Table Of Contents
Release Notes For Cisco Router and Security Device Manager Version 2.0
These release notes support Cisco Router and Security Device Manager 2.0. They should be used with the documents listed in the related documentation section. These release notes are updated as needed.
This document contains the following sections:
Cisco Router and Security Device Manager (SDM) is a web-based configuration tool that allows you to configure LAN and WAN interfaces, routing, Network Address Translation (NAT), firewalls, Intrusion Prevention System (IPS), Virtual Private Networks (VPNs), and other features on your router. SDM is installed in router Flash memory, and is run in a Web browser installed on a PC. SDM may be pre installed on the routers listed in the "Hardware Supported" section.
This section contains SDM system requirements.
SDM requires 5.3 MB of free Flash memory space on supported routers.
This section lists the hardware that SDM supports.
SDM is supported on the following Cisco 800 series routers:
SDM is supported on the following Cisco 1700 series routers:
SDM is supported on the following Cisco 1800 series routers:
SDM is supported on the following Cisco 2600 series routers:
SDM is supported on the following 2800 series routers:
SDM is supported on the following Cisco 3600 series routers:
SDM is supported on the following Cisco 3700 series routers:
SDM is supported on the following Cisco 3800 series routers:
SDM is supported on the following Cisco 7000 series routers:
Supported Network Modules, WICs, Port Adapters and Service Adapters
SDM supports configuration on following Network Modules.
•NM-4A/S (synchronous only)
•NM-8A/S (synchronous only)
SDM supports only Ethernet configuration on following network modules.
SDM supports the following WAN interface cards:
•WIC-2A/S (Frame Relay, PPP, HDLC, no async)
SDM supports the following High-Speed WAN Interface Cards (HWICs).
SDM supports the following Advanced Integration Modules (AIMs):
•AIM-VPN/EPII-PLUSSDM supports the following Port Adapters on Cisco 7000 routers.
SDM supports the following Service Adapters on Cisco 7000 routers.
SDM also support the MOD-1700VPN.
PC System Requirements
SDM is designed to run on a personal computer that has a Pentium III processor or Pentium IV processor.
This section describes SDM software requirements.
Cisco IOS Images
SDM is compatible with the Cisco IOS images listed in Table 1.
Note SDM version 2.0 supports the IOS Intrusion Prevention System (IPS). In order to be able to use SDM to configure IOS-IPS, your router must run an IOS image of version 12.3(8)T4 or later.
Determining the Cisco IOS Software Version
To determine the version of Cisco IOS software currently running on your Cisco router, log in to the router and enter the show version EXEC command. The following sample output from the show version command indicates the version number on the second output line:router> show versionCisco Internetwork Operating System SoftwareIOS (tm) C1700 Software (c1700-k8sv3y7-mz) Version 12.2(13)ZH
Web Browser Versions and Java Runtime Environment Versions
SDM can be used with the following browsers:
•Netscape version 7.1 on all supported operating systems.
•Internet Explorer version 5.5 and later on all operating systems.
SDM requires SUN Java Runtime Environment (JRE) version 1.4.2_05 or later, or Java Virtual Machine (JVM) 184.108.40.20610.
PC Operating System Versions
SDM can be run on a PC running any of the following operating systems:
•Windows XP Professional
•Windows 2000 Professional. Windows 2000 Advanced Server is not supported.
•Windows 98 (second edition)
•Windows NT 4.0 Workstation with Service Pack 4.
This section contains important information regarding installation and upgrades to SDM.
Cisco 1700 Routers Running ITS/CCME and Cisco IOS Version 12.2(13)T
If you are installing SDM on a router that already has the Internet Telephony Service (ITS) or Cisco Call Manager Express (CCME) application installed in Flash, you may exceed the number of files allowed in Flash memory by installing SDM.Cisco 1700 routers using a Cisco IOS version 12.2(13)T image cannot have more than 32 files in Flash memory.
Before installing SDM, you must delete any unneeded files from Flash memory. If no files can be deleted, do not install SDM on the router.
Downloading SDM From Cisco.com and Installing It On Your Router
If SDM is not currently installed on your router, the document Downloading and Installing Cisco Router and Security Device Manager (SDM) explains how to download SDM from Cisco.com and install it on your router. To obtain this document, visit the following URL.
