IBM Networking Commands
access-expression
To define an access expression, use the access-expression command in interface configuration mode. To remove the access expression from the given interface, use the no form of this command.
access-expression {in | out} expression
no access-expression {in | out} expression
Syntax Description
in | out |
Either in or out is specified to indicate whether the access expression is applied to packets entering or leaving this interface. You can specify both an input and an output access expression for an interface, but only one of each. |
expression |
Boolean access list expression, built as explained in the "Usage Guidelines" section. |
Command Default
No access expression is defined.
Command Modes
Interface configuration (config-if)
Command History
|
|
10.0 |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
Use this command in conjunction with the access-list command in interface configuration mode.
An access expression consists of a list of terms, separated by Boolean operators, and optionally grouped in parentheses.
An access expression term specifies a type of access list, followed by its name or number. The result of the term is either true or false, depending on whether the access list specified in the term permits or denies the frame.
Table 1 describes the terms that can be used.
Table 6 Access Expression Terms
|
|
lsap(2nn) |
Subnetwork Access Protocol access list to be evaluated for this frame (Cisco 200 series). |
type(2nn) |
Subnetwork Access Protocol (SNAP) type access list to be evaluated for this frame (Cisco 200 series). |
smac(7nn) |
Access list to match the source MAC address of the frame (Cisco 700 series). |
dmac(7nn) |
Access list to match the destination MAC address of the frame (Cisco 700 series). |
netbios-host(name) |
NetBIOS-host access list to be applied on NetBIOS frames traversing the interface. |
netbios-bytes(name) |
NetBIOS-bytes access list to be applied on NetBIOS frames traversing the interface. |
Access expression terms are separated by Boolean operators, as listed in Table 2.
Table 7 Boolean Operators for Access Expression Terms
|
|
~ (called "not") |
Negates, or reverses, the result of the term or group of terms immediately to the right of the ~. Example: "~lsap (201)" returns FALSE if "lsap (201)" itself were TRUE. |
& (called "and") |
Returns TRUE if the terms or parenthetical expressions to the left and right of the & both return TRUE. Example: "lsap (201) & dmac (701)" returns TRUE if both the lsap (201) and dmac (701) terms return TRUE. |
| (called "or") |
Returns TRUE if the terms or parenthetical expressions either to the left or to the right of the | or both return TRUE. Example: "lsap (201) | dmac (701)" returns TRUE if either the lsap (201) or dmac (701) terms return TRUE, or if both return TRUE. |
Terms can be grouped in parenthetical expressions. Any of the terms and operators can be placed in parentheses, similar to what is done in arithmetic expressions, to affect order of evaluation.
An "access-expression" type filter cannot exist with a "source-bridge" type filter on the same interface. The two types of filters are mutually exclusive.
Note The incorrect use of parentheses can drastically affect the result of an operation because the expression is read from left to right.
Related Commands
|
|
access-list |
Configures the access list mechanism for filtering frames by protocol type or vendor code. |
access-list
To configure the access list mechanism for filtering frames by protocol type or vendor code, use the access-list command in global configuration mode. To remove the single specified entry from the access list, use the no form of this command.
access-list access-list-number {permit | deny} {type-code wild-mask | address mask}
no access-list access-list-number {permit | deny} {type-code wild-mask | address mask}
Syntax Description
access-list-number |
Integer that identifies the access list. If the type-code and wild-mask arguments are included, this integer ranges from 200 to 299, indicating that filtering is by protocol type. If the address and mask arguments are included, this integer ranges from 700 to 799, indicating that filtering is by vendor code. |
permit |
Permits the frame. |
deny |
Denies the frame. |
type-code |
16-bit hexadecimal number written with a leading 0x; for example, 0x6000. Specify either a Link Service Access Point (LSAP) type code for 802-encapsulated packets or a Subnetwork Access Protocol (SNAP) type code for SNAP-encapsulated packets. (LSAP, sometimes called SAP, refers to the type codes found in the DSAP and SSAP fields of the 802 header.) |
wild-mask |
16-bit hexadecimal number whose ones bits correspond to bits in the type-code argument. The wild-mask argument indicates which bits in the type-code argument should be ignored when making a comparison. (A mask for a DSAP/SSAP pair should always be 0x0101 because these two bits are used for purposes other than identifying the SAP code.) |
address |
48-bit Token Ring address written as a dotted triple of four-digit hexadecimal numbers. This field is used for filtering by vendor code. |
mask |
48-bit Token Ring address written as a dotted triple of four-digit hexadecimal numbers. The ones bits in mask are the bits to be ignored in address. This field is used for filtering by vendor code. For source address filtering, the mask always should have the high-order bit set. This is because the IEEE 802 standard uses this bit to indicate whether a Routing Information Field (RIF) is present, not as part of the source address. |
Command Default
No access list is configured.
Command Modes
Global configuration (config)
Command History
|
|
10.0 |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
For a list of type codes, refer to Appendix: Ethernet Type Codes.
Examples
In the following example, the access list permits only Novell frames (LSAP 0xE0E0) and filters out all other frame types. This set of access lists would be applied to an interface via the source-bridge input-lsap list or source-bridge input-lsap list command (described later in this chapter).
access-list 201 permit 0xE0E0 0x0101
access-list 201 deny 0x0000 0xFFFF
Combine the DSAP/LSAP fields into one number to do LSAP filtering; for example, 0xE0E0—not 0xE0. Note that the deny condition specified in the preceding example is not required; access lists have an implicit deny as the last statement. Adding this statement can serve as a useful reminder, however.
The following access list filters out only SNAP type codes assigned to Digital Equipment Corporation (DEC) (0x6000 to 0x6007) and lets all other types pass. This set of access lists would be applied to an interface using the source-bridge input-type-list or source-bridge output-type-list command (described later in this chapter).
access-list 202 deny 0x6000 0x0007
access-list 202 permit 0x0000 0xFFFF
Note Use the last item of an access list to specify a default action; for example, to permit everything else or to deny everything else. If nothing else in the access list matches, the default action is to deny access; that is, filter out all other type codes.
Type code access lists will negatively affect system performance by greater than 30 percent. Therefore, we recommend that you keep the lists as short as possible and use wildcard bit masks whenever possible.
Related Commands
|
|
access-expression |
Defines an access expression. |
source-bridge input-address-list |
Applies an access list to an interface configured for source-route bridging, and filters source-routed packets received from the device interface based on the source MAC address. |
source-bridge input-lsap-list |
Filters, on input, FDDI and IEEE 802-encapsulated packets that include the DSAP and SSAP fields in their frame formats. |
source-bridge input-type-list |
Filters SNAP-encapsulated packets on input. |
source-bridge output-address-list |
Applies an access list to an interface configured for SRB, and filters source-routed packets sent to the device interface based on the destination MAC address. |
source-bridge output-lsap-list |
Filters, on output, FDDI and IEEE 802-encapsulated packets that have DSAP and SSAP fields in their frame formats. |
source-bridge output-type-list |
Filters SNAP-encapsulated frames by type code on output. |
access-list (extended-ibm)
To provide extended access lists that allow more detailed access lists, use the access-list command in global configuration mode. These lists allow you to specify both source and destination addresses and arbitrary bytes in the packet.
access-list access-list-number {permit | deny} source source-mask destination destination-mask offset size operator operand
Syntax Description
access-list-number |
Integer from 1100 to 1199 that you assign to identify one or more permit/deny conditions as an extended access list. Note that a list number in the range from 1100 to 1199 distinguishes an extended access list from other access lists. |
permit |
Allows a connection when a packet matches an access condition. The Cisco IOS software stops checking the extended access list after a match occurs. All conditions must be met to make a match. |
deny |
Disallows a connection when a packet matches an access condition. The software stops checking the extended access list after a match occurs. All conditions must be met to make a match. |
source |
MAC Ethernet address in the form xxxx.xxxx.xxxx. |
source-mask |
Mask of MAC Ethernet source address bits to be ignored. The software uses the source and source-mask arguments to match the source address of a packet. |
destination |
MAC Ethernet value used for matching the destination address of a packet. |
destination-mask |
Mask of MAC Ethernet destination address bits to be ignored. The software uses the destination and destination mask arguments to match the destination address of a packet. |
offset |
Range of values that must be satisfied in the access list. Specified in decimal or in hexadecimal format in the form 0xnn. The offset is the number of bytes from the destination address field; it is not an offset from the start of the packet. The number of bytes you need to offset from the destination address varies depending on the media encapsulation type you are using. |
size |
Range of values that must be satisfied in the access list. Must be an integer from 1 to 4. |
operator |
Compares arbitrary bytes within the packet. Can be one of the following keywords: lt—less than gt—greater than eq—equal neq—not equal and—bitwise and xor—bitwise exclusive or nop—address match only |
operand |
Compares arbitrary bytes within the packet. The value to be compared to or masked against. |
Command Default
No extended access lists are established.
Command Modes
Global configuration (config)
Command History
|
|
10.0 |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
After an access list is initially created, any subsequent additions (possibly entered from the terminal) are placed at the end of the list. In other words, you cannot selectively add or remove access list command lines from a specific access list.
An extended access list should not be used on FDDI interfaces that provide transit bridging.
There is not a no form for this command.
Note Due to their complexity, extended access lists should only be used by those who are very familiar with the Cisco IOS software. For example, to use extended access lists, it is important to understand how different encapsulations on different media would generally require different offset values to access particular fields.
Caution
Do not specify offsets into a packet that are greater than the size of the packet.
Examples
The following example shows an extended access list. The first access-list command permits packets from MAC addresses 000c.1bxx.xxxx to any MAC address if the packet contains a value less than 0x55AA in the 2 bytes that begin 0x1e bytes into the packet. The seconds access-list command permits an NOP operation:
access-list 1102 permit 000c.1b00.0000 0000.00ff.ffff 0000.0000.0000
ffff.ffff.ffff 0x1e 2 lt 0x55aa
access-list 1101 permit 0000.0000.0000 ffff.ffff.ffff 0000.0000.0000
ffff.ffff.ffff
interface ethernet 0
bridge-group 3 output-pattern 1102
The following is sample output from the show interfaces crb command for the access list configured above:
Device# show interfaces crb
Bridged protocols on Ethernet0/3:
Software MAC address filter on Ethernet0/3
Hash Len Address Matches Act Type
0x00: 0 ffff.ffff.ffff 0 RCV Physical broadcast
0x00: 1 ffff.ffff.ffff 0 RCV Appletalk zone
0x2A: 0 0900.2b01.0001 0 RCV DEC spanning tree
0x49: 0 0000.0c36.7a45 0 RCV Interface MAC address
0xc0: 0 0100.0ccc.cccc 48 RCV CDP
0xc2: 0 0180.c200.0000 0 RCV IEEE spanning tree
0xF8: 0 0900.07ff.ffff 0 RCV Appletalk broadcast
Table 3 describes significant fields shown in the display.
