptions include short summaries and example applications of the modes. The second chapter of this reference contains a table that identifies each CLI mode by the appearance of the prompt. For each mode, this table includes an example of how you enter mode. This preface contains the following sections: Changes to This Document Obtaining Documentation Documentation Feedback Cisco Product Security Overview Obtaining Technical Assistance Obtaining Additional Publications and Information Changes to This Document Table 1 lists the technical changes made to this document since it was first printed. Table 1 Changes to This Document Revision Date Change Summary OL-8536-01 April 2006 Initial release of the document. Obtaining Documentation Cisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems. Cisco IOS XR Command Modes Reference ix

Preface Obtaining Documentation Cisco.com You can access the most current Cisco documentation at this URL: http://www.cisco.com/univercd/home/home.htm You can access the Cisco website at this URL: http://www.cisco.com You can access international Cisco websites at this URL: http://www.cisco.com/public/countries languages.shtml Documentation DVD Cisco documentation and additional literature are available in a Documentation DVD package, which may have shipped with your product. The Documentation DVD is updated regularly and may be more current than printed documentation. The Documentation DVD package is available as a single unit. Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product number DOC-DOCDVD ) from the Ordering tool or Cisco Marketplace. Cisco Ordering tool: http://www.cisco.com/en/US/partner/ordering/ Cisco Marketplace: http://www.cisco.com/go/marketplace/ Ordering Documentation You can find instructions for ordering documentation at this URL: http://www.cisco.com/univercd/cc/td/doc/es inpck/pdi.htm You can order Cisco documentation in these ways: Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool: http://www.cisco.com/en/US/partner/ordering/ Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387). Cisco IOS XR Command Modes Reference x

Preface Documentation Feedback Documentation Feedback You can send comments about technical documentation to bug-doc@cisco.com. You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address: Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883 We appreciate your comments. Cisco Product Security Overview Cisco provides a free online Security Vulnerability Policy portal at this URL: http://www.cisco.com/en/US/products/products security vulnerability policy.html From this site, you can perform these tasks: Report security vulnerabilities in Cisco products. Obtain assistance with security incidents that involve Cisco products. Register to receive security information from Cisco. A current list of security advisories and notices for Cisco products is available at this URL: http://www.cisco.com/go/psirt If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL: http://www.cisco.com/en/US/products/products psirt rss feed.html Reporting Security Problems in Cisco Products Cisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT: Tip Emergencies — security-alert@cisco.com Nonemergencies — psirt@cisco.com We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x. Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one that has the most recent creation date in this public key server list: http://pgp.mit.edu:11371/pks/lookup?search psirt%40cisco.com&op index&exact on Cisco IOS XR Command Modes Reference xi

Preface Obtaining Technical Assistance In an emergency, you can also reach PSIRT by telephone: 1 877 228-7302 1 408 525-6532 Obtaining Technical Assistance For all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical Support Website on Cisco.com features extensive online support resources. In addition, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service contract, contact your reseller. Cisco Technical Support Website The Cisco Technical Support Website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, 365 days a year, at this URL: http://www.cisco.com/techsupport Access to all tools on the Cisco Technical Support Website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL: http://tools.cisco.com/RPF/register/register.do Note Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support Website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call. Submitting a Service Request Using the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco TAC engineer. The TAC Service Request Tool is located at this URL: http://www.cisco.com/techsupport/servicerequest For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco TAC engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly. Cisco IOS XR Command Modes Reference xii