Upgrading to a New SDM Release
If a version of SDM later than version 1.0 is already installed on the router, you should use SDM's automatic update feature to install the latest files on your router. SDM automatically checks Cisco.com for more recent versions of SDM, downloads them to your PC, removes the old SDM files from memory, runs the squeeze flash: command if necessary, and copies the latest files to your router. The update feature is available from the Tools menu. Click Tools>Update SDM>Update from CCO.
If you are currently using SDM version 1.0, you must download the file SDM-Vnn.zip at the following URL:
The document Downloading and Installing Cisco Router and Security Device Manager (SDM) explains how to install SDM and all related files on your router. This document is available at the following URL:
Uninstalling SDM Files
If you want to remove SDM from Flash memory or from a router disk file system, you can do so by logging onto your router and completing the following steps in EXEC mode:
Step 1 Change to the directory in which the SDM files are located.
If your router has a Flash file system, use the following command:router#cd flash:
If your router has a disk file system, use the following command:router#cd diskN
Replace N with the actual number of the disk. Use the slot keyword instead of the disk keyword if necessary.
Step 2 Use the delete command to remove the SDM files. The example below deletes the file sdm.tar:router#delete sdm.tarDelete filename [sdm.tar]?Delete flash:sdm.tar? [confirm]
As shown in the example, simply press Return to confirm the deletion.
Step 3 Use the delete command to remove the remaining SDM files. The "SDM File List" section lists the files used by SDM.
Step 4 Reclaim memory space by using the squeeze flash: command:router#squeeze flash:
It is not necessary to use the squeeze flash: command on DOS-based file systems.
New and Changed Information
This section contains information that is new or that has changed since the previous release.
New Features Supported in SDM Release 2.0
SDM version 2.0 supports the following new features:
•AAA—You can configure Authentication Authorization and Accounting (AAA) features using SDM.
•Role-Based Access—You can associate pre-defined CLI views to user accounts in SDM. These CLI views define the functions that users can perform, based on their roles in the network.
•Easy VPN Server—You can configure your router as an Easy VPN server, and monitor connections to the server.
•IOS IPS—SDM allows you to configure IOS Intrusion Protection System (IPS) on router interfaces and to specify the traffic direction on which the feature is to apply. SDM's IPS interface lets you import signatures to the router, add, edit, and clone signatures, and specify locations of Signature Definition Files (SDFs). You can also specify ACLs that define which traffic is to be examined, and view Secure Device Event Exchange (SDEE) messages.
•PKI—SDM allows you to generate RSA keys, create Public Key Infrastructure (PKI) trustpoints on the router and enroll with a Certificate Authority (CA) to obtain certificates for the router. You can view RSA keys generated on the router, and router and CA certificates that have been imported to the router.
•QoS—You can create Quality of Service (QoS) policies and associate them with router interfaces. Once created, you can clone policies, and edit the QoS classes in the policies. SDM also allows you to monitor the traffic on which the QoS policy has been applied.
•VPN and WAN connection testing—You can test configured VPN and WAN connections right after configuring them or you can test them later. SDM sends a ping to the remote system. If the ping fails, SDM performs checks to determine the cause of the failure, reports its findings, and recommends actions that you can take to correct the problem.
•DMVPN Full Mesh—The Full Mesh configuration is supported with the Dual-Hub Single Dynamic Multipoint Virtual Private Network (DMVPN) solution. Nodes in the DMVPN can be configured to establish direct tunnels to other nodes in the DMVPN.
•SDM navigation has been streamlined. All first-time configurations are performed using wizards. Once a configuration has been completed, you can use SDM to edit specific configuration parameters.
SDM File List
The following files are required for SDM 2.0:
•home.shtml (required for Cisco 7200 and Cisco 7300 routers)
This section contains important information for SDM.
Popup Blockers Disable SDM-IPS and SDM Online Help
If you have enabled popup blockers in the browser you use to run SDM or SDM-IPS, SDM-IPS will not launch, and SDM online help will not display when you click the help button. To prevent this from happening, you must disable the popup blocker when you run SDM or SDM-IPS. Popup blockers may be enabled in search engine toolbars, or may be stand-alone applications integrated with the web browser.
All users accessing SDM on this router will be authenticated by the AAA server.
Routers Shipped with SDM Do Not Execute the Standard IOS Startup Sequence
Because a default configuration file is provided on a router shipped with SDM, it will not execute the standard Cisco IOS startup sequence. If you are expecting to use the Cisco IOS setup utility, a TFTP/BOOTP configuration download, or other features available through the standard Cisco IOS startup, you will need to erase the configuration file.
