Creating Disk Backups for the Cisco IOS XR Software and Configurations
|
|
- Madeleine Lang
- 8 years ago
- Views:
Transcription
1 Creating Disk Backups f the Cisco IOS XR Software and Configurations This module describes the process to configure disk mirring and create a backup disk of the Cisco IOS XR software packages and configurations. Note The disk backup feature is also known as Golden Disk. Feature Histy Creating Backup Disks and Disk Mirring Release Release Release Release Release Release Modification Backup Disk creation was introduced on the Cisco CRS-1 and Cisco XR Series Router. No modification. Disk mirring was introduced on the Cisco CRS-1 and Cisco XR Series Router. No modification. No modification. Contents Prerequisites, page 92 Infmation About Creating Disk Backups, page 93 How to Create a Backup Disk, page 94 How to Enable Disk Mirring, page 100 Configuration Examples, page 102 Additional References, page 106 SMC-91
2 Prerequisites Creating Disk Backups f the Cisco IOS XR Software and Configurations Prerequisites To perfm these configuration tasks, your Cisco IOS XR software system administrat must assign you to a user group associated with a task group that includes the cresponding command task IDs. All command task IDs are listed in individual command references and in the Cisco IOS XR Task ID Reference Guide. If you need assistance with your task group assignment, contact your system administrat. F detailed infmation about user groups and task IDs, see the Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR Software System Security Configuration Guide. The following additional prerequisites are provided in this section: Disk Backup Prerequisites, page 92 Disk Mirring Prerequisites, page 92 Disk Backup Prerequisites Befe perfming a system backup, the following conditions must be met: The router software must suppt the disk backup feature. The local stage device specified f the backup must be installed. On the Cisco XR Series Router, the suppted stage devices are disk0:, disk1:, and compactflash: (if installed). On the Cisco CRS-1 router, the suppted stage devices are disk0: and disk1: (if installed). Disk mirring must not be enabled. Disk Mirring Prerequisites Befe enabling disk mirring, the following conditions must be met: The router software must suppt the disk mirring feature. This feature is suppted on the Cisco CRS-1 router and Cisco XR Series Routers running the Cisco IOS XR Software, Release a later release. The secondary stage device specified f the mirring must be installed in the same node as the primary boot device. The suppted stage devices are disk0: and disk1:. The secondary stage device must be the same size larger than the designated primary stage device. The secondary stage device must be partitioned. After disk mirring is enabled, you cannot configure the backup disk feature. Note The primary partition on the secondary stage device must be large enough to contain all data on the primary boot device. This can be an issue if the primary boot device has not yet been partitioned. F example, in the situation where both the primary boot device and the secondary stage device are 1 GB in size, the primary boot device contains 950 MB of data, and the secondary stage device is already partitioned to 800 MB in the primary partition and 200 MB in the secondary partition. In such a case, the 950 MB of data from the primary boot device does not fit on the secondary stage device because SMC-92
3 Creating Disk Backups f the Cisco IOS XR Software and Configurations Infmation About Creating Disk Backups of the partition. Such a configuration is rejected and an err is displayed. You need to replace the secondary stage device with a higher capacity device. Refer to Table 11 f infmation regarding disk partition sizes. Infmation About Creating Disk Backups The following infmation is provided in this section: Infmation About the Backup Disk, page 93 Infmation About Disk Mirring, page 93 Infmation About the Backup Disk A system backup disk is created when you back up the system files to a local stage device f the first time. This process fmats the device that you specify, and copies the software packages and system configurations to that device. If the backup operation is perfmed from EXEC mode, then the files from that specific secure domain router (SDR) are backed up. If the backup operation is perfmed from administration EXEC mode, then the files from the administration plane and from all SDRs are backed up. Befe you create a backup disk of the Cisco IOS XR software packages and configurations, you need to determine which device is being used as the primary boot device. The boot device is displayed using the following commands: show version show install active show install committed See Cisco IOS XR System Management Command Reference f infmation on using the commands to determine the boot device. Infmation About Disk Mirring The route process (RP) card in Cisco IOS XR platfms has a primary stage device that is used to ste installation packages and configuration files. This primary stage device is referred to as the primary boot device and is essential f booting the RP and its nmal operation. Disk mirring replicates the critical data on the primary boot device onto another stage device on the same RP, hencefth referred to as the secondary device. If the primary boot device fails, applications continue to be serviced transparently by the secondary device, thereby avoiding a switchover to the standby RP. The failed primary stage device can be replaced repaired without disruption of service. Disk mirring should only mirr critical data on the primary boot device onto a secondary stage device and not any noncritical data such as logging data. To separate critical data from noncritical data, the disk devices need to be partitioned. Disk0: is partitioned to disk0: and disk0a:; disk1: is partitioned to disk1: and disk1a:. Disk0: and disk1: are used f critical data, while disk0a: and disk1a: are used f logging data and other noncritical data. Befe you can configure disk mirring on the RP, you must have partitioned the secondary stage device. The sizes of disk partitions are related to the total disk size, and are provided in Table 11. SMC-93