Preface Obtaining Additional Publications and Information To open a service request by telephone, use one of the following numbers: Asia-Pacific: 61 2 8446 7411 (Australia: 1 800 805 227) EMEA: 32 2 704 55 55 USA: 1 800 553-2447 For a complete list of Cisco TAC contacts, go to this URL: http://www.cisco.com/techsupport/contacts Definitions of Service Request Severity To ensure that all service requests are reported in a standard format, Cisco has established severity definitions. Severity 1 (S1)—Your network is “down,” or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation. Severity 2 (S2)—Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation. Severity 3 (S3)—Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels. Severity 4 (S4)—You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations. Obtaining Additional Publications and Information Information about Cisco products, technologies, and network solutions is available from various online and printed sources. Cisco Marketplace provides a variety of Cisco books, reference guides, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL: http://www.cisco.com/go/marketplace/ Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL: http://www.ciscopress.com Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL: http://www.cisco.com/packet Cisco IOS XR Command Modes Reference xiii

Preface Obtaining Additional Publications and Information iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL: http://www.cisco.com/go/iqmagazine Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL: http://www.cisco.com/ipj World-class networking training is available from Cisco. You can view current offerings at this URL: http://www.cisco.com/en/US/learning/index.html Cisco IOS XR Command Modes Reference xiv

Cisco IOS XR Command Mode Descriptions This document describes the command and configuration modes used in the Cisco IOS XR command line interface (CLI). The availability of configuration modes depends on the software packages that are installed on your system and on which router platform you are using. For more information on a particular configuration mode, refer to the command reference or configuration that is related to the mode described in this module. This module describes the command modes in the following sections: Base Command Modes User Configuration Modes Following the mode definitions in this module, the next module contains a table that identifies the router prompts in alphabetical order. This table shows where the prompt exists in the CLI and how you get to the prompt. It also has examples of command sequences that could get you to a particular prompt. Base Command Modes Base command modes are used for navigating the CLI and performing basic router startup, configuration, and monitoring tasks. EXEC Mode Prompt: (router) The default command mode for the CLI is EXEC mode. In general, the EXEC commands let you connect to remote devices, change terminal settings on a temporary basis, perform basic tests, and list system information. Most CLI commands in EXEC mode do not change system operation. The most common EXEC commands are show commands (to display router configuration or operational data) and clear commands (to clear or reset system counters). ROM Monitor Mode Prompt: rommon Bn If your router or access server does not find a valid system image to load, the user interface enters read-only memory (ROM) monitor mode. ROM monitor (ROMMON) mode can also be accessed by interrupting the boot sequence during startup. From ROM monitor mode, you can boot the device or perform diagnostic tests. Cisco IOS XR Command Modes Reference CMR-1

Cisco IOS XR Command Mode Descriptions User Configuration Modes To enter ROM monitor mode, use the Break (Ctrl-C) during the first 60 seconds of startup. The router prompt consists of an angle bracket by itself or “rommon” followed by the letter B a number, and an angle bracket: or rommon B1 . The number after the B increments upon each user-entry. Setup Mode Setup mode is not actually a command mode. Setup mode is an interactive facility that lets you perform first-time configuration and other basic configurations on all routers. The facility prompts you to enter basic information needed to start a router functioning. Setup mode uses the system configuration dialog, which guides you through the configuration process. It prompts you first for global parameters and then for interface parameters. The values shown in brackets next to each prompt are the default values. To enter setup mode after the router has been configured for the first time, use the setup command in admin EXEC mode. The router prompt for setup mode is indicated by a configuration question, followed by the default answer in brackets and a colon (:), as shown in the following example: Continue with configuration dialog? [yes]: Enter host name [Router]: User Configuration Modes The remaining sections of this module describe each mode you can access during regular operation. Address Family Configuration Mode Prompts: For BGP: (config-bgp-af) For OSPF: (config-ospfv-af) For OSPFv3: (config-ospfv3-af) For EIGRP: (config-eigrp-af) For IS-IS, see Router Address Family Configuration Mode. Enter one of the address family configuration modes from router configuration mode. Address family configuration mode is available for the BGP, OSPF, OSPFv3, and EIGRP protocols. This mode is the highest-level address family configuration mode. This mode is also called global address family configuration mode. For BGP only, address family configuration is available in four modes. In addition to this section, see also Address Family Group Configuration Mode, Neighbor Address Family Configuration Mode, or Neighbor Group Address Family Configuration Mode. For example, first enter BGP router configuration mode, then address family configuration mode: RP/0/RP0/CPU0:router(config)# router bgp 1 RP/0/RP0/CPU0:router(config-bgp)# address-family ipv6 unicast RP/0/RP0/CPU0:router(config-bgp-af)# Cisco IOS XR Command Modes Reference CMR-2