To erase the existing configuration and take advantage of the Cisco IOS startup sequence, perform the following steps. This will leave SDM on the router if you later decide you want to use it, but you will need to configure the router manually before you can begin using SDM. Please refer to your router's Quick Start Guide and to the SDM FAQ (available at http://www.cisco.com/go/sdm) for information about the minimum configuration required for using SDM.
Step 1 Connect the light blue console cable, included with your router, from the blue console port on your router to a serial port on your PC. Refer to your router's Hardware Installation Guide for instructions.
Step 2 Connect the power supply to your router, plug the power supply into a power outlet, and turn on your router. Refer to your router's Quick Start Guide for instructions.
Step 3 Use a terminal emulation program on your PC, with the terminal emulation settings 9600 baud, 8 data bits, no parity, 1 stop bit, and no flow control, to connect to your router.
Step 4 At the prompt, enter the enable command, and enter the password cisco.yourname> enablePassword: ciscoyourname#
Step 5 Enter the erase startup-config command.yourname# erase startup-config
Step 6 Confirm the command by pressing Enter.
Step 7 Enter the reload command.yourname# reload
Step 8 Confirm the command by pressing Enter.
After the router completes the reload operation, it enters into the standard IOS startup sequence. You can use the startup sequence to give your router a configuration manually, or to copy a configuration file from the network. If you later decide you want to use SDM to change an existing configuration, refer to the instructions on starting SDM included in the Quick Start Guide for your router.
Unable to perform `squeeze flash'
If your router is using a Cisco IOS image with a version earlier than 12.3 in the T release, or 12.2(13)ZH, it may be necessary to use the squeeze flash command to reclaim Flash memory after repeated use of SDM. If this becomes necessary, SDM will inform you that the squeeze flash command must be used, and will execute the command upon your confirmation.
However, the squeeze flash command will not work if an erase flash command has never been executed on the router. If this is the case you will receive an "Unable to perform `squeeze flash'" warning message, and you will need to run the erase flash: command to enable the use of the squeeze flash command.
Executing the erase flash: command will remove SDM and the Cisco IOS image from the router's Flash memory, and you will lose your connection to the router. Complete the following steps to save files in Flash, execute erase flash:, and copy the files back so you can reconnect to SDM.
Step 1 Ensure that the router will not lose power. If the router loses power after an erase flash: operation, there will be no Cisco IOS image in memory.
Step 2 Prepare a TFTP server to which you can save files and copy them over to the router. You must have write access to the TFTP server. Your PC can be used for this purpose if it has a TFTP server program.
Step 3 Open up a Telnet session on the router so that you can use the CLI.
Step 4 Save the router's running configuration to the startup configuration by entering the command copy running-config startup-config.
Step 5 Use the copy tftp command to copy the Cisco IOS image, and the SDM files from Flash to a TFTP server:
copy flash: filename tftp://tftp-server-address/filename
Example:copy flash: sdm.tar tftp://10.10.10.3/sdm.tar
The section "SDM File List" section lists the files SDM uses.
Note If you prefer to download a Cisco IOS image, and the file SDM-Vnn.tar, follow these instructions to use an Internet connection to download an SDM-supported Cisco IOS image, the files SDM.tar, and the file SDM.shtml, then place those files on a TFTP server.
a. Click the following link to obtain a Cisco IOS image from the Cisco Software Center:
b. Obtain an image that supports the features you want on the 12.2(11)T release or later. Save the file to the TFTP server that is accessible from the router.
c. Use the following link to obtain the latest SDM-Vnn.zip file.
d. Extract the SDM files from SDM-Vnn.zip and save them in the root directory of the TFTP server.' The section "SDM File List" section lists the files SDM uses.
Step 6 From the PC, log onto the router using telnet, and enter Enable mode.
Step 7 Enter the command erase flash:, and confirm. The router's IOS image, configuration file, the file SDM.tar, and the file SDM.shtml are removed from Flash memory.
Step 8 Use the copy tftp command to copy the IOS image and the SDM files from the TFTP server to the router:
copy tftp://tftp-server-address/filename flash:
Example:copy tftp://10.10.10.3/SDM.tar flash:
Note Copy the Cisco IOS image first, followed by the SDM files. If you are installing files on a Cisco 72xx or 73xx router, be sure to copy the file home.shtml.