4 How to Create a Backup Disk Creating Disk Backups f the Cisco IOS XR Software and Configurations Table 11 Size of Disk Partitions in Relation to Size of Disk Size of Disk Primary Partition Percentage Secondary Partition Percentage less than 900 MB Partitioning not suppted Partitioning not suppted 900 MB to 1.5 GB 90% 10% 1.5 GB to 3 GB 80% 20% me than 3 GB 88% 12% Caution These partition sizes are those suppted by the FAT32 file system. When you partition a FAT16 disk, the file system changes to FAT32. If you might need to downgrade to Cisco IOS XR Software Release 3.7 earlier, consider carefully befe partitioning the disk. Software downgrades to Cisco IOS XR Software Release 3.7 earlier are not suppted f FAT32 disks. The procedure f converting a FAT32 disk to FAT16 is complex and requires the assistance of Cisco technical suppt. How to Create a Backup Disk Creating a New Revised Backup Disk, page 94 Using the Backup Disk to Boot a Router, page 98 Creating a New Revised Backup Disk Complete the following instructions to create a new backup disk, to back up the most recent software and configuration files onto an existing backup disk. Note If disk mirring is enabled, you will not be able to configure a backup disk. SUMMARY STEPS 1. (Optional) admin 2. (Optional) show system backup [target-dev] [details diff] [verify] [location {all node-id}] 3. (Optional) system boot-sequence {primary-device [secondary-device]} [location {all node-id}] 4. system backup [target-dev] [fmat] [location {all node-id}] [synchronous asynchronous] 5. (Optional) show system backup [target-dev] [details diff] [verify] [location {all node-id}] SMC-94
5 Creating Disk Backups f the Cisco IOS XR Software and Configurations How to Create a Backup Disk DETAILED STEPS Step 1 Command Action admin RP/0/RP0/CPU0:router# admin Step 2 show system backup [target-dev] [details diff] [verify] [location {all node-id}] RP/0/RP0/CPU0:router# show system backup disk1: Purpose (Optional) Enters administration EXEC mode. Use the following commands in administration EXEC mode to display infmation and back up files f the administration plane and all SDRs in the system. Use the following commands in the EXEC mode of an SDR to display infmation and back up files f the current SDR. (Optional) Displays infmation about the current backup files to determine if a backup is required. Enter the show system backup command to display infmation on the backup perfmed f the active RP where you are logged in, including the date, time, and status of the last backup. Enter the show system backup target-dev command to display backup infmation f a specified RP node. Enter the show system backup details command to list infmation about the software packages and configuration files sted on the backup device. Enter the show system backup diff command to display the differences between the software and configurations on the backup device and the software and configurations on the currently active boot disk. Enter the show system backup location command with the location node-id keywd and argument to display infmation f a backup on a specific node. Use the location all keywds to display infmation f backups on all nodes in the system. If no backup exists, an err message is displayed. SMC-95
6 How to Create a Backup Disk Creating Disk Backups f the Cisco IOS XR Software and Configurations Step 3 Command Action system boot-sequence {primary-device [secondary-device]} [location {all node-id}] RP/0/RP0/CPU0:router(admin)# system boot-sequence disk0: disk1: Purpose (Optional) Defines the der of local stage devices used to boot a router. Enter a value f the secondary device field to define the default location f system backups. If this field is left blank, the backup device can be defined with the system backup command, as shown in the next step. The value of the secondary-device argument must be different from the value of the primary-device argument. We recommend disk0 as the primary boot device in the boot sequence, and disk1 as the secondary boot device. The boot device specified with the system boot-sequence command must be installed in the card, the command will be rejected. The primary-device argument defines the default device where software packages are installed and run. This device is also the default location f router configurations. The secondary-device argument defines the device used by the system backup command to back up system software and configurations. This field is optional. Use the location node-id keywd and argument to define the boot sequence f a specific RP. Use the location all keywds to define the boot sequence f all RPs in the SDR. Use this command in administration EXEC mode to define the boot sequence f all RPs in all SDRs. The node-id argument is expressed in rack/slot/module notation. SMC-96
7 Creating Disk Backups f the Cisco IOS XR Software and Configurations How to Create a Backup Disk Step 4 Command Action system backup [target-dev] [fmat] [location {all node-id}] [synchronous asynchronous] RP/0/RP0/CPU0:router(admin)# system backup disk0: disk1: Purpose Backs up the system software and configurations to a backup disk. Use the system backup command without keywds arguments to back up the system software and configurations on the target device f the designated secure domain router shelf controller (DSDRSC) where you are logged in. By default, the backup disk is the secondary device defined with the system boot-sequence command in Step 3. To define a backup device f the current backup operation only, use the system backup command with the target-dev argument. If a target device is not specified with either the system backup target-dev command the system boot-sequence command, then the backup operation is not allowed. Note The target-dev can be any local stage device except the current boot device, and must be large enough to ste the current software set and configuration. To specify an alternate node f the system backup, such as the standby DSDRSC, use the system backup command with the location node-id keywd and argument. To perfm the backup on all RPs installed in a specific SDR, use the system backup command with the location all keywds in EXEC mode. To perfm the backup on all RPs in all SDRs installed in the system, use the system backup command with the location all keywds in administration EXEC mode. Default is synchronous. SMC-97
