The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This chapter describes how to initially install and configure your Cisco 3350 Mobility Services Engine.
This chapter contains these sections:
Note For configuration details beyond initial installation, refer to the appropriate mobility services configuration guide at:
http://www.cisco.com/en/US/products/ps9742/tsd_products_support_series_home.html
This section lists the required hardware, software and other information that you need to install and setup the mobility services engine.
You need this equipment to install a mobility services engine in an EIA rack:
Note If you are installing this unit in a threaded-hole rack, you must supply screws that fit the threaded-hole rack and the appropriate screwdriver or Torx driver for those screws.
You need this equipment to connect to the mobility services engine console:
Note A null modem serial cable that provides a connection to the laptop, desktop, or palmtop is shipped with the mobility services engine.
Note Please refer to the latest Release Notes for Cisco 3300 Series Mobility Services Engine for compatibility by release between the mobility services engine and Cisco WCS and controller releases at: http://www.cisco.com/en/US/products/ps9742/prod_release_notes_list.html
Obtain these parameters from your network administrator:
Note Either the Ethernet-0 or Ethernet-1 port can be used to transmit location updates to Cisco WCS. However, the Ethernet-0 port is generally configured to communicate with Cisco WCS and the Ethernet-1 port is generally used for out-of-band management. Both ports are configured as part of the installation script described in the “Configuring the Mobility Services Engine” section.
For maximum safety and reliability, mount the mobility services engine using the following guidelines.
To reduce the risk of personal injury or damage to the mobility services engine:
Laser devices are used within the DVD of the mobility services engine. The DVD has no defined use on the customer site.
Install the mobility services engine in a EIA-standard rack. One rack unit is required for each mobility services engine.
Ensure that you can reach the mobility services engine and all cables.
Ensure that there is sufficient room at the back of the mobility services engine for all cables and connectors.
To ensure continued safe and reliable equipment operation, install or position the system in a well ventilated, climate-controlled environment.
Ensure that the ambient operating temperature remains between 0 and 40° C (32 and 104° F), taking into account the elevated temperatures that occur when equipment is installed in a rack.
Installation of this equipment must comply with local and regional electrical regulations governing the installation of information technology equipment by licensed electricians. This equipment is designed to operate in installations covered by NFPA 70, 1999 Edition (National Electric Code) and NFPA-75, 1992 (code for Protection of Electronic Computer/Data Processing Equipment). For electrical power ratings on options, refer to the product rating label or the user documentation supplied with that option.
When installing more than one mobility services engine, you may need to use additional power distribution devices (PDUs) to safely provide power to all devices. Observe the following guidelines:
The mobility services engine has two power supplies.
Warning This unit might have more than one power supply connection. All connections must be removed to de-energize the unit. Statement 1028
The mobility services engine might include a real-time clock battery or coin cell battery that might contain perchlorate and might require special handling when recycled or disposed of in California.
Refer to the following link for disposal information.
http://www.dtsc.ca.gov/hazardouswaste/perchlorate
The mobility services engine must be grounded properly for proper operation and safety. In the United States, you must install the equipment in accordance with NFPA 70, 1999 Edition (National Electric Code), Article 250, as well as any local and regional building codes. In Canada, you must install the equipment in accordance with Canadian Standards Association, CSA C22.1, Canadian Electrical Code. In all other countries, you must install the equipment in accordance with any regional or national electrical wiring codes, such as the International Electrotechnical Commission (IEC) Code 364, parts 1 through 7.
Furthermore, you must verify that all power distribution devices used in the installation, such as branch wiring and receptacles, are listed or certified grounding-type devices. Because of the high ground-leakage currents associated with multiple systems connected to the same power source, Cisco recommends the use of a PDU that is either permanently wired to the building’s branch circuit or includes a nondetachable cord that is wired to an industrial-style plug. NEMA locking-style plugs or those complying with IEC 60309 are considered suitable for this purpose. Using common power outlet strips for the mobility services engine is not recommended.