Table 8 show interfaces crb Field Descriptions
|
|
Bridged protocols on... |
List of the bridged protocols configured for the specified interface. |
Software MAC address filter on... |
Table of software MAC address filter information for the specified interface. |
Hash |
Hash key/relative position in the keyed list for this MAC-address entry. |
Len |
Length of this entry to the beginning element of this hash chain. |
Address |
Canonical (Ethernet ordered) MAC address. |
Matches |
Number of received packets matched to this MAC address. |
Act |
Action to be taken when that address is looked up; choices are to receive or discard the packet. |
Type |
MAC address type. |
Related Commands
|
|
access-list (standard-ibm) |
Establishes MAC address access lists. |
access-list (type-code-ibm) |
Builds type-code access lists. |
bridge-group output-pattern-list |
Associates an extended access list with a particular interface. |
access-list (standard-ibm)
To establish a MAC address access list, use the access-list command in global configuration mode. To remove access list, use the no form of this command.
access-list access-list-number {permit | deny} address mask
no access-list access-list-number
Syntax Description
access-list-number |
Integer from 700 to 799 that you select for the list. |
permit |
Permits the frame. |
deny |
Denies the frame. |
address mask |
48-bit MAC addresses written as a dotted triple of four-digit hexadecimal numbers. The ones bits in the mask argument are the bits to be ignored in address. |
Command Default
No MAC address access lists are established.
Command Modes
Global configuration (config)
Command History
|
|
10.0 |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
Configuring bridging access lists of type 700 may cause a momentary interruption of traffic flow.
Examples
The following example assumes that you want to disallow the bridging of Ethernet packets of all Sun workstations on Ethernet interface 1. Software assumes that all such hosts have Ethernet addresses with the vendor code 0800.2000.0000. The first line of the access list denies access to all Sun workstations, and the second line permits everything else. You then assign the access list to the input side of Ethernet interface 1.
access-list 700 deny 0800.2000.0000 0000.00FF.FFFF
access-list 700 permit 0000.0000.0000 FFFF.FFFF.FFFF
bridge-group 1 input-address-list 700
Related Commands
|
|
access-list (type-code-ibm) |
Builds type-code access lists. |
access-list (type-code-ibm)
To build type-code access lists, use the access-list command in global configuration mode. To remove the access list, use the no form of this command.
access-list access-list-number {permit | deny} type-code wild-mask
no access-list access-list-number
Syntax Description
access-list-number |
User-selectable number from 200 to 299 that identifies the list. |
permit |
Permits the frame. |
deny |
Denies the frame. |
type-code |
16-bit hexadecimal number written with a leading "0x"; for example, 0x6000. You can specify either an Ethernet type code for Ethernet-encapsulated packets, or a destination service access point (DSAP)/source service access point (SSAP) pair for 802.3 or 802.5-encapsulated packets. Ethernet type codes are listed in the appendix "Ethernet Type Codes." |
wild-mask |
16-bit hexadecimal number whose ones bits correspond to bits in the type-code argument that should be ignored when making a comparison. (A mask for a DSAP/SSAP pair should always be at least 0x0101 because these two bits are used for purposes other than identifying the SAP codes.) |
Command Default
No type-code access lists are built.
Command Modes
Global configuration (config)
Command History
|
|
10.0 |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
Type-code access lists can have negatively affect system performance; therefore, keep the lists as short as possible and use wildcard bit masks whenever possible.
Access lists are evaluated according to the following algorithm:
•If the packet is Ethernet Type II or SNAP, the type-code field is used.
•If the packet is another type, then the LSAP is used.
Packets are treated according to the following algorithm:
•If the length/type field is greater than 1500, the packet is treated as an Advanced Research Projects Agency (ARPA) packet.
•If the length/type field is less than or equal to 1500, and the DSAP and SSAP fields are AAAA, the packet is treated using type-code filtering.
•If the length/type field is less than or equal to 1500, and the DSAP and SSAP fields are not AAAA, the packet is treated using Link Service Access Point (LSAP) filtering.
If the LSAP-code filtering is used, all SNAP and Ethernet Type II packets are bridged without obstruction. If type-code filtering is used, all LSAP packets are bridged without obstruction.
If you have both Ethernet Type II and LSAP packets on your network, you should set up access lists for both.
Examples
The following example shows how to permit only local-area transport (LAT) frames (type 0x6004) and filters out all other frame types:
access-list 201 permit 0x6004 0x0000
The following example shows how to filter out only type codes assigned to Digital Equipment Corporation (DEC) (0x6000 to 0x600F) and lets all other types pass:
access-list 202 deny 0x6000 0x000F
access-list 202 permit 0x0000 0xFFFF
Use the last item of an access list to specify a default action; for example, permit everything else or deny everything else. If nothing else in the access list matches, the default action is normally to deny access; that is, filter out all other type codes.
Related Commands
|
|
access-list (standard-ibm) |
Establishes MAC address access lists. |
adapter
To configure internal adapters, use the adapter command in internal LAN interface configuration submode. To remove an internal adapter, use the no form of this command.
adapter adapter-number [mac-address] [hsma-partner hsma-mac-address]
no adapter adapter-number [mac-address]
Syntax Description
adapter-number |
Number in the range from 0 to 31 that uniquely identifies the internal adapter (relative adapter number) for all internal LANs of the same type on the Cisco Mainframe Channel Connection (CMCC) adapter. In Cisco Systems Network Architecture (CSNA), this value corresponds to the adapter number (ADAPNO) parameter defined in the Virtual Telecommunications Access Method (VTAM) Extended Communications Adapter (XCA) Major Node. |
mac-address |
(Optional) MAC address for this internal adapter. This is a hexadecimal value in the form xxxx.xxxx.xxxx. |
hsma-partner |
(Optional) Specifies a hot standby MAC address (HSMA) partner. |
hsma-mac-address |
(Optional) MAC address of the HSMA partner control adapter. |
Command Default
No default behavior or values.
Command Modes
Internal LAN interface configuration
Command History
|
|
11.0 |
This command was introduced. |
12.3(3) |
The hsma-partner keyword and hsma-mac-address argument were added. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command is valid only on the virtual channel interface. Internal adapters are used to provide LAN gateway MAC addresses for the following CMCC adapter features: CSNA, Cisco Multipath Channel (CMPC), and TN3270 Server.
Up to 18 internal adapters can be configured on a CMCC adapter. Internal adapters are configured on internal LANs. The only limit to the number of internal adapters that you can configure on a single internal LAN is the limit of up to 18 total internal adapters per CMCC.
When an internal adapter configuration command is removed or an existing internal adapter is modified, the mac-address parameter is not required. In internal adapter configuration mode, the device prompt appears as follows:
Device(cfg-adap-type n-m)#
In this syntax, type is the internal LAN type, n is the LAN ID, and m is the adapter number.
HSMA is designed to allow redundant CMCC internal adapter MAC addresses in an Ethernet environment. Communication between the HSMA control adapters is used to ensure that only one of the adapters is active at a time.
Examples
The following example shows how to configure internal adapters 3 and 4 (with their corresponding MAC addresses) on the internal Token Ring LAN number 20, and internal adapter 1 on the internal Token Ring LAN number 10:
The following example shows how to configure internal adapter 9 to communicate with the HSMA partner at the MAC address 4043.3333.001a:
adapter 9 4043.1313.9009 hsma-partner 4043.3333.001a
adapter 26 4043.1111.001a
Related Commands
|
|
lan |
Configures an internal LAN on a CMCC adapter interface and enters the internal LAN configuration mode. |
name |
Assigns a name to an internal adapter. |
show extended channel hsma |
Displays hot standby MAC address (HSMA) information |
show extended channel lan |
Displays the internal LANs and adapters configured on a CMCC adapter. |
show extended channel llc2 |
Displays information about the LLC2 sessions running on CMCC adapter interfaces. |
show extended channel connection-map llc2 |
Displays the number of active LLC2 connections for each SAP and the mapping of the internal MAC adapter and the SAP to the resource that activated the SAP. |
source-bridge |
Configures an interface for SRB. |
allocate lu
To assign logical unit (LU)s to a pool, use the allocate lu command in listen-point physical unit (PU) configuration submode. To remove LUs assigned to a pool, use the no form of this command.
allocate lu lu-address pool poolname clusters count
no allocate lu lu-address pool poolname clusters count
Syntax Description
lu-address |
Starting number of the LOCADDR to which a cluster of LUs are to be allocated. |
pool poolname |
Pool name to which you want to allocate LUs. The pool name cannot exceed eight characters in length. |
clusters count |
Range of LUs in a cluster that are allocated to the specified pool. For example, if the lu keyword specifies the beginning of the LOCADDR number, the cluster keyword specifies the number of clusters to be included in the pool. |
Command Default
No LUs are assigned to a pool.
Command Modes
Listen-point PU configuration
Command History
|
|
11.2(18)BC |
This command was introduced. |
12.0(5)T |
This command was integrated into Cisco IOS Release 12.0(5)T. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The following guidelines apply to the allocate lu command:
•The LUs assigned to a pool constitute a cluster. When multiple pools are configured, the LU ranges for different pools on the same PU must not overlap.
•A maximum of 255 LOCADDRs can be allocated to a pool. Configurations with invalid LOCADDRs are deleted. Overlapping LU ranges between different pools are invalid.
•The LOCADDR ranges must not overlap for multiple allocation statements and with existing ranges specified for client nailing statements.
•When LUs are allocated while LUs are in use, existing clients are allowed to complete their sessions unaffected.
Examples
In the following example, the starting LOCADDR is 10. Each cluster has 10 LOCADDRs, therefore 50 LOCADDRs are allocated to the pool name LOT1.
pool LOT1 cluster layout 4s1p
allocate lu 10 pool LOT1 clusters 5
As a result of this configuration, the following LOCADDRs are created in each cluster:
•Cluster 1
–LOCADDR 10—Screen
–LOCADDR 11—Screen
–LOCADDR 12—Screen
–LOCADDR 13—Screen
–LOCADDR 14—Printer
•Cluster 2
–LOCADDR 15—Screen
–LOCADDR 16—Screen
–LOCADDR 17—Screen
–LOCADDR 18—Screen
–LOCADDR 19—Printer
All of the LUs in these clusters are allocated to pool LOT1.