Cisco IOS XR Command Mode Descriptions User Configuration Modes Address Family Group Configuration Mode Prompt: (config-bgp-afgrp) Enter address family group configuration mode from router configuration mode for BGP. In this group configuration mode, you can configure characteristics of an address family group that a neighbor uses. Furthermore, neighbors inherit the configuration parameters of the entire address family group. For example, create an address family group with the name newgroup1 and an address family of IPv4 unicast. The CLI subsequently enters address family group configuration mode. In address family group mode, you configure the next-hop-self feature, so that all neighbors that use address family newgroup1 inherit the next-hop-self configuration: RP/0/RP0/CPU0:router(config)# router bgp 100 RP/0/RP0/CPU0:router(config-bgp)# af-group newgroup1 address-family ipv4 unicast RP/0/RP0/CPU0:router(config-bgp-afgrp)# next-hop-self Administration Configuration Mode Prompt: (admin-config) Enter administration configuration (admin config) mode from administration EXEC mode. The primary application of administration configuration mode is to let you: Configure service domain routers (SDRs). Control individual card slots. For example, you can turn power on or off at a slot. For SDRs, this mode is used primarily to display system-wide parameters, configure the administration plane over the control Ethernet, and configure SDRs on a multishelf a system. These operations are available at the root level. For example, first enter the administration EXEC mode, and then use the configure command to enter administration configuration mode: RP/0/RP0/CPU0:router# admin RP/0/RP0/CPU0:router(admin)# configure RP/0/RP0/CPU0:router(admin-config)# Administration EXEC Mode Prompt: (admin) Enter administration executive (admin EXEC) mode from EXEC mode. The admin EXEC mode applies primarily to secure domain routers (SDRs). When SDRs have been configured, the EXEC mode provides visibility into only one SDR, so you must enter administration EXEC mode to see all system parameters. To display system-wide parameters, configure the administration plane over the control Ethernet, and configure SDRs on multishelf systems, use administration EXEC mode and administration configuration mode. For example, enter the admin EXEC mode: RP/0/RP0/CPU0:router# admin RP/0/RP0/CPU0:router(admin)# Cisco IOS XR Command Modes Reference CMR-3

Cisco IOS XR Command Mode Descriptions User Configuration Modes APS Group Configuration Mode Prompt: (config-aps) Enter automatic protection switching (APS) group configuration mode by using the aps group command in global configuration mode. The SONET/SDH APS feature offers recovery from fiber (external) or equipment (interface and internal) failures at the SONET/SDH line layer. The aps group command either creates a new group or identifies an existing group. The group numbers have a range of 1 to 255. APS requires the creation of an APS group for each protection port and its corresponding working port. For example, use the authenticate command in APS group configuration mode to specify abctown as the authentication string for APS group 1: RP/0/RP0/CPU0:router(config)# aps group 1 RP/0/RP0/CPU0:router(config-aps)# authenticate abctown For example, configure SONET port 0/2/0/2 to be a local protection channel in APS group 1: RP/0/RP0/CPU0:router(config)# aps group 1 RP/0/RP0/CPU0:router(config-aps)# channel 0 local SONET 0/2/0/2 For example, configure the remote channel with IP address 192.168.1.1 to be the working channel for APS group 1: RP/0/RP0/CPU0:router(config)# aps group 1 RP/0/RP0/CPU0:router(config-aps)# channel 1 remote 192.168.1.1 Area Configuration Mode Prompt: (config-osp