Step 9 Start your web browser, and reconnect to SDM, using the same IP address you used when you started the SDM session.
Now that an erase flash: has been performed on the router, you will be able to execute the squeeze flash command when necessary.
Restrictions and Limitations
This section describes restrictions and limitations that may apply to SDM.
SDM Minimum Screen Resolution
SDM requires a screen resolution of at least 1024X768.
SDM Features Not Supported on Cisco 7204VXR, 7206VXR, and 7301 Routers
The following restrictions apply to SDM running on Cisco 7204VXR, 7206VXR, and 7301 Routers:
•The SDM Startup wizard is not supported.
•WAN configuration is not supported. SDM supports configuration of Ethernet and Fast Ethernet interfaces.
•The SDM Reset feature is not available.
•No SDM-default configuration file is supplied.
Caveats describe unexpected behavior in SDM. Severity 1 caveats are the most serious caveats, severity 2 caveats are less serious, and severity 3 caveats are the least serious of these three severity levels.
Open Caveats—Release 2.0
This section lists caveats that are open in release 2.0.
This problem is encountered on routers running Cisco IOS image c3825-advsecurityk9-mz.123-10.2. If an ATM interface is configured on routers running this image, WAN troubleshooting may display inconsistent results. PVC connections may be shown as UP when they are DOWN.
When both SDM and IPS are open, an open dialog requiring an OK or Cancel in one application will prevent the user from working in the other application.
Complete the work in the dialog and click OK, or click Cancel to close the dialog before switching to the other application.
If multiple instances of SDM are run under Netscape version 7.1 using the Java Virtual Machine (JVM) or the Java plugin, and the user shuts down one instance of SDM, then all other open instances of SDM on that PC are shut down.
This problem occurs because Netscape version 7.1 uses only one instance of the JVM or the Java plugin, even when multiple instances of Netscape are launched. As a result, when one instance of SDM is shut down, Netscape shuts down the JVM or the Java plugin, and all other instances of SDM are also shut down.
If SDM is run under Netscape version 7.1, only one instance of SDM should be opened. Using Internet Explorer is advised when multiple instances of SDM must be opened, such as when the user must configure multiple routers at the same time.
When the crypto identity ca command is used, the Loopback0 interface is shown as having no configured IP address in the Edit Interfaces and Connections window when an IP address has been configured.
Disregard the IP address information in the Interfaces and Connections window. If you need to view the IP address, select the interface and click the Edit button.
This problem is caused by the IOS bug CSCef46305. After an Easy VPN Remote connection has been brought up after a successful user authentication (Xauth), the remote peer may not be listed in the Easy VPN Remote Edit screen if SDM is refreshed or reinvoked. If this problem occurs, Easy VPN Remote troubleshooting might not behave as expected for this connection.
This problem will occur only when the Easy VPN server sends Xauth challenges to the Easy VPN remote at the same time that the Easy VPN remote is trying to establish a tunnel with the VPN server.
When an Easy VPN Server is configured using Digital Certificates for authentication, and an Easy VPN Remote connection is configured on another router, the client statistics for the Easy VPN server are all shown as 0 in the VPN Status window.
To view client statistics, select Tools>Telnet. Log in to the router, and issue the show crypto session command.
When adding a new signature to the ATOMIC.ICMP engine, you may see the error message "[Enum(xxx)-StorageKey-ATOMIC.ICMP] the value AaBb is not a valid value."
In the Add Signature window go to the parameter StorageKey, and click the green square to enable editing for this parameter, the green square icon will change to a red diamond icon. Choosing any value from the drop down box will fix this problem.
This problem is caused by the IOS bug CSCef64124. When the user unchecks the "Save Xauth username and password on the router" check-box in the Edit Easy VPN Remote dialog and clicks OK, the command is delivered to the router, but SDM shows the check-box as checked and the corresponding command is still shown in the running configuration if SDM is refreshed.
This occurs when the user wants to remove the saved Xauth username and password in Easy VPN Remote.
If an Easy VPN Remote configuration has connections to more than one Easy VPN server configured, VPN troubleshooting debugging may report troubleshooting results for only one VPN server or give incorrect recommendations. This issue is seen only in some IOS images.
Invoking SDM with a user associated to SDM_Monitor view adds a PKI trust point and an Easy VPN profile. This behavior does not affect the running configuration.
Invoke SDM with a user associated with a different CLI view, or with a user of privilege level 15.