Related Commands
|
|
pool |
Defines pool names for the TN3270 server and specifies the number of screens and printers in each logical cluster. |
pu (TN3270) |
Creates a PU entity that has its own direct link to a host and enters PU configuration mode. |
pu dlur (listen-point) |
Creates a PU entity that has no direct link to a host and enters listen-point PU configuration mode. |
tn3270-server |
Starts the TN3270 server on a CMCC adapter and enters TN3270 server configuration mode. |
alps a1-map a2-map
To specify the A1 and A2 logical agent-set control unit (ASCU) identification information, use the alps a1-map a2-map command in Airline Product Set (ALPS) ASCU configuration submode. To remove the specification of the A1 and A2 logical ASCU identification information, use the no form of this command.
alps a1-map a1-value a2-map a2-value
no alps a1-map a1-value a2-map a2-value
Syntax Description
a1-value |
A1 logical ASCU identification: •airline link control (ALC) range—Hexadecimal number in the range from 0 to 0xFF. •Unisys Terminal System (UTS) range—Hexadecimal number in the range from 0 to 0xFF. |
a2-value |
A2 logical ASCU identification: •ALC range—Hexadecimal number in the range from 0 to 0xFF. •UTS range—Hexadecimal number in the range from 0 to 0xFF. |
Command Default
No A1 and A2 logical ASCU identification information is specified.
Command Modes
ALPS ASCU submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.0(2)T |
The range values were modified. |
12.0(5)T |
The range values were modified. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies the A1 identification as 0x4C and the A2 identification as 0x20:
Related Commands
|
|
encapsulation uts |
Specifies that the P1024C UTS protocol will be used on the serial interface. |
alps alias
To specify that an airline link control (ALC) agent-set control unit (ASCU) is to operate in nonpolling mode, and to specify the parent ASCU interchange address to which this ASCU is aliased, use the alps alias command in Airline Product Set (ALPS) ASCU configuration submode. To return the ASCU to polled mode, use the no form of this command.
alps alias alias-interchange-address
no alps alias alias-interchange-address
Syntax Description
alias-interchange-address |
Specifies the interchange address of the polled (alias) ASCU with which to associate this non-polled ASCU. Valid range is between 41 and 7E, except 43, 44, 50 to 53, and 60. |
Command Default
If you do not specify the alps alias command, the ASCU functions in normal polled mode. You must specify the alps alias command to enable non-polled handling.
Command Modes
ALPS ASCU configuration
Command History
|
|
12.1(3)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command applies only to ALC ASCUs.
By default, an ALC ASCU cannot send data to a remote device until it is polled by that device. However, you can use this command to configure non-polled ALC ASCUs.
A non-polled ASCU must be associated with another, polled ASCU, known as the alias ASCU. When a remote device polls the alias ASCU, the device accepts data from that ASCU and from all non-polled ASCUs associated with that ASCU. The non-polled ASCUs present the same characteristics to the host as the alias ASCU, so the current ASCU configuration is maintained.
This command does not impact the ALC send path or the circuit management code.
Examples
The following example sets the ALC ASCU with interchange address 4B to operate in nonpolling mode and sets 42 as the alias interchange address:
Related Commands
|
|
alps ascu |
Specifies a physical ASCU identity. |
show alps ascu |
Displays the status of the ALPS ASCU. |
alps ascu
To specify a physical agent-set control unit (ASCU) identity, use the alps ascu command in Airline Product Set (ALPS) ASCU configuration submode. To remove the ASCU from the interface and delete any messages queued for transmission to the ASCU or the network, use the no form of this command.
alps ascu id
no alps ascu id
Syntax Description
id |
ASCU identification. Valid range is from 41 to 7E, except 43, 44, 50 to 53, and 60. The Unisys Terminal System (UTS) valid range is from 21 to 4F. |
Command Default
No physical ASCU identity is specified.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.0(2)T |
This command was modified for UTS support. |
12.1(2)T |
The valid range values were modified. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If an ASCU already exists on the interface, the alps ascu command initiates the ALPS ASCU configuration submode for that ASCU. If the ASCU does not exist, an ASCU is created and the ALPS ASCU configuration submode is initiated.
Examples
The following example specifies the interchange address as 4B:
Related Commands
|
|
encapsulation uts |
Specifies that the P1024C UTS protocol is used on the serial interface. |
encapsulation alc |
Specifies that the P1024B airline link control (ALC) protocol is used on the serial interface. |
alps auto-reset
To automatically reset a nonresponsive airline link control (ALC) agent-set control unit (ASCU) in the DOWN state, use the alps auto-reset command in Airline Product Set (ALPS) ASCU configuration submode. To disable the automatic reset, use the no form of this command.
alps auto-reset
no alps auto-reset
Syntax Description
This command has no arguments or keywords.
Command Default
Automatic ASCU reset is disabled by default.
Command Modes
ALPS ASCU configuration submode
Command History
|
|
12.1(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command applies only to ALC ASCUs.
Examples
The following example shows how to configure automatic reset for all nonresponsive ASCUs in the DOWN state:
Related Commands
|
|
alps ascu |
Specifies a physical ASCU identity. |
encapsulation alc |
Specifies that the P1024B ALC protocol is used on the serial interface. |
alps circuit
To specify an Airline Product Set (ALPS) circuit at the remote customer premises equipment (CPE) across a TCP/IP connection, use the alps circuit command in ALPS circuit configuration submode. To remove the circuit definition from the configuration, send a close message on the ALPS circuit, and delete any queued messages for the circuit, use the no form of this command.
alps circuit name
no alps circuit name
Syntax Description
name |
Name given to identify an ALPS circuit. |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
Entering this command causes a circuit control block to be created. The command also initiates the ALPS circuit configuration submode. If the circuit already exists, the only action is the initiation of the ALPS circuit configuration submode.
Note that this command is used to statically create an ALPS circuit at the remote CPE. ALPS X.25 circuits (at the central CPE) are always dynamically created and are never created using this command.
Examples
The following example specifies the name of the ALPS circuit at the remote CPE as CKT1:
Related Commands
|
|
show alps circuits |
Displays the status of the ALPS circuits. |
alps connection-type permanent
To specify that this circuit should be established when the circuit is enabled, use the alps connection-type permanent command in Airline Product Set (ALPS) circuit configuration submode. To remove the permanent activation behavior and return the behavior to the default dynamic activation, use the no form of this command.
alps connection-type permanent [retry-timer]
no alps connection-type permanent [retry-timer]
Syntax Description
retry-timer |
(Optional) Specifies the maximum interval between consecutive attempts to establish a circuit in the event of a failure. The default for the retry timer is 30 seconds and the range is from 1 to 180 seconds. |
Command Default
The default is 30 seconds.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies that the circuit is established when enabled and that the customer premises equipment (CPE) will retry the connection every 30 seconds in the event of a failure:
alps connection-type permanent 30
Related Commands
|
|
show alps circuits |
Displays the status of the ALPS circuits. |
alps default-circuit
To specify the Airline Product Set (ALPS) circuit that this agent-set control unit (ASCU) uses, use the alps default-circuit command in ALPS ASCU submode. To remove the default circuit specification, use the no form of this command.
alps default-circuit name
no alps default-circuit name
Syntax Description
name |
Name given to identify an ALPS circuit on the remote customer premises equipment (CPE). |
Command Default
No default behavior or values.
Command Modes
ALPS ASCU submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example shows how to specify that ALPS circuit to be used is CKT1:
alps default-circuit CKT1
Related Commands
|
|
show alps circuits |
Displays the status of the ALPS circuits. |
alps enable-alarms ascu
To enable alarms for the Airline Product Set (ALPS) agent-set control unit (ASCU)s, use the alps enable-alarms ascu command in global configuration mode at the remote customer premises equipment (CPE). To disable alarms for the ALPS ASCUs, use the no form of this command.
alps enable-alarms ascu [interface id]
no alps enable-alarms ascu
Syntax Description
interface id |
(Optional) ASCU identifier. Enable alarms for the specified ASCU. |
Command Default
If no interface and interchange address combination is specified, then alarms (Syslog messages and SNMP traps) are enabled for all ALPS ASCUs.
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If an interface and interchange address combination is specified, then the alarms are enabled only for the ASCU matching that combination. Up to eight alps enable-alarms ascu commands can be entered to allow a set of ALPS ASCUs to be monitored. ALPS ASCU alarms are generated only at the remote CPE.
Examples
The following example enables alarms for ALPS ASCU 42 on serial interface 1:
alps enable-alarms ascu Serial1 42
Related Commands
|
|
encapsulation uts |
Specifies that the P1024C UTS protocol will be used on the serial interface. |
alps enable-alarms circuit
To enable alarms for the Airline Product Set (ALPS) circuits, use the alps enable-alarms circuit command in global configuration mode. To remove the circuit definition from the configuration, use the no form of this command.
alps enable-alarms circuit [name]
no alps enable-alarms circuit [name]
Syntax Description
name |
(Optional) Name given to identify an ALPS circuit on the remote customer premises equipment (CPE). |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If a valid circuit name is specified, then the alarms are enabled only for the circuit matching the name. Up to eight alps enable-alarms circuit commands can be entered to allow a subset of ALPS circuits to be monitored. ALPS circuit alarms are generated at both the remote airline link control (ALC) CPE and the central (X.25) CPE.
Examples
The following example enables alarms for the ALPS circuit named CKT1:
alps enable alarms circuit CKT1
Related Commands
|
|
show alps circuits |
Displays the status of the ALPS circuits. |
alps enable-alarms peer
To enable alarms for the Airline Product Set (ALPS) peers, use the alps enable-alarms peer command in global configuration mode. To remove the circuit definition from the configuration, send a close message on the ALPS circuit, and delete any queued messages for the circuit, use the no form of this command.
alps enable-alarms peer [ip-address]
no alps enable-alarms peer [ip-address]
Syntax Description
ip-address |
(Optional) IP address of the remote peer for which alarms are enabled. |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If an IP address is specified, then the alarms are enabled only for the remote peer matching the IP address. Up to eight alps enable-alarms peer commands can be entered to allow a set of ALPS peers to be monitored. ALPS peer alarms are generated at both the remote and the central customer premises equipment (CPE).
Examples
The following example enables alarms for the ALPS peer at IP address 172.22.0.91:
alps enable alarms peer 172.22.0.91
Related Commands
|
|
show alps peers |
Displays the status of the ALPS partner peers. |
alps enable-ascu
To move the previously defined agent-set control unit (ASCU) from the inactive poll list to the active poll list, use the alps enable-ascu command in Airline Product Set (ALPS) ASCU configuration submode. This move results in the protocol handler polling the ASCU and rendering it ready for handling terminal traffic. To remove the ASCU from the active poll list to the inactive poll list, use the no form of this command. This action prevents the ASCU from being polled, rendering it not ready for handling terminal traffic.
alps enable-ascu
no alps enable-ascu
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command Modes
ALPS ASCU submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example moves the ASCU to the active poll list:
Related Commands
|
|
encapsulation uts |
Specifies that the P1024C UTS protocol will be used on the serial interface. |
alps enable-circuit
To enable the circuit to be activated when data is received from an agent-set control unit (ASCU), use the alps enable-circuit command in Airline Product Set (ALPS) circuit configuration submode. To disable the circuit, use the no form of this command.
alps enable-circuit
no alps enable-circuit
Syntax Description
This command has no arguments or keywords.