8 How to Create a Backup Disk Creating Disk Backups f the Cisco IOS XR Software and Configurations Command Action Step 5 show system backup [target-dev] [details diff] [verify] [location {all node-id}] RP/0/RP0/CPU0:router# show system backup disk1: Purpose (Optional) Displays infmation about the current backup files to determine is a backup is required. Enter the show system backup command to display infmation on the backup perfmed f the active RP where you are logged in, including the date, time, and status of the last backup. Enter the show system backup target-dev command to display backup infmation f a specified RP node. Enter the show system backup details command to list infmation about the software packages and configuration files sted on the backup device. Enter the show system backup diff command to display the differences between the software and configurations on the backup device and the software and configurations on the currently active boot disk. Enter the show system backup location command with the location node-id keywd and argument to display infmation f a backup on a specific node. Use the location all keywds to display infmation f backups on all nodes in the system. If no backup exists, an err message is displayed. Using the Backup Disk to Boot a Router SUMMARY STEPS Complete the following instructions to use the backup disk to boot a router. 1. Enter ROM Monit mode. 2. dir disk1: 3. Locate the hfr-os-mbi-x.y.z directy (Cisco CRS-1) Locate the c12k-os-mbi-x.y.z directy (Cisco XR Series Router) 4. dir disk1:hfr-os-mbi-x.y.z dir disk1:c12k-os-mbi-x.y.z 5. Locate mbihfr-xx.vm Locate mbic12k-xx.vm Note xx=rp on RP, xx=drp on DRP 6. unset BOOT 7. sync SMC-98
9 Creating Disk Backups f the Cisco IOS XR Software and Configurations How to Create a Backup Disk 8. confreg 0x boot disk1:hfr-os-mbi-x.y.z/mbihfr-xx.vm boot disk1:c12k-os-mbi-x.y.z/mbic12k-xx.vm DETAILED STEPS Command Action Purpose Step 1 Enter ROM Monit mode. See Cisco IOS XR ROM Monit Guide f infmation on entering ROM Monit mode. Step 2 dir disk1: Displays the files on the disk1: stage device. Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 rommon1> dir disk1: Locate the hfr-os-mbi-x.y.z directy (Cisco CRS-1) Locate the c12k-os-mbi-x.y.z directy (Cisco XR Series Router) dir disk1:hfr-os-mbi-x.y.z dir disk1:c12k-os-mbi-x.y.z rommon2> dir disk1:hfr-os-nbi Locate mbihfr-xx.vm Locate mbic12k-xx.vm unset BOOT rommon3> unset BOOT sync rommon4> sync confreg 0x102 rommon5> confreg 0x102 boot disk1:hfr-os-mbi-x.y.z/mbihfr-xx.vm boot disk1:c12k-os-mbi-x.y.z/mbic12k-xx.vm rommon6> boot disk1:hfr-os-mbi-3.4.0/mbihfr-rp.vm Locate the directy on the disk1: stage device. Displays the files in the hfr-os-mbi-x.y.z c12k-os-mbi-x.y.z directy. Locate the directy in the hfr-os-mbi-x.y.z c12k-os-mbi-x.y.z directy. Note On the RP, xx=rp; on the DRP, xx=drp. Clears the setting f the BOOT variable. Saves the new ROM Monit variable settings. Set the configuration register to 0x102. Retrieves the file and installs it on the boot device. Note On the RP, xx=rp; on the DRP, xx=drp. SMC-99
10 How to Enable Disk Mirring Creating Disk Backups f the Cisco IOS XR Software and Configurations How to Enable Disk Mirring SUMMARY STEPS DETAILED STEPS Complete the following instructions to enable disk mirring. Once disk mirring is configured, if there is a fault on the primary boot drive it cannot be accessed f any reason, control is automatically transferred to the secondary stage device. 1. fmat secondary-device partition [location node-id] 2. Remove any noncritical data from the primary boot device. 3. configure 4. mirr location node-id primary-device:secondary-device: 5. end commit 6. show mirr [location node-id] 7. mirr verify location node-id Step 1 Command Action fmat secondary-device partition [location node-id] RP/0/0/CPU0:router# fmat disk1: partition Purpose Partitions the secondary stage device into two partitions. If the device is already partitioned, you do not need to perfm this step. On multishelf systems, specify the node of the primary boot device with the location keywd. Caution When you partition a FAT16 disk, the file system changes to FAT32. If you might need to downgrade to Cisco IOS XR Software Release 3.7 earlier, consider carefully befe partitioning the disk. Software downgrades to Cisco IOS XR Software Release 3.7 earlier are not suppted f FAT32 disks. The procedure f converting a FAT32 disk to FAT16 is complex and requires the assistance of Cisco technical suppt. Step 2 Step 3 Remove any noncritical data from the primary boot device. configure The primary boot device should contain installation packages and configuration files only. Log files can be copied to the a partition of the secondary device, f example disk1a:. Enters global configuration mode. RP/0/0/CPU0:router# configure SMC-100