SDM filenames are case sensitive. If the SDM files are copied from the PC hard disk to a flash card, File Explorer changes the names to upper case. When this happens, SDM cannot be invoked from this flash card.
Before removing the flash card from the PC, restore the filenames to lower case.
When the router is running a Cisco IOS image that does not support the show pppoe session command, WAN Troubleshooting may not report any reasons for failure or recommended actions for PPPoE connections are found to be down.
If a firewall is configured for an interface which already has a Management Access policy associated with it, selecting Replace in the Merge/Replace dialog might prevent access to certain networks.
This occurs because selecting "Replace" causes the policy access control entries (ACEs) to be disassociated from the interface but not from the vty or http line.
On running Firewall wizard in an interface configured with Management Access policy select Merge option instead of Replace and proceed.
VPN Troubleshooting may report a possible Maximum Transmission Unit (MTU) problem in the passthrough network when the tunnel is up. If the VPN interface is a Dialer interface configured on an Async interface, this problem may not always exist, and the recommended action will have no effect.
Ignore this message and the corresponding recommendation.
Due to a problem with Cisco IOS, if a custom protocol is mapped to a port and the same custom protocol is specified for matching under a class-map, and then the mapping of the custom protocol is deleted from the configuration , IOS does not give any warning message that the user should first delete the "match protocol custom-01" commands which make use of the custom protocol mapping.
Do the following:
–Configure the custom protocol again.
–Remove all the match protocol statements that reference the custom protocol that you configured.
–Remove the custom protocol from the configuration.
When using the Security Audit wizard, navigation through the report card is slow, and text may not be properly displayed. This problem occurs with both Internet Explorer and with Netscape using JRE 1.4.2_03.
Upgrade to JRE 1.4.2_05 by visiting http://java.sun.com/j2se/1.4.2/download.html.
SDM is slow to launch and to navigate when run on a browser using JRE 1.4.1.
Upgrade to JRE 1.4.2_05 by visiting http://java.sun.com/j2se/1.4.2/download.html.
This problem is cause by IOS caveat CSCef52919. A user with privilege level 1 who is associated with a view may be able to log in to SDM with a privilege level of 15. This occurs when Authentication Authorization and Accounting (AAA) is enabled, and a vty line is configured with privilege level 2 through 15.
Do not configure privilege 1-level users. The problem does not occur when users of higher privilege levels are configured.
When updating SDM, if any of the uploaded SDM files shows a size of zero bytes when show flash is invoked, no operations such as copy or delete can be performed on flash. This problem rarely occurs.
Restart the router to be able to perform operations on flash. If files of zero bytes are shown in a show flash display, restart the router before starting SDM.
Router does not reload with default configuration when user executes Reset To Factory Defaults in SDM.
If router is running a Cisco IOS image of version 12.2(11)T6, and the last 4 bits of the config-register value are set to 0, for example 0x2100 or 0x1100, the router does not reload when the user performs a Reset To Factory Defaults. SDM indicates that it has sent a reload command to router and shuts down, and the default configuration is copied to the startup-config, but the reload command has not executed, and the router is still using the running configuration that was present before the Reset operation.
Use the CLI config-register command to ensure that the last 4 bits of the config register are not set to 0 (zero).
If you delete a WAN connection that you created, an ip nat inside command may still remain in a LAN interface configuration.
To delete the ip nat inside command from the LAN interface configuration, go t o Edit Interfaces and Connections, select the LAN interface, click Edit, and delete the association in the Association tab.
Enabling AES encryption or IP Compression in the Add/Edit IKE Policy or Add/Edit Transform Set windows might not work even though the IOS image running on the router supports AES encryption or IP Compression. This may happen in the following circumstances:
–Hardware encryption is enabled.
–The router has a VPN module that does not support AES encryption or IP compression.
Do one of the following:
–Disable hardware encryption by adding the no crypto engine accelerator command to the configuration file using the CLI interface. This command tells router to use IOS software for encryption instead of using the encryption provided by the VPN module.
–Upgrade your hardware VPN module to one that supports AES or IP Compression.
For more info on VPN Modules, refer to the document at the following URL:
When configuring Static Routing, if a virtual-template interface is configured as the next hop interface in a static route, SDM generates corresponding CLI commands. Delivering such commands to the router may fail on some platforms.
Do not configure a virtual-template interface as a next hop interface if it is not supported on your router.