Command Default
The circuit is disabled by default.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies the circuit to be activated when data is received from an ASCU:
Related Commands
|
|
show alps circuits |
Displays the status of the ALPS circuits. |
alps error-display
To specify where error messages about service availability or network problems are displayed, use the alps error-display command in Airline Product Set (ALPS) agent-set control unit (ASCU) configuration submode. To return to the default values, use the no form of this command.
alps error-display number1 number2
no alps error-display number1 number2
Syntax Description
number1 |
For P1024B airline link control (ALC), specifies the terminal address where these service messages are sent. Valid numbers are hexadecimal numbers in the range from 0x40 to 0x7F. The default address is 0x72. For P1024C Unisys Terminal System (UTS), specifies the screen line number where service messages are displayed. Valid numbers are hexadecimal numbers in the range from 0x00 to 0x7F. The default line number is 0x37. |
number2 |
For P1024B ALC, specifies the screen line number where service messages are displayed. Valid numbers are hexadecimal numbers in the range from 0x40 to 0x7F. The default screen line number is 0x66. For P1024C UTS, specifies the column number where service messages are displayed. Valid numbers are hexadecimal numbers in the range from 0x00 to 0x7F. The default column number is 0x20. |
Command Default
The default terminal address for P1024B ALC is 0x72.
The default screen line for P1024B ALC is 0x20.
The default line number for P1024C UTS is 0x37.
The default column number for P1024C UTS is 0x20.
Command Modes
ALPS ASCU submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies that error messages are displayed at terminal address 6d, on screen line number 78:
Related Commands
|
|
encapsulation uts |
Specifies that the P1024C UTS protocol will be used on the serial interface. |
alps host-hld host-link
To enable Airline Product Set (ALPS) on the X.25 interface, use the alps host-hld host-link command in interface configuration mode. To disable ALPS on the X.25 interface, use the no form of this command.
alps host-hld hld host-link number {ax25 [damp-tmr value] | emtox x.121 [pseudo-conv]} [life-tmr value] [reply-tmr value]
no alps host-hld hld host-link number {{ax25 [damp-tmr value]} | {emtox x.121 [pseudo-conv]}} [life-tmr value] [reply-tmr value]
Syntax Description
hld |
Host high-level designator. A hexadecimal number in the range from 1 to 7f7f. |
number |
Host-link identifier. A number in the range from 1 to 255. |
ax25 |
Specifies airline X.25 implementation of X.25. |
damp-tmr value |
(Optional) Specifies the AX.25 permanent virtual circuit (PVC) damping timer. The value argument is the length of time that a PVC can be inactive before it is destroyed and the corresponding ALPS circuits are closed. The default is 10 seconds. |
emtox |
Specifies EMTOX implementation of X.25. |
x.121 |
X.121 address of the EMTOX host (called address on calls to the EMTOX host). |
pseudo-conv |
(Optional) Specifies the pseudo-conversational format of EMTOX packets. |
life-tmr value |
(Optional) Specifies the maximum amount of time (in seconds) that a message may be queued for sending to the host X.25 system before it is discarded. The value argument is time (in seconds). |
reply-tmr value |
(Optional) Specifies the duration of the no-reply timer. If the X.2 line is idle for this duration, and the X.25 transmit window is full, then ALPS sends an X.25 reset message on the virtual circuit to reset the transmit/receive windows. The no-reply timer can be configured for 10 to 600 seconds. |
Command Default
The default damping timer value is 10 seconds.
The default no-reply timer value is 60 seconds.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example shows how to enable ALPS on the X.25 interface:
alps host-hld 1 host-link 1 emtox
alps hostlink
To specify information required to establish an X.25 virtual circuit at the central customer premises equipment (CPE), use the alps hostlink command in Airline Product Set (ALPS) circuit configuration submode. To remove the circuit definition from the configuration, send a close message on the ALPS circuit, and delete any queued messages for the circuit, use the no form of this command.
alps hostlink number {ax25 lcn | emtox x121-address} [winout val1] [winin val2] [ops val3] [ips val4]
no alps hostlink number {ax25 lcn | emtox x121-address} [winout val1] [winin val2] [ops val3] [ips val4]
Syntax Description
number |
Interface at the host CPE. Decimal number in the range from 1 to 255. |
ax25 |
Specifies airline X.25 implementation of X.25. |
lcn |
Local channel number for AX.25 connections. |
emtox |
Specifies EMTOX implementation of X.25. |
x121-address |
X.121 address for EMTOX connections. This is the X.121 calling address for X.25 call packets sent from the central CPE to the EMTOX host. This address is the source address in a call to the host. |
winout val1 |
(Optional) Specifies the X.25 send window The val1 argument is a decimal number in the range from 1 to 7. |
winin val2 |
(Optional) Specifies the X.25 receive window. The val2 argument is a decimal number in the range from 1 to 7. |
ops val3 |
(Optional) Specifies the maximum output packet size. The val3 argument is one of the following numbers: 128, 240, 256, 512, 1024, 2048, or 4096. |
ips val4 |
(Optional) Specifies the maximum input packet size. The val4 argument is one of the following numbers: 128, 240, 256, 512, 1024, 2048, or 4096. |
Command Default
If no values are specified, the default values at the X.25-attached central CPE are used.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example establishes an X.25 virtual circuit at the central CPE. The configuration specifies airline X.25 implementation. The host CPE interface is 3, the local channel number for airline X.25 connections is 120, and the X.25 send window is 3.
alps hostlink 3 ax25 120 winout 3 winin 3
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive ALC ASCU in the DOWN state. |
show alps circuits |
Displays the status of the ALPS circuits. |
alps idle-timer
To specify (for dynamic circuits) the length of time that can elapse before an idle circuit is disabled, use the alps idle-timer command in Airline Product Set (ALPS) circuit configuration submode. To return to the default idle-timer value, use the no form of this command.
alps idle-timer timer
no alps idle-timer timer
Syntax Description
timer |
Length of time that can elapse before an idle circuit is brought down. The range is from 10 to 600 seconds. The default is 60 seconds. |
Command Default
The default length of time that can elapse before an idle circuit is brought down is 60 seconds.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies that an idle circuit is maintained for 90 seconds before it is disabled:
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive ALC ASCU in the DOWN state. |
show alps circuits |
Displays the status of the ALPS circuits. |
alps keepalive
To enable TCP keepalives for Airline Product Set (ALPS) TCP peer connections, use the alps keepalive command in global configuration mode. A TCP keepalive request will be sent to the remote peer if the TCP connection to the remote peer is silent for a time period larger than the interval specified. The TCP connection to the ALPS host will be closed when a count equal to the retry count specified is missed consecutively. To disable keepalives for ALPS, use the no form of this command.
alps keepalive [interval time] [retry count]
no alps keepalive [interval time] [retry count]
Syntax Description
interval time |
(Optional) Interval for keepalive requests. The time argument is the keepalive interval, in the range from 10 to 300 seconds. The default is 30 seconds. |
retry count |
(Optional) Indicates how many times keepalive requests will be sent before the connection is closed. The count argument is the retry count, in the range from 1 to 10. The default is three retries. |
Command Default
The default keepalive interval is 30 seconds.
The default retry count is 3.
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies that a TCP keepalive request will be sent to the remote peer if the TCP peer connection is idle for 60 seconds. The connection will be closed after three consecutive keepalive requests are sent.
alps keepalive interval 60 retry 8
Related Commands
|
|
alps local-peer |
Specifies the IP address of the local peer. |
alps lifetime-timer
To specify how long messages can be queued in the Airline Product Set (ALPS) circuit queue awaiting transmission to the central customer premises equipment (CPE), use the alps lifetime-timer command in ALPS circuit configuration submode. To return to the default lifetime-timer value, use the no form of this command.
alps lifetime-timer timer
no alps lifetime-timer timer
Syntax Description
timer |
Length of time, in seconds, that a message can be queued. The range is from 1 to 20 seconds. The default is 4 seconds. |
Command Default
The default length of time that a message can be queued in the ALPS circuit queue is 4 seconds.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
Messages that exceed the timer limit are discarded.
Examples
The following example specifies that a message remains in the ALPS circuit queue for no longer than 3 seconds:
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive ALC ASCU in the DOWN state. |
show alps circuits |
Displays the status of the ALPS circuits. |
alps local-hld remote-hld
To specify the local and remote high-level designator (HLD)s to use for this Airline Product Set (ALPS) circuit, use the alps local-hld remote-hld command in ALPS circuit configuration submode. To remove the definition from the configuration, use the no form of this command.
alps local-hld loc-hld remote-hld rem-hld
no alps local-hld loc-hld remote-hld rem-hld
Syntax Description
loc-hld |
Local HLD to use for ALPS circuit. Hexadecimal number in the range from 1 to FFFF. |
rem-hld |
Remote HLD to use for ALPS circuit. Hexadecimal number in the range from 1 to FFFF. |
Command Default
No default behavior or values.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.0(5)T |
This command was modified and the remote-hld keyword was not applicable for mapping of airline traffic over IP (MATIP). |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The remote-hld keyword is not applicable for ALPS with MATIP.
Examples
The following example specifies the local HLD as 4B10:
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive airline link control (ALC) ASCU in the DOWN state. |
show alps circuits |
Displays the status of the ALPS circuits. |
alps local-peer
To specify the IP address of the local peer, use the alps local-peer command in global configuration mode. To remove all subsequent Airline Product Set (ALPS) configuration commands from the device, use the no form of this command.
alps local-peer ip-address [promiscuous]
no alps local-peer ip-address [promiscuous]
Syntax Description
ip-address |
IP address of the local peer. |
promiscuous |
(Optional) Keyword specified at the central customer premises equipment (CPE) to accept incoming TCP connections from any remote customer premises equipment (CPE). |
Command Default
No default behavior or values.
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies the local peer IP address as 172.22.0.91 and specifies that the CPE accepts incoming TCP connections from any CPE:
alps local-peer 172.22.0.91 promiscuous
Related Commands
|
|
show alps peers |
Displays the status of the ALPS partner peers. |
alps matip-close-delay
To specify the interval between the closing and reopening of mapping of airline traffic over IP (MATIP) circuit connections, use the alps matip-close-delay command in Airline Product Set (ALPS) circuit configuration submode circuit submode command. To restore the definition to the default value, use the no form of this command.
alps matip-close-delay time
no alps matip-close-delay time
Syntax Description
time |
Minimum number of seconds between the closing and reopening of an ALPS MATIP circuit. The range is from 1 to 90 seconds. The default is 10 seconds. |
Command Default
The default value is 10 seconds.