Warning To prevent bodily injury when mounting or servicing this unit in a rack, you must take special precautions to ensure that the system remains stable. The following guidelines are provided to ensure your safety: (1) This unit should be mounted at the bottom of the rack if it is the only unit in the rack. (2) When mounting this unit in a partially filled rack, load the rack from the bottom to the top with the heaviest component at the bottom of the rack. (3) If the rack is provided with stabilizing devices, install the stabilizers before mounting or servicing the unit in the rack. Statement 1006.
Follow these steps to unpack the mobility services engine.
Step 1 Open the shipping container and carefully remove the contents.
Step 2 Return all packing materials to the shipping container and save it.
Step 3 Ensure that all items listed in the “Package Contents” section are included in the shipment.
Step 4 Check each item for damage. If any item is damaged or missing, notify your authorized Cisco sales representative.
Each mobility services engine package contains the following items:
Warning Only trained and qualified personnel should be allowed to install, replace, or service this equipment. Statement 1030
To reduce the risk of personal injury or damage to the equipment:
Note ● The mobility services engine comes with a rack mount rail kit that can be installed in a square-hole rack, round-hole rack, or a threaded-hole rack.
Step 1 Release the inner slide of the mounting rail and attach it to the side of the mobility services engine (Figure 2-1). The numbers within the illustrations indicate the order of the action.
Figure 2-1 Attach Inner Sliding Rail to Mobility Services Engine
Step 2 Attach the outside rail to the front of the rack structure where the mobility services engine is going to be installed (Figure 2-2). The numbers within the illustrations indicate the order of the action.
Figure 2-2 Attach Outer Rail to Front of Rack
Step 3 Attach the outside rail to the back of the rack structure where the mobility services engine is going to be installed (Figure 2-3). The numbers within the illustrations indicate the order of the action.
Figure 2-3 Attach Outer Rail to Back of Rack
Step 4 Attach inner slide rail with mobility service engine to the outside rail that is mounted on the rack (Figure 2-4).
Figure 2-4 Attach Inner Rail to Outer Rail
Step 5 Slide the attached inner rail and the mobility services engine to the rear of the rack (Figure 2-5). The numbers within the illustrations indicate the order of the action.
Figure 2-5 Slide System and Inner Rail to Rear of Rack
Figure 2-6 shows a full view of the front panel of the Cisco 3350 Mobility Services Engine.
Figure 2-7 shows a detailed section of the Cisco 3350 front panel.
Table 2-1 identifies Cisco 3350 front panel components and their function.
Figure 2-6 Cisco 3350 Front Panel
Figure 2-7 Close Up of Cisco 3350 Front Panel
|
|
|
---|---|---|
No customer use. All system software is downloaded using Cisco WCS. |
||
Amber means that system health is degraded. For specific system information, pull out the diagnostic card from the front panel. Refer to the “Diagnostic Card” section. |
||
Red means that system health is critical. To identify the component in a critical state, pull out the diagnostic card from the front panel. Refer to the “Diagnostic Card” section. |
||
Off means that system health is normal (when in standby mode). |
||
Off means that power supply health is normal when in standby mode. |
||
Green means that a network link exists. Note NIC1 is identified as Ethernet-0 during the automatic installation script. |
||
Off means that no link to the network exists. Note If power is off, the front panel LED is not active. Check the NIC1 LED on the rear panel. Refer to the “Rear Panel” section. |
||
Green means that a network link exists. Note NIC2 is identified as Ethernet-1 during the automatic installation script. |
||
Blinking green means that a network link and activity exist. |
||
Off means that no link to the network exists. Note If power is off, the front panel LED is not active. Check the NIC2 LED on the rear panel. Refer to the “Rear Panel” section. |
||
Flashing blue means that the system is being remotely managed. |
||
Amber means that the system is shut down, but power is still applied. |
||
Off means that the power cord is not attached, power supply failure has occurred, no power supplies are installed, facility power is not available, or power button cable is disconnected. |
||
Serial connection is recommended. Do not connect any equipment to this port. |
||
Provides status on the power supplies, internal processors, DIMMS, memory, temperature and alarms. Refer to the “Diagnostic Card” section for details. |
||
Do not remove a hard drive unless it is malfunctioning and you are directed by Cisco technical support to do so. |
Figure 2-8 shows details of the diagnostic card found on the front panel.