11 Creating Disk Backups f the Cisco IOS XR Software and Configurations How to Enable Disk Mirring Step 4 Step 5 Step 6 Step 7 Command Action mirr location node-id primary-device:secondary-device: RP/0/0/CPU0:router(config)# mirr location 0/rp0/cpu0 disk0:disk1: end commit RP/0/RP0/CPU0:router(config)# end RP/0/RP0/CPU0:router(config)# commit show mirr [location node-id] RP/0/RP0/CPU0:router# show mirr location 0/rp0/cpu0 mirr verify location node-id RP/0/RP0/CPU0:router# mirr verify location 0/rp0/cpu0 Purpose Enables disk mirring of the primary-device to the secondary-device. On multishelf systems, specify the node of the primary boot device with the location keywd. If the primary boot device is not partitioned, the following occurs: The contents of the primary device are replicated to the secondary device Control of the mirring server switches to the secondary stage device. The primary device is partitioned. Data is replicated back to the primary boot device. Saves configuration changes. When you issue the end command, the system prompts you to commit changes: Uncommitted changes found, commit them befe exiting (yes/no/cancel)? [cancel]: Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode. Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes. Entering cancel leaves the router in the current configuration session without exiting committing the configuration changes. Use the commit command to save the configuration changes to the running configuration file and remain within the configuration session. Displays disk mirring infmation f an RP node. It also provides the status of the synchronization between the primary and secondary devices. Verifies disk synchronization f disk mirring on an RP node. Note Disk mirring overrides any existing disk backup configuration (Golden Disk), and subsequent disk backups fail. SMC-101
12 Configuration Examples Creating Disk Backups f the Cisco IOS XR Software and Configurations Configuration Examples The following examples are provided in this section: Configuration Examples f Creating a Backup Disk, page 102 Configuration Examples f Enabling Disk Mirring, page 105 Configuration Examples f Creating a Backup Disk This section includes the following examples: Defining the Boot Disk Sequence: Example, page 102 Creating a Backup Disk f All SDRs: Example, page 102 Creating a Backup Disk f a Single SDR: Example, page 103 Showing the Backup Infmation: Examples, page 103 Defining the Boot Disk Sequence: Example The following example shows how to define the primary and secondary boot device f the active RP (DSC). The secondary device is also the default location f system backups. In this example, the default location f software and configurations is disk0. The location f backups of software and configurations is disk1. admin system boot-sequence disk0: disk1: Info: node0_0_cpu0: command succeeded. Creating a Backup Disk f All SDRs: Example The following example shows how to back up the software and configuration files f a Cisco XR Series Router: The command is run in administration EXEC mode, which backs up both the administration and SDR configurations. The target device is defined by the value entered with the system boot-sequence command, as shown in Defining the Boot Disk Sequence: Example, page 102: Because this is the first backup on the device, the disk is fmatted. system backup location all Info: node0_0_cpu0: fmatting target device Info: node0_1_cpu0: fmatting target device Info: node0_3_cpu0: fmatting target device Info: node0_0_cpu0: copying admin configuration Info: node0_1_cpu0: copying admin configuration Info: node0_3_cpu0: copying SDR configuration Info: node0_0_cpu0: copying SDR configuration Info: node0_3_cpu0: copying installed software Info: node0_1_cpu0: copying SDR configuration Info: node0_0_cpu0: copying installed software Info: node0_1_cpu0: copying installed software Info: node0_0_cpu0: backup complete. Info: node0_3_cpu0: backup complete. SMC-102
13 Creating Disk Backups f the Cisco IOS XR Software and Configurations Configuration Examples Info: node0_1_cpu0: backup complete. Info: node0_0_cpu0: verifying admin configuration Info: node0_1_cpu0: verifying admin configuration Info: node0_3_cpu0: verifying SDR configuration Info: node0_0_cpu0: verifying SDR configuration Info: node0_1_cpu0: verifying SDR configuration Info: node0_3_cpu0: verifying installed software Info: node0_0_cpu0: verifying installed software Info: node0_1_cpu0: verifying installed software Info: node0_3_cpu0: verify complete. Info: node0_3_cpu0: command succeeded. Info: node0_1_cpu0: verify complete. Info: node0_1_cpu0: command succeeded. Info: node0_0_cpu0: verify complete. Info: node0_0_cpu0: command succeeded. Creating a Backup Disk f a Single SDR: Example In the following example, the backup disk is created f a non-owner SDR. The command is run in EXEC mode, which backs up only the current SDR files and configuration. The target device is defined as disk1. Because this is the first backup on the device, the disk is fmatted. RP/0/3/CPU0:router_sdr1# system backup disk1: Info: node0_3_cpu0: fmatting target device Info: node0_3_cpu0: copying SDR configuration Info: node0_3_cpu0: copying installed software Info: node0_3_cpu0: backup complete. Info: node0_3_cpu0: verifying SDR configuration Info: node0_3_cpu0: verifying installed software Info: node0_3_cpu0: verify complete. Info: node0_3_cpu0: command succeeded. Showing the Backup Infmation: Examples In the following example, the show system backup command displays the status of the last system backup: admin show system backup System Backup infmation f node0_0_cpu0 on disk1: ======================================================= Last Backup Successful Backup started at Sat Jun 24 12:22: ended at Sat Jun 24 12:42: Verify started at Sat Jun 24 12:42: ended at Sat Jun 24 12:48: BOOT_DEV_SEQ_CONF=disk0:;disk1: BOOT_DEV_SEQ_OPER=disk0:;disk1: In the following example, the show system backup command is entered with the details keywd to display additional infmation on the configuration and software package files sted on the backup device. Because this command is entered in administration EXEC mode, the backup infmation f both the administration and SDR configurations is displayed. SMC-103