Command Modes
ALPS circuit submode
Command History
|
|
12.0(5)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies a close delay time of 20 seconds:
alps matip-close-delay 20
Related Commands
|
|
show alps circuits |
Displays the status of the ALPS circuits. |
alps max-msg-length
To specify maximum input message length, use the alps max-msg-length command in Airline Product Set (ALPS) agent-set control unit (ASCU) configuration submode. To return to the default maximum input message length, use the no form of this command.
alps max-msg-length value
no alps max-msg-length value
Syntax Description
value |
Maximum input message length. The range is from 1 to 3840. The default is 962 characters. |
Command Default
The default maximum input message length is 962 characters.
Command Modes
ALPS ASCU submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies that the maximum length of a message is 1000 characters:
alps mpx
To specify the multiplexing and the agent-set control unit (ASCU) identification header for this circuit, use the alps mpx command in Airline Product Set (ALPS) ASCU configuration submode. To remove the definition from the configuration, use the no form of this command.
alps mpx {group | single} hdr {a1a2 | none}
no alps mpx {group | single} hdr {a1a2 | none}
Syntax Description
group |
Specifies that multiple ASCUs will be multiplexed on the ALPS circuit. This setting is the default. |
single |
Specifies that only one ASCU will use this circuit. |
hdr |
Specifies the ASCU identification header for the circuit. The default is a1a2. |
a1a2 |
ASCU identification via A1, A2. |
none |
No ASCU identification. |
Command Default
The default for multiplexing is group.
The default header is a1a2.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.0(1) |
This command was available for general release. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If the alps mpx group command is specified, multiple ASCUs will be multiplexed on this ALPS circuit and the none option is not applicable. If the alps mpx single command is specified, then only one ASCU uses this ALPS circuit. If alps mpx single hdr none command is specified, the A1 and A2 ASCU identification information is not added to the front of data frames sent across this circuit, and it is assumed that it does not exist in frames received on this circuit. The exclusion of ASCU identification should be specified only when the EMTOX protocol is used.
Examples
The following example shows how to specify the multiplexing and the ASCU identification header:
alps n1
To specify the threshold of consecutive errors logged before an agent-set control unit (ASCU) is declared down, use the alps n1 command in interface configuration mode. To reassert the default number of consecutive errors before declaring an ASCU down, use the no form of this command.
alps n1 errors
no alps n1 errors
Syntax Description
errors |
Error count limit. The valid range is from 1 to 30 errors. The default for airline link control (ALC) is 30 errors. The default for Unisys Terminal System (UTS) is 10 errors. |
Command Default
The default ALC error count is 30 errors.
The default UTS error count is 10 errors.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.0(2)T |
The error ranges were modified. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The error count limit is a threshold value. If the ASCU state is UP and the error count threshold is exceeded, the ASCU state changes to DOWN and it is moved to the inactive poll. If alarms are enabled for the ASCU, a Syslog message is displayed and an Simple Network Management Protocol (SNMP) notification is sent to the SNMP network management station.
Examples
The following example specifies that an ASCU is declared down when the error count exceeds one:
Related Commands
|
|
alps ascu |
Specifies a physical ASCU identity. |
encapsulation uts |
Specifies that the P1024C UTS protocol will be used on the serial interface. |
alps n2
To specify the number of polls that must be correctly replied to before an agent-set control unit (ASCU) is declared up, use the alps n2 command in interface configuration mode. To reassert the default number of polls that must be correctly replied to before an ASCU is declared up, use the no form of this command.
alps n2 polls
no alps n2 polls
Syntax Description
polls |
Number of polls that must be correctly replied to. The valid range is from 1 to 30 polls. The default is 1 poll. |
Command Default
The default number of polls that must be correctly replied to is one.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If the ASCU state is DOWN and the reply threshold is exceeded, the ASCU state changes to UP and the ASCU is moved to the active poll list. If alarms are enabled for the ASCU, a Syslog message is displayed and an Simple Network Management Protocol (SNMP) notification is sent to the SNMP management station.
Examples
The following example specifies that two polls must be correctly replied to before the ASCU is declared up:
Related Commands
|
|
alps ascu |
Specifies a physical ASCU identity. |
encapsulation uts |
Specifies that the P1024C Universal Terminal Support (UTS) protocol will be used on the serial interface. |
alps n3
To specify the maximum number of retransmissions of an unacknowledged output data message to an agent-set control unit (ASCU), use the alps n3 command in interface configuration mode. To reassert the default, use the no form of this command.
alps n3 value
no alps n3 value
Syntax Description
value |
Maximum number of times an unacknowledged output data message can be re-sent. When the number is exceeded, the output data message is dropped. The valid range is from 1 to 10 resends. The default is 3 resends. |
Command Default
The default number of resends is three.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.0(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command is valid only on 1026C interfaces.
Examples
The following example specifies that 6 is the maximum number of resends of an unacknowledged output data message to an ASCU:
Related Commands
|
|
alps ascu |
Specifies a physical ASCU identity. |
show alps ascu |
Displays the status of the ALPS ASCU. |
alps poll-pause
To set the minimum interval, in milliseconds, between two polls to the same agent-set control unit (ASCU), use the alps poll-pause command in interface configuration mode. To the default interval, use the no form of this command to revert.
alps poll-pause milliseconds
no alps poll-pause
Syntax Description
milliseconds |
Minimum interval between polls, in milliseconds (ms). The valid range is from 10 to 1000 ms. The default interval is 50 ms. |
Command Default
The default minimum interval is 50 ms.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example sets a 200-ms minimum interval between polls:
Related Commands
|
|
alps ascu |
Specifies a physical ASCU identity. |
alps primary-peer
To specify the primary TCP peer and, optionally, a backup TCP peer for an Airline Product Set (ALPS) circuit, use the alps primary-peer command in ALPS circuit configuration submode. To remove the definition from the configuration, use the no form of this command.
alps primary-peer ip-address [backup-peer ip-address]
no alps primary-peer ip-address [backup-peer ip-address]
Syntax Description
ip-address |
IP address specified in the alps remote-peer command. |
backup-peer |
(Optional) Backup TCP peer for the ALPS circuit. |
ip-address |
(Optional) IP address specified in the alps remote-peer command. |
Command Default
No default behavior or values.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies a primary peer at IP address 172.22.0.91 and a backup peer at IP address 172.22.0.92:
alps primary-peer 172.22.0.91 backup-peer 172.22.0.92
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive airline link control (ALC) ASCU in the DOWN state. |
show alps peers |
Displays the status of the ALPS partner peers. |
alps remote-peer
To specify the partner IP address for an Airline Product Set (ALPS) circuit, use the alps remote-peer command in global configuration mode. To remove the definition from the configuration, use the no form of this command.
alps remote-peer ip-address [protocol {atp | matip-a}] [status-interval interval] [status-retry retries] [dynamic [inact-timer] [no-circuit no-circ-timer]] [tcp-qlen [number]]
no alps remote-peer ip-address [protocol {atp | matip-a}] [status-interval interval] [status-retry retries] [dynamic [inact-timer] [no-circuit no-circ-timer]] [tcp-qlen [number]]
Syntax Description
ip-address |
IP address of the peer. |
protocol {atp | matip-a} |
(Optional) Specifies the type of encapsulation for the connection. The following options are available: •ALPS Tunneling Protocol encapsulation. This encapsulation is the default. •mapping of airline traffic over IP (MATIP) Type A (conversational) encapsulation. |
status-interval interval |
(Optional) Specifies amount of time, in seconds, between sending of MATIP status messages. The messages verify the integrity of the TCP connection. Number of seconds between status messages. The range is from 0 to 300 seconds. The default value is 0 (off). |
status-retry retries |
(Optional) Specifies number of times to retry sending a MATIP status message before the peer connection is closed. Number of retries. The range is from 0 to 100 retries. The default value is 2. |
dynamic inact-timer |
(Optional) Allows the TCP connection to the host peer to be opened only when there is data to be transferred to the host reservation system. Length of inactivity, in seconds, after which the connection is closed. The range is from 0 to 300 seconds. The default is 30 seconds. A value of zero indicates that the timer is disabled. |
no-circuit no-circ-timer |
(Optional) Specifies amount of time, in seconds, that a peer will stay connected while no circuits are using the peer connection. This parameter is valid only if the dynamic parameter is first configured. Number of seconds before which the timer will expire. The range is from 0 to 3600 seconds. The default is 90 seconds. |
tcp-qlen number |
(Optional) Specifies the maximum length of a TCP queue for peer connections. Number of packets allowed in the TCP queue. The range is from 26 to 100 packets. The default is 50 packets. |
Command Default
The default for the status-interval argument is 0 (off).
The default for the status-retry argument is 2.
The default for the dynamic argument is 30 seconds.
The default for the no-circuit argument is 90 seconds.
The default for the tcp-qlen argument is 50 packets.
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.0(5)T |
The protocol, status-interval, status-retry and the no-circuit keyword options were added. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
When the protocol option is configured for MATIP, the peer connection is dynamic.
When the protocol option is configured for ALPS Tunneling Protocol (ATP), the peer connection is permanent.
The no-circuit option within the dynamic keyword does not apply to permanent airline link control (ALC)/Universal Terminal Support (UTS) connections.
The status-interval and status-retry options apply only to the MATIP protocol.
Issuing the no alps remote-peer command does the following:
•Closes TCP connection.
•Notifies the partner TCP peer that this connection is closed.
Notifies the ALPS circuits using this TCP peer that the connection is closed.
Examples
The following example specifies a MATIP peer connection at IP address 10.22.0.92. Status messages will be sent every 9 seconds and will be resent twice before the connection is closed. The maximum TCP length is 30:
alps remote-peer 10.22.0.92 protocol matip-a status-interval 9 status-retry 2 tcp-qlen 30
Related Commands
|
|
alps local-peer |
Specifies the IP address of the local peer. |
show alps peers |
Displays the status of the ALPS partner peers. |
alps retry-option
To configure the customer premises equipment (CPE) to signal the agent-set control unit (ASCU) whenever an error is detected, use the alps retry-option command in Airline Product Set (ALPS) ASCU configuration submode. To reassert the default action of no retry, use the no form of this command.
alps retry-option {resend | reenter}
no alps retry-option
Syntax Description
resend |
Specifies the retry option as resend. This option causes an indicator LED to signal the operator at the ASCU to resend data. |
reenter |
Specifies the retry option as reenter. This option causes a service message to signal the operator at the ASCU to reenter data. |
Command Default
The default retry option is no retry.