Contents iv Cisco IOS XR Command Modes Reference HSRP Interface Configuration Mode CMR-6 Interface Address Family Configuration Mode CMR-7 Interface Configuration Mode CMR-7 Interface Configuration Mode (Protocol Areas) CMR-8 Interface IGMP Configuration Mode CMR-8 Interface Management Configuration Mode CMR-8 Interface Mulitcasting Mode CMR-9 Interface PIM Configuration Mode CMR-9

Related Documents:

Oct 27, 2014 · Cisco ISR 4400 Series Cisco ISR 4300 Series Cisco ISR 4431 Cisco ISR 4321 Cisco ISR 4451 Cisco ISR 4331 Cisco ISR 4351 Table 1 Cisco IOS XE 3S–to–Cisco IOS Release Number Mapping Cisco IOS XE 3S Release Cisco IOS Release 3.14 15.5(1)S 3.13S 15.4(3)S 3

C O N T E N T S Using the Cisco IOS Command-Line Interface 1 Finding Feature Information 1 Cisco IOS XE CLI Command Modes Overview 1 Cisco IOS XE CLI Task List 2 Getting Context-Sensitive Help 3 Using the no and default Forms of Commands 5 Using Command History 6 Using CLI Editing Features and Shortcuts 6 Moving the Cursor on the Command Line 6 Completing a Partial Command Name 7

Router Software Origin Validation (RPKI RTR & BGP Modifications) available in Cisco IOS and IOS-XR Cisco IOS code available in IOS XE-3.5.0/15.1(3)S Cisco IOS platforms targeted ASR1K, 7600, ME3600/ ME3800, ASR 903 Cisco IOS-XR available in the XR-4.2.1 Cisco IOS-X

XML Conversion Draft - 03/07/2011 iii Cisco IOS Server Load Balancing Configuration Guide OL-24559-01 CONTENTS CHAPTER 1 Cisco IOS SLB Features Roadmap 1-1 CHAPTER 2 Information About Cisco IOS SLB 2-1 Overview 2-1 Benefits of IOS SLB 2-3 Cisco IOS SLB Features 2-4 Routing Features 2-4 Algorithms for Server Load Balancing 2-5 Bind ID Support 2-6

Cisco ASA 5505 Cisco ASA 5505SP Cisco ASA 5510 Cisco ASA 5510SP Cisco ASA 5520 Cisco ASA 5520 VPN Cisco ASA 5540 Cisco ASA 5540 VPN Premium Cisco ASA 5540 VPN Cisco ASA 5550 Cisco ASA 5580-20 Cisco ASA 5580-40 Cisco ASA 5585-X Cisco ASA w/ AIP-SSM Cisco ASA w/ CSC-SSM Cisco C7600 Ser

Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unified Computing System (Cisco UCS), Cisco UCS B-Series Blade Servers, Cisco UCS C-Series Rack Servers, Cisco UCS S-Series Storage Servers, Cisco UCS Manager, Cisco UCS

The following Cisco IOS software releases support software activation on Cisco ISRs: † Cisco 3900 series, 2900 series, and 1900 series ISRs running Cisco IOS Release 15.0(1)M. – Cisco 3925E and Cisco 3945E ISR running Cisco IOS Release 15.1(1)T. † Right to Use license is supported on Cisco IOS Release 15.0(1)M4, 15.1(1)T2, 15.1(2)T2, 15.1 .

Cisco 2951 ISR, Cisco 3925 ISR, Cisco 3925E ISR, Cisco 3945 ISR, and Cisco 3945E ISR, running Cisco IOS Release 15.1.2.T3. 1.5 Physical Scope of the TOE The TOE is a hardware and software solution that makes up the following router models Cisco 881 ISR, Cisco 881G ISR, Cisco 891 ISR, Cisco 1905 ISR, Cisco 1921 ISR, Cisco