Table 2-2 summarizes the internal components of the mobility services engine that are tracked by the diagnostic card. Definitions of each of the LED states for those components are also summarized.
Note This information is not currently summarized within Cisco WCS.
Figure 2-9 shows details of the rear panel for the Cisco 3350 Mobility Services Engine.
Table 2-3 identifies Cisco 3350 back panel components and their function.
Table 2-4 summarizes pin assignment for the DB9 cable.
Note Items not labeled in Figure 2-9 are not currently assigned an active role on the system.
Figure 2-9 Cisco 3350 Mobility Services Engine Rear Panel
|
|
---|---|
DB9 serial connector for console. See pinouts in Table 2-4 . |
|
|
|
|
|
|
|
---|---|---|
For initial system configuration, use the command-line interface (CLI) console. The CLI console connects to the mobility services engine back-panel DB9 console port. Figure 2-9 shows the console port on the back panel of the mobility services engine. Back panel components are described in Table 2-3 . Console port pinouts are shown in Table 2-4 .
Note Use either a Crossover serial cable or Null modem cable to connect the console ports.
Use these terminal emulator settings for the CLI console session:
When you apply AC power to a mobility services engine, the bootup script initializes the operating system and its stored configurations. You are prompted to enter a user ID and password and enter key configuration details.
Follow these steps to power up the mobility services engine.
Step 1 Plug an AC power cord into the back of the power supplies of the mobility services engine (Figure 2-9), and connect the other end to a grounded 100 to 240 VAC 50/60 Hz electrical outlet.
The end of the power cord that plugs into the mobility services engine conforms with the IEC 320 standard.
Step 2 Use the front-panel Power On/Standby button to turn the mobility services engine on (Figure 2-7).
Step 3 At the login prompt, enter the mobility services engine operating user ID and password. The default user ID is root and the default password is password.
The user ID and password are case sensitive.
You are now logged into the mobility services engine operating system.
Continue to the “Configuring the Mobility Services Engine” section.
Minimal configuration is done for the mobility services engine as part of installation using the console. All configuration beyond the initial setup using the automatic installation can be done with Cisco WCS. For details on automatic installation refer to the “Automatic Installation Script” section.
Note You must change the default root password during initial configuration of the mobility services engine to ensure optimum network security.
Note It is highly recommended that all relevant items be configured during initial setup to ensure optimum operation of the mobility services engine in your network. The hostname and either the Ethernet-0 (eth0) or the Ethernet-1 (eth1) port MUST always be configured during the automatic installation.
Note You can rerun the automatic installation script at any time to add or change parameters. There is no need to reenter values that you do not want changed during one of these updates.
Note If you do not want to configure an item, enter skip and you are prompted for the next configuration step. Any setting skipped is retained and not modified.
The automatic installation script that displays to the screen is shown below along with descriptive text.
Example text: Indicates the installation script that displays to the console.
Body text: Provides additional information to the user about steps within the script.
Enter yes if you want to use the setup wizard or No if you want to manually set the parameters. Only experienced Linux system administrators should opt to configure the system using the setup script. The option in square brackets is the default. You can press Enter to choose that default.
When you enter Yes the following displays on the console.
The host name should be a unique name that can identify the device on the network. The hostname should start with a letter, end with a letter or number, and contain only letters, numbers, and dashes.
Enter a domain name for the network domain to which this device belongs. The domain name should start with a letter, and it should end with a valid domain name suffix such as .com. It must contain only letters, numbers, dashes, and dots.
Note A network administrator can provide you with the IP address, network mask, and default gateway address for the prompts that follow.
Enter Yes if you want to provide information for a second ethernet (eth1) interface.
Note Entry of a second ethernet interface (eth1) can be skipped by entering skip.
Enter the network mask for the IP address you specified.
Note If you entered an IP address and mask for the second interface (eth1) of this machine, you are given the opportunity to define up to two static routing entries for that interface. Static routes are typically used in lab environments to mimic out-of-band networks and are not recommended for implementation within your network unless you have extensive experience in their use.