Command Modes
ALPS ASCU submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command is applicable only for P1024B automatic level control (ALC) interfaces; it is invalid on P1024C Unisys Terminal System (UTS) interfaces.
Examples
The following example specifies that an indicator LED signals the ASCU to resend data:
Related Commands
|
|
alps ascu |
Specifies a physical ASCU identity. |
encapsulation uts |
Specifies that the P1024C UTS protocol will be used on the serial interface. |
alps service-msg data-drop
To specify where to retrieve the terminal address to be used when a service message is sent to an agent-set control unit (ASCU) as the result of a dropped data message, use the alps service-msg data-drop command in interface configuration mode. To remove the terminal address specification, use the no form of this command.
alps service-msg data-drop {msg-term | config-term}
no alps service-msg data-drop {msg-term | config-term}
Syntax Description
msg-term |
Specifies that the service message will be sent to the terminal address of the dropped message. |
config-term |
Specifies that the service message terminal address is the same address configured in the alps-error display command. |
Command Default
The config-term option is the default.
If this command is not configured and a data message is dropped from a terminal, the resulting service message is sent to the terminal specified in the alps error-display command.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.1(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command applies to serial interfaces configured with airline link control (ALC) encapsulation only.
Examples
The following example specifies that service messages resulting from dropped data messages are sent to the terminal address of the dropped message:
alps service-msg data-drop msg-term
Related Commands
|
|
alps error-display |
Specifies where error messages about service availability or network problems are displayed. |
encapsulation alc |
Specifies that the P1024B ALC protocol is used on the serial interface. |
alps service-msg format
To specify the protocol format of service messages sent from the device to an agent-set control unit (ASCU), use the alps service-msg format command in interface configuration mode. To remove the protocol format specification, use the no form of this command.
alps service-msg format {sita | apollo}
no alps service-msg format {sita | apollo}
Syntax Description
sita |
Specifies the sita protocol format. |
apollo |
Specifies the apollo protocol format. |
Command Default
The default protocol format is sita.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.1(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command applies to serial interfaces configured with automatic level control (ALC) encapsulation only.
Examples
The following example specifies the apollo protocol format:
alps service-msg format apollo
Related Commands
|
|
encapsulation alc |
Specifies that the P1024B airline link control (ALC) protocol is used on the serial interface. |
alps service-msg status-change
To specify that service messages for Airline Product Set (ALPS) circuit status changes be sent to agent-set control unit (ASCU)s on the serial interface, use the alps service-msg status-change command in interface configuration mode. To send service messages for ALPS circuit status changes only when airline link control (ALC) data messages are dropped, use the no form of this command.
alps service-msg status-change
no alps service-msg status-change
Syntax Description
This command has no arguments or keywords.
Command Default
The default is on. Unless the no form of this command is configured, unsolicited service messages are sent to all ASCUs multiplexed on the mapping of airline traffic over IP (MATIP) session when the following ALPS circuit events occur:
•MATIP session status change
•ASCU status change
Command Modes
Interface configuration (config-if)
Command History
|
|
12.1(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command applies to serial interfaces configured with ALC encapsulation only.
If the no form of this command is configured, service messages for ALPS circuit status changes are sent only when airline link control (ALC) data messages are dropped.
Examples
The following example specifies that unsolicited service messages resulting from ALPS circuit status changes be sent to ASCUs on the serial interface:
alps service-msg status-change
Related Commands
|
|
encapsulation alc |
Specifies that the P1024B ALC protocol is used on the serial interface. |
alps service-msg-interval
To specify the interval between consecutive transmissions of service messages from the remote customer premises equipment (CPE) to the agent-set control unit (ASCU), use the alps service-msg-interval command in Airline Product Set (ALPS) circuit configuration submode. To remove the definition from the configuration, use the no form of this command.
alps service-msg-interval seconds
no alps service-msg-interval seconds
Syntax Description
seconds |
Interval, in seconds, between consecutive sendings of service messages from the remote CPE to the ASCU. The range is from 1 to 20 seconds. The default interval is 4 seconds. |
Command Default
The default interval between consecutive sendings of service messages from the remote CPE to the ASCU is 4 seconds.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The "PLEASE RETRY" message is sent only to ASCUs that use circuits with a dynamic connection type.
Examples
The following example specifies an interval of 3 seconds between sending service messages from the CPE to the ASCU:
alps service-msg-interval 3
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive ALC ASCU in the DOWN state. |
alps service-msg-list |
Defines the service message list to be used for this circuit. |
alps service-msg-list
To define the service message list to be used for this circuit, use the alps service-msg-list command in Airline Product Set (ALPS) circuit configuration submode. To remove the list from the circuit configuration, thus issuing no service messages until another list is configured, use the no form of this command.
alps service-msg-list list
no alps service-msg-list list
Syntax Description
list |
The service message list to be used for this circuit. The valid numbers are from 1 to 8. |
Command Default
No default behavior or values.
Command Modes
ALPS circuit submode
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies that message list 1 is used for this circuit:
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive airline link control (ALC) ASCU in the DOWN state. |
alps service-msg-interval |
Specifies the interval between consecutive transmissions of service messages from the remote CPE to the agent-set control unit (ASCU). |
alps service-msg-list number
To define the service message identity and its contents for a service message list, use the alps service-msg-list number command in global configuration mode. To remove a service message number from the service message list configuration, use the no form of this command.
alps service-msg-list list number number message
no alps service-msg-list list number number message
Syntax Description
list |
Service message list to be used for this circuit. Valid numbers are from 1 to 8. |
number |
List number. Valid numbers are from 1 to 8. |
message |
Contents of a service message. Maximum number of characters allowed in a service message is 32. Note Configuring the message argument with a value of $OFF$ disables this particular service message.
|
Command Default
The default service message is used if no service message list number is specified.
Table 9 shows the default service message text strings.
Table 9 Service Message Default Text Strings
|
|
|
1 |
ALPS circuit to host is opened. |
CONNECTION UP |
2 |
X.25 virtual circuit at the host is cleared. |
DISC BY THE HOST |
3 |
X.25 interface at the host is down. |
HOST ISOLATED |
4 |
No response from the host device when trying to establish a connection. |
NETWORK PROBLEM |
5 |
Connection to host was disconnected because of inactivity. |
READY TO CONNECT |
6 |
Network is congested. |
CONGESTION |
7 |
Network congestion has cleared. |
PLEASE PROCEED |
8 |
Network operator has disabled the path to the host. |
DISC BY NET OPERAT |
Command Modes
Global configuration (config)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.1(2)T |
The $OFF$ option was added to the message argument and the maximum service message length was increased to 32. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
To disable a particular service message, configure the message argument with a value of $OFF$.
Examples
The following example specifies the text of message list 1, message number 2:
alps service-msg-list 1 number 2 "Turn off the terminal NOW."
The following example disables service message 3 from list 1:
alps service-msg-list 1 number 3 $OFF$
Related Commands
|
|
alps service-msg list |
Defines the service message list to be used for this circuit. |
alps servlim
To specify the number of polls of the agent-set control unit (ASCU) UP list allowed between two successive polls of the ASCU DOWN list, use the alps servlim command in interface configuration mode. To reassert the default number of cycles through the normal (active) poll list allowed before the slow poll list is processed, use the no form of this command.
alps servlim polls
no alps servlim polls
Syntax Description
polls |
Number of polls of the ASCU UP list. The valid range is from 1 to 512 polls. The default is 30 polls. |
Command Default
The default number of polls of the ASCU UP list allowed between two successive polls of the ASCU DOWN list is 30 polls.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies that five polls of the ASCU UP list are allowed between two successive polls of the ASCU DOWN list.
Related Commands
|
|
alps n1 |
Specifies the threshold of consecutive errors logged before an ASCU is declared down. |
alps n2 |
Specifies the number of polls that must be correctly replied to before an ASCU is declared up. |
alps t1 |
Specifies the timeout delay between polling and response. |
alps t2 |
Specifies the timeout delay between receipt of the first character of an IP sequence solicited by a poll and receipt of a GA sequence. |
alps t1
To specify the timeout delay between polling and response, use the alps t1 command in interface configuration mode. To reassert the default poll timeout value of 0.5 seconds, use the no form of this command.
alps t1 delay
no alps t1 delay
Syntax Description
delay |
Timeout delay, in seconds, between polling and response. The valid range is from 1 to 20-tenths of a second (0.1 to 2 seconds). The default is 5-tenths of a second (0.5 second). |
Command Default
The default timeout delay between polling and response is 5-tenths of a second (0.5 second).
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.1(2)T |
The range for the timeout delay was extended. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies a 0.5-second timeout delay between polling and response:
Related Commands
|
|
alps n1 |
Specifies the threshold of consecutive errors logged before an agent-set control unit (ASCU) is declared down. |
alps n2 |
Specifies the number of polls that must be correctly replied to before an ASCU is declared up. |
alps servlim |
Specifies the number of polls of the ASCU UP list allowed between two successive polls of the ASCU DOWN list. |
alps t2 |
Specifies the timeout delay between receipt of the first character of an IP sequence solicited by a poll and receipt of a Go Ahead (GA) sequence. |
encapsulation alc |
Specifies that the P1024B airline link control (ALC) protocol is used on the serial interface. |
encapsulation uts |
Specifies that the P1024C UTS protocol is used on the serial interface. |
alps t2
To specify the timeout delay between receipt of the first character of an I/P sequence solicited by a poll and receipt of a Go Ahead (GA) sequence, use the alps t2 command in interface configuration mode. To reassert the default timeout value of 6 seconds, use the no form of this command.
alps t2 delay
no alps t2 delay
Syntax Description
delay |
Timeout delay, in seconds, between receipt of first character of an I/P sequence solicited by a poll and receipt of GA sequence. The valid range is from 1 to 10 seconds. The default is 6 seconds. |
Command Default
The default timeout delay between receipt of first character of an I/P sequence solicited by a poll and receipt of GA sequence is 6 seconds.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example specifies a timeout delay of 8 seconds between receipt of the first character of an I/P sequence solicited by a poll and receipt of a GA sequence:
Related Commands
|
|
alps n1 |
Specifies the threshold of consecutive errors logged before an agent-set control unit (ASCU) is declared down. |
alps n2 |
Specifies the number of polls that must be correctly replied to before an ASCU is declared up. |
alps servlim |
Specifies the number of polls of the ASCU UP list allowed between two successive polls of the ASCU DOWN list. |
alps t1 |
Specifies the timeout delay between polling and response. |
alps translate
To map an X.121 address to an IP address of a remote peer, use the alps translate command in interface configuration mode. To remove mapping from the configuration, use the no form of this command.
alps translate x.121-address ip-address
no alps translate x.121-address ip-address
Syntax Description
x.121-address |
X.121 address to be mapped to an IP address of a remote peer. |
ip-address |
IP address of the remote peer. |
Command Default
No default behavior or values.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.3(6)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The X.121 address is compared to the Called Address on inbound X.25 call packets to determine if the call should be accepted. The X.121 address may have an asterisk (*) at the end to indicate "all X.121 addresses prefixed with the address before the *."