14 Configuration Examples Creating Disk Backups f the Cisco IOS XR Software and Configurations show system backup details System Backup infmation f node0_0_cpu0 on disk1: ======================================================= Last Backup Successful Backup started at Sat Jun 24 12:22: ended at Sat Jun 24 12:42: Verify started at Sat Jun 24 12:42: ended at Sat Jun 24 12:48: BOOT_DEV_SEQ_CONF=disk0:;disk1: BOOT_DEV_SEQ_OPER=disk0:;disk1: Admin configuration last commit recd on disk1: Device Commitid Time Stamp disk1: :07:59 UTC Fri Jun SDR configuration last commit recd on disk1: Device Commitid Time Stamp disk1: :56:43 UTC Thu Jun Active software packages on disk1: c12k-os-mbi c12k-base c12k-admin c12k-fwdg c12k-lc c12k-rout c12k-diags c12k-k9sec c12k-mcast c12k-mgbl c12k-mpls No Inactive software packages on disk1: In the following example, backup infmation is displayed f backups located on disk1 in all RPs in the system. In this example, a separate backup was created on disk1 of node 0/3/CPU0 f a non-owner SDR. show system backup disk1: location all System Backup infmation f node0_0_cpu0 on disk1: ======================================================= Last Backup Successful Backup started at Sat Jun 24 12:22: ended at Sat Jun 24 12:42: Verify started at Sat Jun 24 12:42: ended at Sat Jun 24 12:48: BOOT_DEV_SEQ_CONF=disk0:;disk1: BOOT_DEV_SEQ_OPER=disk0:;disk1: System Backup infmation f node0_3_cpu0 on disk1: ======================================================= Last Backup Successful Backup started at Sat Jun 24 13:02: ended at Sat Jun 24 13:21: Verify started at Sat Jun 24 13:21: ended at Sat Jun 24 13:27: BOOT_DEV_SEQ_CONF=disk0:;disk1: BOOT_DEV_SEQ_OPER=disk0:;disk1: SMC-104
15 Creating Disk Backups f the Cisco IOS XR Software and Configurations Configuration Examples Configuration Examples f Enabling Disk Mirring Enabling Disk Mirring: Example This section includes the following examples: Enabling Disk Mirring: Example, page 105 show mirr Command Output: Example, page 105 mirr verify Command Output: Example, page 106 In the following example, disk mirring is enabled on a router: fmat disk1: partition This operation will destroy all data on "disk1:" and partition device. Continue? [confirm] y Device partition disk1: is now fmated and is available f use. configure mirr location 0/0/cpu0 disk0:disk1: commit show mirr Command Output: Example In the following example, sample output of the show mirr command is displayed: show mirr Mirr Infmation f 0/0/CPU0. ======================================================== Mirring Enabled Configured Primary: disk0: Configured Secondary: disk1: Current Mirring State: Syncing Files Current Physical Primary: disk0: Current Physical Secondary: disk1: Mirring Logical Device: disk0: Physical Device State Flags disk0: Available Enabled disk1: Available Enabled Fmatted compactflash: Not Present disk0a: Not Present disk1a: Available Fmatted compactflasha: Not Present Mirring Rommon Variable BOOT_DEV_SEQ_CONF = disk0:;disk1: BOOT_DEV_SEQ_OPER = disk0: MIRROR_ENABLE = Y Syncing Files Number Left: 7514 Current file: c12k-base i/bin/show_tech_bundle_only Current state: File Not Synced SMC-105
16 Additional References Creating Disk Backups f the Cisco IOS XR Software and Configurations mirr verify Command Output: Example In the following example, sample output from the mirr verify command is displayed: mirr verify Mirr Verify Infmation f 0/0/CPU0. ======================================================== Primary device and secondary device are fully synchronized. Additional References The following sections provide references related to SDR configuration. Related Documents Related Topic SDR command reference DRP pairing command reference Initial system bootup and configuration infmation f a router using the Cisco IOS XR software DRP description and requirements Document Title Secure Domain Router Commands on Cisco IOS XR Software module of Cisco IOS XR System Management Command Reference Distributed Route Process Commands on Cisco IOS XR Software module of Cisco IOS XR System Management Command Reference Cisco IOS XR Getting Started Guide Cisco CRS-1 Carrier Routing System 16-Slot Line Card Chassis System Description Instructions to install DRP and DRP PLIM cards Installing the Cisco CRS-1 Carrier Routing System 16-Slot Line Card Chassis Infmation about user groups and task IDs Cisco IOS XR Task ID Reference Guide Cisco IOS XR master command reference Cisco IOS XR Master Commands List Cisco IOS XR interface configuration commands Infmation about configuring interfaces and other components on the Cisco CRS-1 router from a remote Craft Wks Interface (CWI) client management application Infmation about AAA policies, including instructions to create and modify users and username access privileges ROM Monit Cisco IOS XR Interface and Hardware Component Command Reference Cisco Craft Wks Interface User Guide Configuring AAA Services on Cisco IOS XR Software module of Cisco IOS XR System Security Configuration Guide Cisco IOS XR ROM Monit Guide SMC-106
17 Creating Disk Backups f the Cisco IOS XR Software and Configurations Additional References Standards Standards No new modified standards are suppted by this feature, and suppt f existing standards has not been modified by this feature. Title MIBs MIBs MIBs Link To locate and download MIBs using Cisco IOS XR software, use the Cisco MIB Locat found at the following URL and choose a platfm under the Cisco Access Products menu: RFCs RFCs No new modified RFCs are suppted by this feature, and suppt f existing RFCs has not been modified by this feature. Title Technical Assistance Description The Cisco Technical Suppt website contains thousands of pages of searchable technical content, including links to products, technologies, solutions, technical tips, and tools. Registered Cisco.com users can log in from this page to access even me content. Link SMC-107
18 Additional References Creating Disk Backups f the Cisco IOS XR Software and Configurations SMC-108
Configuring NetFlow on Cisco IOS XR Software
Configuring NetFlow on Cisco IOS XR Software A NetFlow flow is a unidirectional sequence of packets that arrive on a single interface ( subinterface), and have the same values f key fields. NetFlow is
More informationCisco IOS XR Diagnostics
Cisco IOS XR online diagnostics allow you to test and verify hardware functionality while connected to a live network. Health-monitoring and scheduled diagnostics help ensure system high availability (HA).
More informationConfiguring NetFlow on Cisco ASR 9000 Series Aggregation Services Router
Configuring NetFlow on Cisco ASR 9000 Series Aggregation Services Router This module describes the configuration of NetFlow on the Cisco ASR 9000 Series Aggregation Services Router. A NetFlow flow is a
More informationConfiguring Traffic Mirroring on the Cisco ASR 9000 Series Router
Configuring Traffic Mirring on the Cisco ASR 9000 Series Router This module describes the configuration of traffic mirring on the Cisco ASR 9000 Series Router. Traffic mirring is sometimes called pt mirring,
More informationImplementing Object Tracking on Cisco IOS XR Software
Implementing Object Tracking on Cisco IOS XR Software This module describes the configuration of object tracking on your Cisco IOS XR network. For information about its application in IPSec, see Cisco
More informationHow To Install Cisco Asr 9000 Series Router Software On A Mini Mini Mini (Cisco Ios) Router
This chapter describes the router recovery methods in ROM Monitor (ROMMON) mode of the router. Table 1: Feature History for Router Recovery with the ROM Monitor Release Modification Release 4.2.0 A new
More informationRouter Recovery with ROM Monitor
CHAPTER 2 This chapter describes the router recovery methods in ROM Monitor mode (ROMMON) of the router. This chapter contains the following sections: Overview, page 2-19 About ROMMON Installation Files,
More informationImage Refresh Using the Archive and Restore Feature
Image Refresh Using the Archive and Restore Feature This chapter describes how to backup the most recent Cisco IOS XR software and configuration files available on the Cisco ASR 9000 Series Aggregation
More informationImplementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software
Implementing MPLS VPNs over IP Tunnels on Cisco IOS XR Software The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint
More informationImplementing MPLS VPNs over IP Tunnels
Implementing MPLS VPNs over IP Tunnels The MPLS VPNs over IP Tunnels feature lets you deploy Layer 3 Virtual Private Netwk (L3VPN) services, over an IP ce netwk, using L2TPv3 multipoint tunneling instead
More informationImage Verification. Finding Feature Information. Restrictions for Image Verification
The feature allows users to automatically verify the integrity of Cisco IOS images. Thus, users can be sure that the image is protected from accidental corruption, which can occur at any time during transit,
More informationRouter Security Audit Logs
Router Security Audit Logs The Router Security Audit Logs feature allows users to configure audit trails, which track changes that have been made to a router that is running Cisco IOS software. History
More informationEncrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
More informationBackup and Recovery Procedures
CHAPTER 10 This chapter provides Content Distribution Manager database backup and ACNS software recovery procedures. This chapter contains the following sections: Performing Backup and Restore Operations
More informationGLBP - Gateway Load Balancing Protocol
GLBP - Gateway Load Balancing Protocol Gateway Load Balancing Protocol (GLBP) protects data traffic from a failed router or circuit, like Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy
More informationEncrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
More informationNetFlow Subinterface Support
NetFlow Subinterface Support Feature History Release Modification 12.2(14)S This feature was introduced. 12.2(15)T This feature was integrated into Cisco IOS Release 12.2 T. This document describes the
More informationMigrating to a Cisco CRS-3 Carrier Routing System
CHAPTER 1 Migrating to a Cisco CRS-3 Carrier Routing System This chapter describes how to migrate a single-chassis Cisco CRS-1 Carrier Routing System to a single-chassis Cisco CRS-3 Carrier Routing System.
More informationConfiguring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Last Updated: October 5, 2011 This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco
More informationImplementing Secure Shell
Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms, and the application
More informationEnhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S This feature was introduced This document describes the Enhanced Password Security feature in It includes the following sections: Feature Overview,
More informationUSB Disable for Cisco ISRs Feature Module
USB Disable for Cisco ISRs Feature Module First Published: March 28, 2011 Part Number: This guide describes the USB Disable feature in the following major sections: Feature Introduction, page 1 Restrictions,
More informationUpgrading Cisco UCS Central
This chapter includes the following sections: to Release 1.3, page 1 to Release 1.3 You can upgrade Cisco UCS Central release 1.1(2a) or 1.2 to 1.3 in either standalone or cluster mode. If you are already
More informationPer-Packet Load Balancing
Per-Packet Load Balancing Feature History Release 12.0(19)ST 12.0(21)S 12.0(22)S Modification This feature was introduced on the Cisco 10000 series routers. This feature was introduced on the Cisco 12000
More informationConfiguring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
More informationUpgrading Software Using the Online Installer
Upgrading Software Using the Online Installer Last Updated: December 8, 2009 This chapter provides the procedures for upgrading from a previous software version of the Cisco Integrated Storage System module
More informationBasic Configuration of the Cisco 12000 Series Internet Router
CHAPTER 2 Basic Configuration of the Cisco 12000 Series Internet Router This chapter describes how to boot and configure the Cisco 12000 Series Internet Router. It discusses the following subjects: Cisco
More informationContents Overview of RD Web Access... 2. What is RD Web Access?... 2 What are the benefits of RD Web Access versus thin client?...
Purpose & Scope The purpose of this document is to provide business advantages, system administrat installation, and end-user access procedures f the use of Remote Desktop (RD) Web Access f Instrument
More informationBacking Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
More informationYou can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource
The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF
More informationEnhanced Password Security - Phase I
Enhanced Password Security - Phase I Feature History 120(18)S 121(8a)E 122(14)S This feature was introduced Support for this feature was integrated into Cisco IOS Release 121(8a)E This feature was integrated
More informationDHCP Server Port-Based Address Allocation
The feature provides port-based address allocation support on the Cisco IOS Dynamic Host Configuration Protocol (DHCP) server for the Ethernet platform. The DHCP server provides address assignment support
More informationFlow-Based per Port-Channel Load Balancing
The feature allows different flows of traffic over a Gigabit EtherChannel (GEC) interface to be identified based on the packet header and then mapped to the different member links of the port channel.
More informationConfiguring Auto-MDIX
Prerequisites for Auto-MDIX, page 1 Restrictions for Auto-MDIX, page 1 Information about, page 1 How to Configure Auto-MDIX, page 2 Example for, page 3 Additional References, page 4 Feature History and
More informationConfiguring a Load-Balancing Scheme
This module contains information about Cisco Express Forwarding and describes the tasks for configuring a load-balancing scheme for Cisco Express Forwarding traffic. Load-balancing allows you to optimize
More informationManaging ACE Software Licenses
CHAPTER 2 This chapter describes how to manage the software licenses for your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Information about ACE
More informationNetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
More informationROM Monitor. Entering the ROM Monitor APPENDIX
APPENDIX B This appendix describes the Cisco router ROM monitor (also called the bootstrap program). The ROM monitor firmware runs when the router is powered up or reset. The firmware helps to initialize
More informationSchool of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations
School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,
More informationEmbedded Event Manager Debug Commands on Cisco IOS XR Software
Embedded Event Manager Debug Commands on Cisco IOS XR Software This chapter describes the commands used to debug Embedded Event Manager on Cisco IOS XR software. Caution Because debugging output is assigned
More informationManaging Storage Services Modules
CHAPTER 3 This chapter describes how to manage the Storage Services Module (SSM) and provides information about SSI images. This chapter includes the following sections: SSM Overview, page 3-1 Initial
More informationConfiguring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
More informationConfiguring the Cisco IOS In-Service Software Upgrade Process
CHAPTER 6 Configuring the Cisco IOS In-Service Software Upgrade Process Starting with Cisco IOS 12.2(31)SGA, ISSU is supported on the Catalyst 4500. All line cards are supported. Operating on redundant
More informationClock Commands on Cisco IOS XR Software
Clock Commands on Cisco IOS XR Software This chapter describes the commands used to set and display the internal clock settings in the Cisco IOS XR software. For more information about manually setting
More informationConnecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
More informationConfiguring VIP and Virtual IP Interface Redundancy
CHAPTER 6 Configuring VIP and Virtual IP Interface Redundancy This chapter describes how to plan for and configure Virtual IP (VIP) and Virtual IP Interface Redundancy on the CSS. Information in this chapter
More informationManaging Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
More informationACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
More informationControlling Access to a Virtual Terminal Line
Controlling Access to a Virtual Terminal Line First Published: August 18, 2006 Last Updated: August 18, 2006 You can control who can access the virtual terminal lines (vtys) to a router by applying an
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationInstalling the Operating System or Hypervisor
Installing the Operating System or Hypervisor If you purchased E-Series Server Option 1 (E-Series Server without preinstalled operating system or hypervisor), you must install an operating system or hypervisor.
More informationWEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES
BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required
More informationFactoryTalk View Site Edition V5.0 (CPR9) Server Redundancy Guidelines
FactoryTalk View Site Edition V5.0 (CPR9) Server Redundancy Guidelines This page left intentionally blank. FTView SE 5.0 (CPR9) Server Redundancy Guidelines.doc 8/19/2008 Page 2 of 27 Table of Contents
More informationConfiguring Redundancy
7 CHAPTER This chapter describes how to configure redundancy and contains these sections: Configuring Fault Tolerance, page 7-1 Configuring HSRP, page 7-5 Configuring Interface and Device Tracking, page
More informationnovdocx (en) 11 December 2007 XIII XIIIMonitor
XIIIMonit Chapter 58, Understanding the Monit Agent Consoles, on page 965 Chapter 59, Configuring the Monit Agent, on page 969 Chapter 60, Configuring the Monit Application, on page 991 Chapter 61, Using
More informationConfiguring Link Bundling on Cisco IOS XR Software
Configuring Link Bundling on Cisco IOS XR Software This module describes the configuration of link bundle interfaces on the Cisco CRS Router. A link bundle is a group of one or more ports that are aggregated
More informationConfiguring a Load-Balancing Scheme
Configuring a Load-Balancing Scheme Finding Feature Information Configuring a Load-Balancing Scheme Last Updated: August 15, 2011 This module contains information about Cisco Express Forwarding and describes
More informationPacket-over-SONET Interface Commands on the Cisco IOS XR Software
Packet-over-SONET Interface Commands on the Cisco IOS XR Software This module provides command line interface (CLI) commands for configuring Packet-over-SONET/SDH (POS) on the Cisco CRS Router. This module
More informationConfigure NFS Staging for ACS 5.x Backup on Windows and Linux
Configure NFS Staging for ACS 5.x Backup on Windows and Linux Document ID: 119030 Contributed by Piotr Borowiec and Aditya Ganjoo, Cisco TAC Engineers. Jul 21, 2015 Contents Introduction Prerequisites
More informationL2TP Dial-Out Load Balancing and Redundancy
L2TP Dial-Out Load Balancing and Redundancy The L2TP Dial-Out Load Balancing and Redundancy feature enables an L2TP network server (LNS) to dial out to multiple L2TP access concentrators (LACs) When the
More informationManaging Cisco ISE Backup and Restore Operations
CHAPTER 14 This chapter describes the Cisco Identity Services Engine (ISE) database backup and restore operations, which include Cisco ISE application configuration and Cisco Application Deployment Engine
More informationTelnet, Console and AUX Port Passwords on Cisco Routers Configuration Example
Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords
More informationConfiguring IP SLA Service Performance Testing
9 CHAPTER Configuring IP SLA Service Perfmance Testing First Published: July 2013 Last Updated: November 2013 This chapter describes how to configure the ITU-T Y.1564 Ethernet service perfmance test methodology
More informationTraffic Mirroring Commands on the Cisco IOS XR Software
Traffic Mirroring Commands on the Cisco IOS XR Software This module describes the commands used to configure and monitor traffic mirroring. acl, page 2 clear monitor-session counters, page 4 destination
More informationRADIUS Server Load Balancing
First Published: March 20, 2006 Last Updated: September 22, 2009 The feature distributes authentication, authorization, and accounting (AAA) authentication and accounting transactions across servers in
More informationPart No. P0606014 02 18 September 2003. CallPilot. Reference Guide
Part No. P0606014 02 18 September 2003 CallPilot Reference Guide 2 CallPilot Reference Guide Copyright 2003 Ntel Netwks All rights reserved. 2003. The infmation in this document is subject to change without
More information- Advanced IOS Functions -
1 The Configuration Register - Advanced IOS Functions - The configuration register (config-register) is a hexadecimal value that controls various aspects of how a router boots, including: Baud Rate Boot
More informationMPLS VPN over mgre. Finding Feature Information. Prerequisites for MPLS VPN over mgre
The feature overcomes the requirement that a carrier support multiprotocol label switching (MPLS) by allowing you to provide MPLS connectivity between networks that are connected by IP-only networks. This
More informationNetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
More informationHTTP 1.1 Web Server and Client
HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users
More informationConfiguring IKEv2 Load Balancer
The IKEv2 Load Balancer feature provides support for enabling clusters of FlexVPN gateways and distributes incoming Internet Key Exchange Version 2 (IKEv2) connection requests among FlexVPN gateways. This
More informationMaintaining the Content Server
CHAPTER 7 This chapter includes the following Content Server maintenance procedures: Backing Up the Content Server, page 7-1 Restoring Files, page 7-3 Upgrading the Content Server, page 7-5 Shutting Down
More informationLab 3.1.2 Creating a Logical Network Diagram
Lab 3.1.2 Creating a Logical Network Diagram Objectives Use router and switch commands to obtain information about an existing network. Use Cisco Network Assistant to obtain information about an existing
More informationEZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.8 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
More informationGoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster
GoGrid Implement.com Configuring a SQL Server 2012 AlwaysOn Cluster Overview This documents the SQL Server 2012 Disaster Recovery design and deployment, calling out best practices and concerns from the
More informationLab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt
Lab 1.5.1 Introductory Lab 1 Getting Started and Building Start.txt Objective This lab will introduce to the student the CCNP lab equipment and certain IOS features that might be new. This introductory
More informationPA-5000 Series SSD Storage Options Configuring RAID and Disk Backup
PA-5000 Series SSD Storage Options Configuring RAID and Disk Backup 2014, Palo Alto Networks, Inc. https://paloaltonetworks.com/documentation P/N 810-000076-00C Contents OVERVIEW...3 SSD UPGRADE PROCEDURE...3
More informationFWSM introduction Intro 5/1
Intro 5/0 Content: FWSM introduction Requirements for FWSM 3.2 How the Firewall Services Module Works with the Switch Using the MSFC Firewall Mode Overview Stateful Inspection Overview Security Context
More informationJob Aid: Replacing the Hard Drive on the Avaya S8710 Media Servers R2.2 or Later
Job Aid: Replacing the Hard Drive on the Avaya S8710 Media Servers R2.2 or Later This job aid describes the steps required to replace the hard drive on an Avaya S8710 Media Servers running Release 2.2
More informationData Collection Agent for Active Directory
Data Collection Agent for Active Directory Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for the installation of Data Collection Agent Active Directory, from an
More informationSupported Platforms. Supported Standards, MIBs, and RFCs. Prerequisites. Related Features and Technologies. Related Documents. Improved Server Access
Configuring Timeout, Retransmission, and Key Values per RADIUS Server The Configuring Timeout, Retransmission, and Key Values per RADIUS Server feature extends the functionality of the existing radius-server
More informationDigitally Signed Cisco Software
Digitally Signed Cisco Software Last Updated: January 16, 2013 The Digitally Signed Cisco Software feature describes how to identify digitally signed Cisco software, gather software authentication information
More information1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router
1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains
More informationFioranoMQ 9. High Availability Guide
FioranoMQ 9 High Availability Guide Copyright (c) 1999-2008, Fiorano Software Technologies Pvt. Ltd., Copyright (c) 2008-2009, Fiorano Software Pty. Ltd. All rights reserved. This software is the confidential
More informationConsolidated Packages and SubPackages Management
Consolidated Packages and SubPackages Management This document discusses how consolidated packages and software subpackages (individual and optional) are run and managed on the Cisco cbr Series Converged
More informationFirewall Authentication Proxy for FTP and Telnet Sessions
Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions
More informationConfiguring the Cisco Secure PIX Firewall with a Single Intern
Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized
More informationBasic Router and Switch Instructions (Cisco Devices)
Basic Router and Switch Instructions (Cisco Devices) Basic Device Connection 1. Connect to the device via the console cable (light blue cable) and the use of a terminal program (Windows Hyperterminal,
More informationEZblue BusinessServer The All - In - One Server For Your Home And Business
EZblue BusinessServer The All - In - One Server For Your Home And Business Quick Start Guide Version 3.11 1 2 3 EZblue Server Overview EZblue Server Installation EZblue Server Configuration 4 EZblue Magellan
More informationIs my site ready for upgrade to v7.6?
Is my site ready for upgrade to v7.6? 6 answers in 6 minutes Web Filter and Web Security Web Security Gateway Web Security Gateway Anywhere web security data security email security 2011 Websense, Inc.
More informationVirtual Fragmentation Reassembly
Virtual Fragmentation Reassembly Currently, the Cisco IOS Firewall specifically context-based access control (CBAC) and the intrusion detection system (IDS) cannot identify the contents of the IP fragments
More informationDiamond II v2.3 Service Pack 4 Installation Manual
Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance
More informationLab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt
Lab 1.4.1 Introductory Lab 1 - Getting Started and Building Start.txt Objective This lab may introduce new CCNP lab equipment and certain IOS features. This introductory activity also describes how to
More informationTroubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
More informationMcAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
More informationConfiguring SSH and Telnet
This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About
More informationSmart Business Architecture for Midsize Networks Network Management Deployment Guide
Smart Business Architecture for Midsize Networks Network Management Deployment Guide Introduction: Smart Business Architecture for Mid-sized Networks, Network Management Deployment Guide With the Smart
More informationOnly LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
More informationCisco CRS 4-Slot Line Card Chassis Overview
CHAPTER 1 This chapter describes the Cisco CRS Carrier Routing System 4-Slot Line Card Chassis and its main components. The following sections are included: System Overview, page 1-2 Main Features of the
More informationVirtual Appliance Setup Guide
Virtual Appliance Setup Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
More information