Note If you do not want to configure any static routes, enter none at the network address prompt seen below. You will not be prompted for the network mask and gateway address.
Note If you want to configure only one route, you can enter none when you are prompted for the second network address.You will not be prompted for the network mask and gateway address for the second route.
Enter the network mask for the network address you entered above.
Enter a gateway address for the network address and network mask you provided.
Note Communications between the mobility services engine, Cisco WCS and the controller are in universal time code (UTC). Local time zones are configured on the mobility services engine to assist network operations center personnel in locating events within logs. Configuring NTP on each system provides devices with the UTC time.
Note The mobility services engine and its associated controllers must be mapped to the same NTP server and the same Cisco WCS server. An NTP server is required to automatically synchronize time between the controller, Cisco WCS and the mobility services engine.
A login banner appears when a user logs in through the console or SSH. This example shows the default banner. You can change the text that appears in this banner in the steps below. The banner is usually used to warn users that they are entering a private system.
Enter Y in the step below to configure and enable remote root login (access) from the console.
Note If you enable remote root access, serial and SSH connections are supported. Local monitor and keyboard access is denied.
Note If you disable remote root access, then both the local monitor and keyboard work along with the serial connection. SSH access is disabled.
Enter yes (below) to allow remote login through SSH v2 (ssh root login) in addition to console login. Choose no to allow root login only from the console.
Note If you forget the ssh root login password, you can enter into single user mode and change the password. To prevent unauthorized access, a password for the single user mode can be defined.
Enter the desired value for each of the password parameters or hit Enter to accept the default parameter value.
Note These parameter settings apply to ALL passwords that you enable and set during the installation script.
Enter Y to enable and define a root (superuser) password. Press Enter to skip this step.
Enter a password for the superuser and confirm it by typing it again. Your typing is not visible.
You can also configure a strong (GRand Unified Bootloader (GRUB)) password. A strong password must have a minimum of 9 characters and must include: two lowercase letters, two digits and two special characters (such as $ and #). An error message displays if you enter an inadequate password.
Note If a strong password is not enabled, a password can be of any length.
Note Passwords defined before a strong password is set are not affected by the strong password setting. Only those passwords that are set after the strong password is set are affected. For example, strong passwords will be required for passwords set later in this script such as the Cisco WCS communication password (as noted in example below) and as passwords expire.
Enter Y to enable and define a Cisco WCS communication password.
Note This password does not define an individual user password for access to the Cisco WCS GUI. This password is used for SOAP/XML authentication between systems (such as mobility services engines) and Cisco WCS.
Enter a password for Cisco WCS communication and confirm it by typing it again. Your typing is not visible.
Note It is recommended that you set a BIOS password to prevent unauthorized BIOS access.
All of the information that was entered into the install script appears on the screen.
After the script configuration appears on the screen, you are asked to verify all the setup information you provided. You can enter Yes to proceed with the configuration, No to make more changes, or ^ to go back to the previous step.
If you enter yes, the configuration information is applied. Cisco recommends that you reboot the system when prompted to ensure that the changes are applied.
Note The message “***Configuration successful*** appears on the screen when the configuration is complete.
The next time you log in using root, only the Linux shell prompt appears and not the setup script. You can rerun the setup script at any time to change settings by logging in as root and running /opt/mse/setup/setup.sh.
The setup script generates a log file that can be found at /opt/mse/setup/setup.log .
You can configure NTP servers to set up the time and date of the mobility services engine.
Note You are automatically prompted to enable NTP and enter NTP server IP addresses as part of the automatic installation script. For more details on the automatic installation script, refer to the “Configuring the Mobility Services Engine” section.
Note If you need to add or change an NTP server installation after a mobility services engine install, rerun the automatic installation script. You can configure the NTP server without adjusting the other values by just tabbing through the script. To rerun the automatic script, log in as root and run /opt/mse/setup/setup.sh.
Note For more information on the NTP configuration, consult the Linux configuration guide.
To configure a mobility services engine to automatically launch after bootup enter:
You can verify the mobility services engine software state at any time. In the mobility services engine CLI interface, enter: /etc/init.d/msed status
If the mobility services engine is running, the command output looks like this example:
If the mobility services engine is not running, the command output looks like this example:
The mobility services engine software automatically runs after initial configuration and after each reboot.
Follow these steps to manually stop and restart the software:
Step 1 To stop the software, enter / etc/init.d/msed stop.
Step 2 To check status enter / etc/init.d/msed status.
Step 3 To start the software, enter: / etc/init.d/msed start.
You can update the mobility services engine using the Cisco WCS or manually download the software using a console port connected to the mobility services engine.
Note For the latest Cisco WCS and mobility services engine compatibility and installation notes for a given release, refer to the appropriate release note at the following link: http://www.cisco.com/en/US/products/ps9742/tsd_products_support_series_home.html
Before downloading and updating software on the mobility services engine, note the following:
Note In release 6.0, the path is Services > Mobility Services.
Note Cisco WCS queries for mobility services engine connectivity and database updates every 5 minutes by default.
To download software to a mobility services engine using Cisco WCS, follow these steps:
Step 1 Verify that you can ping the mobility services engine from Cisco WCS or an external FTP server, whichever you are going to use for the image download.
Step 2 In Cisco WCS, choose Mobility > Mobility Service Engines.
Note In release 6.0, the path is Services > Mobility Services.
Step 3 Click the name of the mobility services engine to which you want to download software.
Step 4 Choose Maintenance (left panel).
Step 5 Choose Download Software.
Step 6 To download software, do one of the following:
Cisco WCS downloads the binary images listed in the drop-down menu into the FTP server directory you have specified during the Cisco WCS installation.
Step 7 Enter the time in seconds (between 1 and1800) after which software download times out.
Note This time out setting represents the total time allowed before a software download to a mobility services engine expires. It is not a FTP packet timeout setting.
Step 8 Click Download to send the software to the /opt/installers directory on the mobility services engine.
Step 9 After the image has been transferred to the mobility service engine, log in to the mobility services engine CLI and run the installer image from the /opt/installers directory by entering the ./image-name command.
Step 10 To run the software, enter /etc/init.d/msed start.
Step 11 To stop the software, enter /etc/init.d/msed stop and to check status enter /etc/init.d/msed status.
If you do not want to automatically update the mobility services engine software using Cisco WCS, follow these steps to upgrade the software manually using a local (console) or remote (SSH) connection.
Step 1 Transfer the new mobility services engine image onto the hard drive.
a. Log in as root, and use the binary setting to send the software image from an external FTP server root directory.
An example software image file name is CISCO-MSE-L-K9-x-x-x-x-64bit.bin.gz and it changes with each release.
Note The mobility services engine image is compressed at this point.
Note The default login name for the FTP server is ftp-user.
b. Verify that the image ( CISCO-MSE-L-K9-x-x-x-x-64bit.bin.gz) is in the mobility services engine /opt/installers directory.
c. To decompress (unzip) the image file enter:
The decompression yields a bin file.
d. Make sure that the CISCO-MSE-L-K9-x-x-x-x.bin file has execute permissions for the root user. If not, enter:
chmod 755 CISCO-MSE-L-K9-x-x-x-x.bin
Step 2 To manually stop the mobility services engine, login as root and enter:
Step 3 To install the new mobility services engine image, enter:
Step 4 To start the new mobility services software, by enter:
Step 5 To uninstall the mobility services engine’s script files, enter:
If you lose or forget the root password for a mobility services engine, follow these steps:
Step 1 When the GRUB screen comes up, press Esc to enter the boot menu.
Note The connection must be made over the console port, not by connecting a keyboard, mouse and monitor to the unit.
Step 3 Navigate to the line beginning with "kernel," and press e.
At the end of the line enter a space and the number one (1). Press Enter to save this change.
Step 4 Press b to begin boot sequence.
At the end of the boot sequence, a shell prompt appears.
Note The shell prompt does not appear if you have set up a single user mode password.
Step 5 You can change the root password by entering the passwd command.
Step 6 Enter and confirm the new password.