Examples
The following example maps all X.121 addresses prefixed with the address 88845 to the remote peer IP address 172.22.0.90:
alps translate 88845* 172.22.0.90
Related Commands
|
|
encapsulation x25 |
Specifies operation of a serial interface as an X.25 device. |
alps update-circuit
To update one or more Airline Product Set (ALPS) circuits, use the alps update-circuit command in user EXEC or privileged EXEC mode. If a circuit name is specified, then only that circuit will be updated; otherwise, all circuits will be updated.
alps update-circuit [name]
Syntax Description
name |
(Optional) Specifies name of the circuit to update. |
Command Default
No default behavior or values.
Command Modes
User EXEC
Privileged EXEC
Command History
|
|
12.0(5)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If the alps update-circuit command is issued for a circuit that is using the ALPS Tunneling Protocol (ATP) protocol, the circuit will be closed and reopened.
If the alps update-circuit command is issued for a circuit that is using the mapping of airline traffic over IP (MATIP) protocol, a configuration update will be sent in the form of a MATIP Session Open command.
The alps update-circuit command is effective only for ALPS circuits that are enabled and active (opening or opened state).
There is not a no form for this command.
Examples
The following example specifies that circuit 1 has been updated:
Device# alps update-circuit CKT-1
Related Commands
|
|
alps auto-reset |
Automatically resets a nonresponsive airline link control (ALC) agent-set control unit (ASCU) in the DOWN state. |
alps enable-circuit |
Enables the circuit to be activated when data is received from an ASCU. |
show alps circuits |
Displays the status of the ALPS circuits. |
asp addr-offset
To configure an asynchronous port to send and receive polled asynchronous traffic through a block serial tunnel (BSTUN), use the asp addr-offset command in interface configuration mode. To disable the traffic flow through a BSTUN, use the no form of this command.
asp addr-offset address-offset
no asp addr-offset
Syntax Description
address-offset |
Location of the address byte within the polled asynchronous frame being received. The range is from 0 to 255. The default value is 0. |
Command Default
No polled asynhronous protocol group is defined within the frame of the address byte.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.2F |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
15.0(1)M |
This command was integrated into Cisco IOS Release 15.0(1)M. |
Usage Guidelines
Use the asp addr-offset address-offset command to specify the offset from the start of the frame where the address byte is located. This command is applicable only when the asynchronous-generic protocol is specified on an interface using a combination of the bstun protocol-group command in global configuration mode and the bstun group command in interface configuration mode.
Interfaces configured to run the asynchronous-generic protocol have the following configuration:
•baud rate set to 9600 bps
•8 data bits
•no parity
•1 start bit
•1 stop bit
If different line configurations are required, use the rxspeed command, txspeed command, databits command, stopbits command, and parity line command in the global configuration mode to change the line attributes. The addresses of the alarm panels must be used in the address field of the bstun route address command in the interface configuration mode
Examples
The following example shows that the fifth byte in the polled asynchronous frame contains the device address:
Device(config)# interface Serial 3/0
Device(config-if)# physical-layer async
Device(config-if)# encapsulation bstun
Device(config-if)# asp addr-offset 5
Related Commands
|
|
asp role |
Specifies whether the device is acting as the primary end of the polled asynchronous link or the secondary end of the polled asynchronous link connected to the serial interface, and whether the attached remote device is a security alarm control station. |
asp rx-ift |
Specifies a time period that, by expiring, signals the end of one frame being received and the start of the next. |
bstun group |
Specifies the BSTUN group to which the interface belongs. |
bstun protocol-group |
Defines a BSTUN group and the protocol it uses. |
bstun route |
Defines how frames will be forwarded from a BSTUN interface to a remote BSTUN peer. |
asp broadcast-addr
To specify the address byte that asynchronous serial protocols (ASP) use to broadcast packets from their remote stations, use the asp broadcast-addr command in interface configuration mode. To disable asynchronous broadcast, use the no form of this command.
asp broadcast-addr address
no asp broadcast-addr
Syntax Description
address |
Broadcast address in hexadecimal format. The range is from 0 to 0xff. |
Command Default
No broadcast address is defined.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
15.2(3)T |
This command was modified. Support was extended to enable the ASP broadcast mask to transmit packets as broadcasts. |
Usage Guidelines
Use the asp broadcast-addr command to specify the address byte that Asynchronous Serial Protocols (ASP) use to broadcast packets. All packets that are to be broadcast are copied and sent to all peers defined on the serial interface. The broadcast addresses identify the packets transmitted to all remote devices in the same Block Serial Tunnel (BSTUN) group.
For example, the address values configured using the bstun route command can be 01, 02, 03, and so on. If the address value is configured using the asp broadcast-addr ff command, the packets received are considered as a broadcast. These packets are transmitted to all remote devices in that BSTUN group.
Note A broadcast-mask value of ff identifies all packets as broadcasts. Therefore, all address bytes in the range 0x00 to 0xff are classified as broadcasts.
Examples
The following example shows how to configure an asynchronous broadcast address using the address ff:
Device(config)# interface Serial 3/0
Device(config-if)# asp broadcast-addr ff
Related Commands
|
|
asp eof-char |
Specifies an EOF character for the asynchronous generic application that is used to end ASP transmissions. |
asp ignore-sequence-number |
Instructs a device to ignore the ASP sequence numbers that are used to synchronize ASP traffic between head-end and tail-end devices. |
asp sof-char |
Specifies an SOF character for the asynchronous generic application. |
brdcast-address-mask |
Allows the configuration of multiple address masks. |
asp brdcast-address-mask
To specify the bit or bits in the address byte that the asynchronous serial protocols (ASP) use to broadcast packets from their remote stations, use the asp brdcast-address-mask command in interface configuration mode. To disable the bit or bits in the address byte that the ASP uses to broadcast packets, use the no form of this command.
asp brdcast-address-mask address
no asp brdcast-address-mask
Syntax Description
address |
Broadcast address in hexadecimal format. The range is from 0 to 0xff. |
Command Default
No address masks are configured.
Command Modes
Interface configuration (config-if)
Command History
|
|
15.0(1)M |
This command was introduced. |
15.2(3)T |
This command was modified. Support was extended to enable the ASP broadcast mask to transmit packets as broadcasts. |
Usage Guidelines
This command will force the ASP to take an ASP asynchronous character and mask it to check if it is a valid broadcast address mask. The broadcast address mask is predetermined; for example, you can set up your network such that any address above 0x7f is a broadcast address mask. Broadcast addresses identify packets that are transmitted to all remote devices in the same block serial tunnel (BSTUN) group.
For example, use the asp brdcast-address-mask 80 command to set up the network such that any address beyond 0x7f is a broadcast address. The broadcast address is logically anded with the address byte. If the resulting value is not zero, the address is considered as a broadcast.
Note A broadcast-mask value of 0xff identifies all packets as broadcasts. Therefore, all address bytes in the range 0x00 to 0xff are classified as broadcasts.
Examples
The following example shows the configuration of ASP address broadcast mask 30 on the Serial interface:
Device(config)# interface Serial 0/0
Device(config-if)# asp brdcast-address-mask 30
Device(config-if)# end
Related Commands
|
|
asp addr-offset |
Configures an asynchronous port to send and receive polled asynchronous traffic through a BSTUN. |
asp broadcast-addr |
Specifies the address that an asynchronous generic application uses to broadcast packets from its remote stations. |
asp role |
Allows configuration of multiple address masks. |
asp dcd always
To specify that both data set ready (DSR) and data carrier detect (DCD) are to be asserted when the serial interface starts, use the asp dcd always command in interface configuration mode. To specify that DSR and DCD are to be asserted when the HAYES AT connect message is sent to the point of sale (POS) device, use the no form of this command.
asp dcd always
no asp dcd always
Syntax Description
This command has no arguments or keywords.
Command Default
The asp dcd always command is disabled.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
For APOS, the device always functions as the DCE. If the asp dcd always command is enabled, then both DSR and DCD will be asserted when the serial interface is started.
If the asp dcd always command is disabled, then DSR and DCD are asserted when the HAYES AT connect message is sent to the POS device. When the connection to the POS device is terminated, DSR and DCD are de-asserted.
Some POS devices require that the DSR and DCD work independently, and that DSR be asserted when the serial interface starts and DCD be asserted when the connect message is sent. This requires a modified cable to disconnect the DTR and DSR connection in both directions, and on the DB25 side of the connector tying the DTE's output DTR to the DTE's input DSR.
If the asp dcd always command is disabled, then DSR and DCD are asserted when the HAYES AT connect message is sent to the POS device. When the connection to the POS device is terminated, DSR and DCD are de-asserted. For devices using modified cables that require that DCD be asserted only where there is a connection to the host, the asp dcd always command should be disabled.
Examples
The following example configures the asp dcd always command:
Related Commands
|
|
asp direct |
Disables dial mode and automatically activate the peer connection. |
asp enq |
Configures how the device sends ENQ(0x05) messages to the terminal. |
asp retries |
Specifies the number of times a packet will be resent before the connection with the terminal is disconnected. |
asp send ack |
Enables the sending of ACK(0x06) messages to the terminal to acknowledge terminal requests. |
asp timer |
Customizes the ASP timers. |
asp direct
To disable dial mode and automatically activate the peer connection, use the asp direct command in interface configuration mode. To enable dial mode, use the no form of this command.
asp direct
no asp direct
Syntax Description
This command has no arguments or keywords.
Command Default
The asp direct command is disabled.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
When the asp direct command is enabled, the connect timer is used to reactivate the connection if the peer connection goes down.
Examples
The following example configures the asp direct command:
Related Commands
|
|
asp dcd always |
Specifies that both data set ready (DSR) and data carrier detect (DCD) are to be asserted when traffic starts to the serial interface. |
asp enq |
Configures how the device sends ENQ(0x05) messages to the terminal. |
asp retries |
Specifies the number of times a packet will be resent before the connection with the terminal is disconnected. |
asp send ack |
Enables the sending of ACK(0x06) messages to the terminal to acknowledge terminal requests. |
asp timer |
Customizes the ASP timers. |
asp enq
To configure how the device sends ENQ(0x05) messages to the terminal, use the asp enq command in interface configuration mode. To restore the default method of sending of ENQ messages to the terminal to initiate sessions, use the no form of this command.
asp enq {disable | delay milliseconds}
no asp enq {disable | delay}
Syntax Description
disable |
Disables the device from sending ENQ messages to the terminal to initiate sessions. |
delay |
Configures a delay between the sending of a connect message and the ENQ message. |
milliseconds |
Duration of the delay in milliseconds. Allowed values are from 1 to 1000. |
Command Default
By default, ENQ messages are sent to the terminal.
milliseconds: 10 milliseconds
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The asp enq disable command should be enabled only if the terminal the device is connecting to does not require ENQ messages as part of the session flow.