When SDM runs with a Cisco IOS image of a version earlier than 12.3 in the T release, or earlier than version 12.2(13)ZH, the HTTP server appends unnecessary characters to names of files it displays. As a result, when SDM is started, the web browser displays the warning "Content does not match the signature."
Disregard the warning and click Yes to continue.
When an Easy VPN tunnel is active, using SDM to apply a NAT configuration to the Easy VPN inside and outside interfaces will deliver 'ip nat inside' and 'ip nat outside' commands to the router, but the running configuration will not be changed. SDM displays no error message when this is attempted.
To apply a NAT configuration to interfaces that have been designated as Easy VPN "inside" or "outside" interfaces, complete the following steps in SDM:
–Select the Easy VPN tunnel in the VPN Connections window and click Disconnect. If the Connect/Disconnect button is disabled, select the interface in the Interfaces and Connections window, open the Association tab for that connection and change the Easy VPN association to None.
–Open the NAT window, click Designate NAT Interfaces, and designate NAT inside and NAT outside interfaces.
–Select the Easy VPN tunnel, and click Connect. If you had to disassociate the Easy VPN tunnel from the connection, return to the Associations tab, and reselect the Easy VPN connection name
SDM will not start on a Cisco 831 router with 32 MB of memory if run from Netscape. An exception will be displayed in the Java console window and in the router console window indicating a memory allocation failure.
Run SDM using Internet Explorer version 5.5 or later. Or, if you want to continue to use Netscape, log onto the router CLI and enter the following memory-size command in global configuration mode:Router# memory-size iomem 10
XAuth authentication intermittently fails and Easy VPN tunnels cannot be established using SDM on routers running IOS version 12. 3(4)T. When the user attempts to do an Xauth authentication in SDM, the following error message is displayed:
"Unable to establish a session with the router to process XAUTH request from the Easy VPN server. Easy VPN tunnel cannot be successfully brought up."
This message is followed by another indicating that the connect command was delivered to the router, but that the tunnel was not established.
In the VPN Connections window, select the Easy VPN tunnel configuration and click the "Reset Tunnel" button to clear the tunnel and reconnect it. If this does not bring up the tunnel, use the "Login" button, more than once if necessary, to bring up the tunnel.
When SDM runs with a Cisco IOS image of version 12.2(15)T, SDM fails to download the configuration file from the CNS server through startup wizard. Please refer Bug CSCin65539 for more details. This issue occurs only with Cisco IOS image version 12.2(15)T.
Upgrade to Cisco IOS image version 12.3(4)T or later.
On Cisco 7x00 routers, the SDM Update feature is supported if the current SDM files were loaded onto the router's Flash Disk or compact Flash Disk. However, the SDM Updates feature fails to upload new SDM files to the router if the current SDM files were installed in Flash memory. The SDM Updates feature uses RCP protocol to upload the new SDM files to the router, but the RCP Server misinterprets the "flag" sent by the RCP Client for the above mentioned file systems.
If the current SDM files were loaded into Flash memory, update to the new SDM version by manually copying the new SDM files to the file system of the router using a TFTP server. To make use of the automatic SDM Update feature, always install SDM files on the Flash Disk or compact Flash Disks (disk0, disk1, disk2).
SDM should not get invoked from boot images such as kboot images on 72xx routers. Such boot images are a subset of the Cisco IOS software and do not support all router functions.
Boot the router with an SDM-supported IOS image, and then invoke SDM. See Table 1 for the Cisco IOS versions that SDM supports.
On 72xx platforms, encryption is not supported on PA-4T port adapters. Because the CLI does not support crypto maps for these type of interfaces, SDM will fail to assign crypto maps to these interfaces. The PA-4T port adapter will not support future compression and encryption features.
Upgrade your 72xx router hardware to 4t+ PA.
Whenever any unconfigured interface contains the description "$FW_INSIDE$," on a router configured with a firewall, adding a new NTP server will not modify the firewall ACLs to allow NTP passthrough traffic. Instead, when the user edits the firewall's outside interface in the Interfaces and Connections window, SDM prompts the user to add the NTP passthrough traffic.
Use the CLI to manually remove the description $FW_INSIDE$ from the unconfigured interface.
If the interface used for the primary backup connection is configured for PPPoE encapsulation, the backup connection will not function properly if the next hop address is specified during configuration. An IOS bug (CSCin64336) has been filed for this problem. If the interface used for the primary backup connection is an Ethernet interface configured without encapsulation, the backup connection will not function properly if the next hop address is not specified during configuration.
For PPPoE connections: Do not provide the next hop IP address when you configure the primary backup connection.
For Ethernet connections without encapsulation: DO provide the next hop IP address when you configure the primary backup connection.
If the WAN wizard is used to configure an Analog Modem connection as a primary backup connection, and the analog modem connection is deleted, SDM may report that the interface contains unsupported configuration parameters.
Click Refresh on the SDM toolbar, and delete the connection.
When shutting down SDM by clicking the X button in the top-right corner of the browser window, occasionally the parent Internet Explorer windows do not close, and it is necessary to restart the PC in order to close the window and restart SDM. Another instance of SDM cannot be opened if the parent windows of a previous instance of SDM are still open. This problem occurs on PCs running Windows 98 SE.
The Interfaces and Connections window may display the Backup option in disabled state for Async interfaces on Cisco 831 and Cisco 837 routers. This will occur when the following operations have been performed:
–The interface used for the Primary backup connection is configured with an SDM-supported IP address type.
–The Async interface is configured as the backup for a primary interface.
–The IP address of the primary interface is changed.
When the IP address of the Primary interface is changed, SDM displays a Yes or No warning popup asking if you want to remove the backup configuration. If you select Yes, SDM removes the backup configuration, but the Interfaces and Connections window still shows the backup option as disabled, preventing you from selecting the Async interface as a backup interface.
Delete the Async interface configuration using the Interfaces and Connections window.
When the router is configured to use PPPoE, a user may not be able to download a file using FTP or display web pages from Internet hosts that he is able to ping or telnet to. This can happen if SDM is being used on a router with interfaces that SDM does not support, such as Token Ring or VLAN interfaces. SDM does not deliver the command ip tcp adjust-mss 1452 to unsupported interfaces.
Use the CLI to add the ip tcp adjust-mss 1452 command to the VLAN or Token Ring interface configuration. Telnet to the router and enter the following command in VLAN or Token Ring interface configuration mode.
ip tcp adjust-mss 1452
The SDM Startup Wizard may not deliver the configuration to a 2691 router running IOS images of versions 12.2(15)T or 12.2(15)ZJ when SSH is used to communicate between SDM and the router. When SDM is invoked using the string https://router-IP-address, SDM uses SSH.
When launching SDM, click cancel in the SSH credentials window. SDM will use the Telnet protocol to communicate with the router. Enter the login ID and password in the Telnet credentials window.
SDM may take up to 12 seconds to display the DMVPN Hub and Spoke wizard after it is selected and the Launch the selected task button is clicked. This latency may occur if a JRE plugin of any version is running in the browser, or if SDM is using the SSH or Telnet communications module.
SDM may take several seconds to display screens in the DMVPN wizard. This latency may occur if a Jave plugin is running in the browser.
Using an interface configured with IP unnumbered as a DMVPN tunnel source may cause the Cisco IOS to crash. An interface configured as IP unnumbered uses the IP address of another interface on the router. This IOS problem does not always occur.
Instead of using an IP unnumbered interface as the DMVPN tunnel source, use the interface that is referenced in the ip unnumbered command. If you are configuring a hub, the interface must have a static IP address.
The router reloads when an NHRP tunnel interface is removed. This is an IOS caveat which you may encounter when deleting a Dynamic Multipoint VPN tunnel. This caveat duplicates CSCed41641. There is no workaround for this problem.
If an Analog Modem or ISDN connection is deleted using SDM, the dialer interface may not be deleted from the configuration and the router may reload. This is due to an IOS caveat, CSCin69090. This occurs on routers using Cisco IOS images of version 12.3(4)XG or later, or Cisco IOS version 12.3(7)T. There is no workaround for this problem.
On routers running Cisco IOS version 12.3(6), IOS may reload if SDM is started using HTTPS.
Start SDM by entering http://<ip-address>. Do not use https://<ip-address>.
The SDM Startup Wizard may fail if the router is running Cisco IOS version 12.3(9) and there is not sufficient space in NVRAM to save the startup configuration. This problem should not occur with new routers.
If this problem occurs, use the CLI to remove unneeded files from NVRAM.
SDM does not issue the ntp update-calendar IOS command on Cisco 7200 routers if there are no new settings to enter and if the Network Time Protocol (NTP) server was configured using the CLI and only one NTP server IP address was provided and no ntp update-calendar IOS command was present in the running configuration.
Use SDM to delete the NTP server configuration entry, click Refresh, and then recreate the entry, or make changes to the existing NTP server entry.
Due to an IOS issue (CSCee63313), if SDM is used to enable IPS on an interface, and then used to disable IPS on that interface, the router crashes.
Due to an IOS issue (refer to CSCee58000), SDM is unable to configure a virtual auxiliary port on Cisco 831, 836, or 837 routers running Cisco IOS version 12.3(7)XR1.
Load the rebuilt image 12.3(7)XR2 on the router when it becomes available and then use SDM to configure a virtual auxiliary port.
The following sections explain how documentation may be inaccurate or incomplete.
The following sections explain information that was not included in documentation.
Cisco Router and Security Device Manager (SDM) Quick Start Guide: Disable Proxy Settings
SDM will not launch when run under Internet Explorer using JRE plugin versions 1.4.2_05 and proxy settings are enabled. To correct this problem, select Internet Options from the Tools menu, click the Connections tab, and then click the LAN settings button. In the LAN Settings window, disable the proxy settings.
SDM Default Configuration File
SDM includes a default configuration file. The configuration does the following:
•Provides an IP address for your Fast Ethernet interface, enabling an interface to your LAN
•Enables your router's HTTP server, allowing http access from your LAN
•Creates a default username (cisco) and password (cisco) with privilege level 15
•Enables Telnet access to the router from your LAN
Note The default configuration included does not configure any WAN interfaces. To connect to the Internet, you must use SDM to configure a WAN interface.
Caution It is highly recommended that you change the username and password values because they are well known.If you do not change the username and password values from the default, you will have a security risk because your router will be vulnerable to attacks.
This section lists other documents with information on SDM.
Refer to the Quick Start Guide for your router , available on www.cisco.com, to learn how to start SDM for the first time.
These documents are available on www.cisco.com/go/sdm
•Cisco Security Device Manager (SDM) Frequently Asked Questions.
•Downloading and Installing Cisco Security Device Manager (SDM)
•Switching Between Cisco Security Device Manager (SDM) and Cisco Router Web Setup Tool (CRWS) on Cisco 83X Series Routers
You can submit comments electronically on Cisco.com. On the Cisco Documentation home page, click Feedback at the top of the page.
You can e-mail your comments to firstname.lastname@example.org.
You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:
Attn: Customer Document Ordering
170 West Tasman Drive
San Jose, CA 95134-9883
We appreciate your comments.
Obtaining Technical Assistance
Cisco provides Cisco.com, which includes the Cisco Technical Assistance Center (TAC) website, as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from the Cisco TAC website. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC website, including TAC tools and utilities.
Cisco.com offers a suite of interactive, networked services that let you access Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.
Cisco.com provides a broad range of features and services to help you with these tasks:
•Streamline business processes and improve productivity
•Resolve technical issues with online support
•Download and test software packages
•Order Cisco learning materials and merchandise
•Register for online skill assessment, training, and certification programs
To obtain customized information and service, you can self-register on Cisco.com at this URL:
Technical Assistance Center
The Cisco TAC is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two types of support are available: the Cisco TAC website and the Cisco TAC Escalation Center. The type of support that you choose depends on the priority of the problem and the conditions stated in service contracts, when applicable.
We categorize Cisco TAC inquiries according to urgency:
•Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration. There is little or no impact to your business operations.
•Priority level 3 (P3)—Operational performance of the network is impaired, but most business operations remain functional. You and Cisco are willing to commit resources during normal business hours to restore service to satisfactory levels.
•Priority level 2 (P2)—Operation of an existing network is severely degraded, or significant aspects of your business operations are negatively impacted by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.
•Priority level 1 (P1)—An existing network is "down," or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.
Cisco TAC Website
The Cisco TAC website provides online documents and tools to help troubleshoot and resolve technical issues with Cisco products and technologies. To access the Cisco TAC website, go to this URL:
All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC website. Some services on the Cisco TAC website require a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:
If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC website, you can open a case online at this URL:
If you have Internet access, we recommend that you open P3 and P4 cases online so that you can fully describe the situation and attach any necessary files.
Cisco TAC Escalation Center
The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.
To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:
Before calling, please check with your network operations center to determine the Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.
This document is to be used in conjunction with the documents listed in the "Related Documentation" section.
Copyright © 2003-2004 Cisco Systems, Inc. All rights reserved.