The delay keyword can be used to slow responses in dialed networks.
Examples
The following example specifies that ENQ messages be sent 500 milliseconds after the connect message is sent:
Related Commands
|
|
asp dcd always |
Specifies that both data set ready (DSR) and data carrier detect (DCD) are to be asserted when traffic starts to the serial interface. |
asp direct |
Disables dial mode and automatically activate the peer connection. |
asp retries |
Specifies the number of times a packet will be resent before the connection with the terminal is disconnected. |
asp send ack |
Enables the sending of ACK(0x06) messages to the terminal to acknowledge terminal requests. |
asp timer |
Customizes the ASP timers. |
asp eof-char
To specify an end-of-frame (EOF) character for asynchronous serial protocols (ASP) to use to end ASP transmissions, use the asp eof-char command in interface configuration mode. To remove a previously configured EOF character, use the no form of this command.
asp eof-char eof-character
no asp eof-char
Syntax Description
eof-character |
EOF character in hexadecimal format. The range is from 0 to ff. |
Command Default
Disabled.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
When the asp eof-char command is enabled, asynchronous serial protocols (ASP) stops receiving characters when it receives the specified EOF character. When the asp eof-char command is disabled, ASP continues to receive characters until the RX-IFT timer expires.
Examples
The following example sets 3e as the EOF character:
Related Commands
|
|
asp broadcast-addr |
Specifies the address that an asynchronous generic application uses to broadcast packets from its remote stations. |
asp ignore-sequence-number |
Instructs a device to ignore the ASP sequence numbers that are used to synchronize ASP traffic between head-end and tail-end devices. |
asp sof-char |
Specifies an SOF character for the asynchronous generic application. |
asp ignore-sequence-number
To instruct a device to ignore the asynchronous serial protocols (ASP) sequence numbers that are used to synchronize ASP traffic between head-end and tail-end devices, use the asp ignore-sequence-number command in interface configuration mode. To instruct a device to use the ASP sequence numbers to validate ASP traffic, use the no form of this command.
asp ignore-sequence-number
no asp ignore-sequence-number
Syntax Description
This command has no arguments or keywords.
Command Default
Disabled. The ASP sequence numbers are used to validate ASP traffic.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The asp ignore-sequence-number command should be enabled when there is not a one-to-one correspondence between commands from the head-end device and commands from the tail-end device.
When the asp ignore-sequence-number command is disabled, ASP validates the sequence numbers.
Examples
The following example instructs the device to ignore ASP sequence numbers:
asp ignore-sequence-number
Related Commands
|
|
asp broadcast-addr |
Specifies the address that an asynchronous application uses to broadcast packets from its remote stations. |
asp eof-char |
Specifies an EOF character for the asynchronous generic application to use to end ASP transmissions. |
asp sof-char |
Specifies an SOF character for the asynchronous generic application. |
asp retries
To specify the number of times a packet will be resent before the connection with the terminal is disconnected, use the asp retries command in interface configuration mode. To reset the number of asynchronous serial protocols (ASP) retries to its default value, use the no form of this command.
asp retries number
no asp retries
Syntax Description
number |
Number of times a packet will be resent before the connection with the terminal is disconnected. Allowed values are from 1 to 10. |
Command Default
number: 4
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example configures ten ASP retries:
Device(config-if)# asp retries 10
Related Commands
|
|
asp dcd always |
Specifies that both data set ready (DSR) and data carrier detect (DCD) are to be asserted when traffic starts to the serial interface. |
asp direct |
Disables dial mode and automatically activate the peer connection. |
asp enq |
Configures how the device sends ENQ(0x05) messages to the terminal. |
asp send ack |
Enables the sending of ACK(0x06) messages to the terminal to acknowledge terminal requests. |
asp timer |
Customizes the ASP timers. |
asp role
To specify that the device is the primary end or the secondary end of the polled asynchronous link that is connected to a serial interface and that the attached remote device is a security alarm control station, use the asp role command in interface configuration mode. To remove the specification, use the no form of this command.
asp role {primary | secondary}
no asp role
Syntax Description
primary |
Specifies the device as the primary end of the polled asynchronous link connected to the serial interface, and the attached remote devices are alarm panels. |
secondary |
Specifies the device as the secondary end of the polled asynchronous link connected to the serial interface, and the attached remote device is a security alarm control station. |
Command Default
No default behavior or values.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.2F |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
This command configures the interface as primary or secondary to the device on which asynchronous serial protocol (ASP) is configured. Configure the interface connected to the alarm console as the secondary device and the interface connected to the alarm panel as the primary device. The addresses of the alarm panels must be used in the address field of the bstun route address command in the interface configuration mode.
Examples
The following example shows how to specify the device as the primary end of the link:
Device(config)# interface Serial 3/0
Device(config-if)# asp role primary
Related Commands
|
|
asp brdcast-address-mask |
Allows the configuration of multiple address masks. |
bstun route |
Defines how frames will be forwarded from a BSTUN interface to a remote BSTUN peer. |
asp rx-ift
To specify a time period that, by expiring, signals the end of one frame being received and the start of the next, use the asp rx-ift command in interface configuration mode. To cancel the specification, use the no form of this command.
asp rx-ift interframe-timeout
no asp rx-ift
Syntax Description
interframe-timeout |
Number of milliseconds between the end of one frame being received and the start of the next frame. The default timeout value is 40 milliseconds. |
Command Default
The default timeout value is 40 ms.
Command Modes
Interface configuration (config-if)
Command History
|
|
11.2F |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
The interframe timeout is useful when different baud rates are used between the device and the alarm console or alarm panel. For example, you might set an interframe timeout of 6 ms if the polled asynchronous protocol is running at 9600 bps, but set the value to 40 ms if the protocol is running at 300 bps.
This command applies only when the asynchronous-generic protocol has been specified on an interface using a combination of the bstun protocol-group global configuration command and the bstun group interface configuration command.
Interfaces configured to run the asynchronous-generic protocol have their baud rate set to 9600 bps, use 8 data bits, no parity, 1 start bit, and 1 stop bit. If different line configurations are required, use the rxspeed, txspeed, databits, stopbits, and parity line configuration commands to change the line attributes.
The addresses of the alarm panels should be used in the address field of the bstun route address interface configuration command.
Examples
The following example sets the interframe timeout value to 6 ms because the polled asynchronous protocol is running at 9600 bps:
Related Commands
|
|
asp addr-offset |
Configures an asynchronous port to send and receive polled asynchronous traffic through a BSTUN tunnel. |
asp role |
Specifies whether the device is acting as the primary end of the polled asynchronous link or as the secondary end of the polled asynchronous link connected to the serial interface, and whether the attached remote device is a security alarm control station. |
bstun protocol-group |
Defines a BSTUN group and the protocol it uses. |
bstun route |
Defines how frames will be forwarded from a BSTUN interface to a remote BSTUN peer. |
asp send ack
To enable the sending of ACK(0x06) messages to the terminal to acknowledge terminal requests, use the asp send ack command in interface configuration mode. To disable the sending of ACK messages, use the no form of this command.
asp send ack
no asp send ack
Syntax Description
This command has no arguments or keywords.
Command Default
The asp send ack command is disabled.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
If the asp send ack command is enabled, an acknowledgement is immediately sent when the device receives a packet. If the asp send ack command is disabled, an acknowledgement is not sent until the device receives a response from the host.
Examples
The following example configures the asp send ack command:
Related Commands
|
|
asp dcd always |
Specifies that both data set ready (DSR) and data carrier detect (DCD) are to be asserted when traffic starts to the serial interface. |
asp direct |
Disables dial mode and automatically activate the peer connection. |
asp enq |
Configures how the device sends ENQ(0x05) messages to the terminal. |
asp retries |
Specifies the number of times a packet will be resent before the connection with the terminal is disconnected. |
asp timer |
Customizes the ASP timers. |
asp sof-char
To specify a start-of-frame (SOF) character, use the asp sof-char command in interface configuration mode. To remove a previously configured SOF character, use the no form of this command.
asp sof-char address
no asp sof-char
Syntax Description
address |
SOF character in hexadecimal format. The range is from 0 to ff. |
Command Default
Disabled.
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Usage Guidelines
When the asp sof-char command is enabled, asynchronous serial protocols (ASP) ignores any characters received prior to the specified SOF character. When the asp sof-char command is disabled, ASP receives all characters.
Examples
The following example sets d9 as the SOF character:
Related Commands
|
|
asp broadcast-addr |
Specifies the address that an asynchronous generic application uses to broadcast packets from its remote stations. |
asp eof-char |
Specifies an EOF character for the asynchronous generic application to use to end ASP transmissions. |
asp ignore-sequence-number |
Instructs a device to ignore the ASP sequence numbers that are used to synchronize ASP traffic between head-end and tail-end devices. |
asp timer
To customize the asynchronous serial protocols (ASP) timers, use the asp timer command in interface configuration mode. To reset the ASP timers to their default values, use the no form of this command.
asp timer {rsp rsp-time | rx rx-time | host host-time | connect connect-time}
no asp timer {rsp | rx | host | connect}
Syntax Description
rsp |
Duration the device will wait for a response to a packet before resending. |
rsp-time |
Allowed values are from 1 to 30 seconds. |
rx |
Duration the device will wait for the entire packet to be received, beginning when the STX(0x02) character is received. |
rx-time |
Allowed values are from 10 to 60 seconds. |
host |
Duration the device will wait for a response packet from the host, beginning when the terminal request is forwarded to APIP |
host-time |
Allowed values are from 10 to 120 seconds. |
connect |
Duration the device will wait for the peer connection to activate when in dial mode, beginning when the device receives a dial string. |
connect-time |
Allowed values are from 1 to 30 seconds. |
Command Default
rsp-time: 7 seconds
rx-time: 15 seconds
host-time: 60 seconds
connect-time: 8 seconds
Command Modes
Interface configuration (config-if)
Command History
|
|
12.3(2)T |
This command was introduced. |
12.2(33)SRA |
This command was integrated into Cisco IOS Release 12.2(33)SRA. |
12.2SX |
This command was integrated into the Cisco IOS Release 12.2SX train. Support in a specific 12.2SX release of this train depends on your feature set, platform, and platform hardware. |
Examples
The following example configures the RSP timer to 30 seconds, the RX timer to 60 seconds, the host timer to 120 seconds and the connect timer to 30 seconds: