Cisco ASR 1001-X Router Power Up and Initial Configuration

This chapter guides you through a basic router configuration, which is sufficient for you to access your network. Complex configuration procedures are beyond the scope of this publication and can be found in the modular configuration and modular command reference publications in the Cisco IOS software configuration documentation set that corresponds to the software release installed on your Cisco hardware.

This chapter contains the following sections:

Checking Conditions Prior to System Startup

Ensure that all the card slots and compartments are closed. Install blank faceplates on empty slots. Always have power supply slots filled. If you leave a power supply slot uncovered, then you risk exposure to hazardous voltages on the power pins on the midplane.


DANGER


Blank faceplates and cover panels serve three important functions: they prevent exposure to hazardous voltages and currents inside the chassis; they contain electromagnetic interference (EMI) that might disrupt other equipment; and they direct the flow of cooling air through the chassis. Do not operate the system unless all cards, faceplates, front covers, and rear covers are in place. Statement 1029



Note


To view the boot sequence, you must have a console connection to the Cisco ASR 1001-X Router before it powers up.

Ensure that the following conditions are addressed before starting up the router:

  • The network interface cable or the optional Fast Ethernet Management port cable is connected.
  • The chassis is securely mounted and grounded.
  • The power and interface cables are connected.
  • Your PC with terminal emulation program (hyperTerminal or equivalent) is connected to the console port, powered up, and is configured for 9600 baud, 8 data bits, 1 stop bit, no parity, with flow control set to none.
  • You have selected passwords for access control.
  • Captive installation screws are tight on all removable components.
  • The console terminal is turned on.
  • You have determined the IP addresses for the network interfaces.
  • The shared port adapter and the NIM is inserted in its slot, if applicable.
  • Empty card slots are filled with card blanks. This ensures proper air flow through the chassis and electromagnetic compatibility (EMC).

Powering Up the Cisco ASR 1001-X Router

Prerequisites

Before you power on, make sure that:

  • The power supply cord is plugged into the power supply inlet.
  • All cables are connected.
  • Your computer is powered up and connected.

You are now ready to power on the system for the first time. Follow these steps.

Move the power switch to the ON position. Listen for the fans; you should immediately hear them operating. Ensure that the power supply LED OK is green and the FAIL LED is not illuminated.

The front-panel indicator LEDs provide power, activity, and status information useful during bootup. For more detailed information about the LEDs, see Cisco ASR 1001-X Router LEDs section.

Observe the initialization process. When the system boot is complete (the process takes a few seconds), the Cisco ASR 1001-X Router begins to initialize.

The following is an example of what is displayed during the system boot process:

Loading from ROMMON with a System Image in Bootflash


Initializing Hardware ...
System integrity status: 00000610
System Bootstrap, Version 15.4(2r)S, RELEASE SOFTWARE (fc1)
Copyright (c) 1994-2014  by cisco Systems, Inc.
Current image running: Boot ROM0
Last reset cause: PowerOn
ASR1001-X platform with 8388608 Kbytes of main memory
File size is 0x1c103d44
Located asr1001x-universalk9.BLD_V154_2_S0A_XE3120A_THROTTLE_LATEST_20140427_042227-std.SPA.bin
Image size 470826308 inode num 81931, bks cnt 114948 blk size 8*512
####################################################################################################
####################################################################################################
Validating dev_mode signature
done
Boot image size = 470826308 (0x1c103d44) bytes
ROM:RSA Self Test Passed
ROM:Sha512 Self Test Passed
Self Tests Latency: 58 mSec
Package header rev 1 structure detected
Calculating SHA-1 hash...done
validate_package_cs: SHA-1 hash:
        calculated ef1e9e3f:519cec63:1f14c20f:c3b39303:dbb4c3c5
        expected   ef1e9e3f:519cec63:1f14c20f:c3b39303:dbb4c3c5
RSA Signed RELEASE Image Signature Verification Successful.
Package Load Test Latency : 5070 mSec
Image validated
Validating dev_mode signature
done
              Restricted Rights Legend
Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.
           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706
Cisco IOS Software, ASR1000 Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Experimental Version 15.4(20140427:063816) [v154_2_s0a_xe3120a_throttle-BLD-BLD_V154_2_S0A_XE3120A_THROTTLE_LATEST_20140427_042227-ios 106]
Copyright (c) 1986-2014 by Cisco Systems, Inc.
Compiled Sun 27-Apr-14 00:02 by mcpre
cisco ASR1001-X (1NG) processor with 3765392K/6147K bytes of memory.
Processor board ID P4A-17
6 Gigabit Ethernet interfaces
3 Ten Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
8388608K bytes of physical memory.
6684671K bytes of eUSB flash at bootflash:.
Press RETURN to get started!
*May 13 15:17:59.791: %SMART_LIC-6-AGENT_READY: Smart Agent for Licensing is initialized
*May 13 15:18:00.810: %IOS_LICENSE_IMAGE_APPLICATION-6-LICENSE_LEVEL: Module name = asr1001x Next reboot level = adventerprise and License = adventerprise
*May 13 15:18:03.504: %IOSXE_THROUGHPUT-6-LEVEL: Throughput level has been set to 20000000 kbps
*May 13 15:18:14.767: %SPANTREE-5-EXTENDED_SYSID: Extended SysId enabled for type vlan
*May 13 15:18:17.981: VOIPHA: removing default handlers
*May 13 15:18:18.838: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up
*May 13 15:18:18.838: %LINK-3-UPDOWN: Interface EOBC0, changed state to up
*May 13 15:18:18.839: %LINEPROTO-5-UPDOWN: Line protocol on Interface VoIP-Null0, changed state to up
*May 13 15:18:18.839: %LINEPROTO-5-UPDOWN: Line protocol on Interface LI-Null0, changed state to up
*May 13 15:18:18.839: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to down
.
.
.

Performing the Initial Configuration on the Router

You can perform initial configuration on the router using the procedure described in the following sections:

Using the Cisco setup Command Facility

The setup command facility prompts you to enter the information that is needed to configure a router quickly. The facility takes you through an initial configuration, including LAN and WAN interfaces.


Note


The setup command facility is entered automatically if there is no configuration on the router when it is booted into Cisco IOS-XE.

For information on modifying the configuration after you create it, see the Cisco IOS XE Configuration Guide and the Cisco IOS XE Command References .

This section explains how to configure a host name for the router, set passwords, and configure an interface to communicate with the management network.


Note


If you make a mistake while using the setup command facility, you can exit and run the setup command facility again. Press Ctrl-C , and enter the setup command in privileged EXEC mode (Router#).

SUMMARY STEPS

  1. From the Cisco IOS-XE CLI, enter the setup command in privileged EXEC mode:
  2. To proceed using the setup command facility, enter yes .
  3. Basic management setup configures only enough connectivity.
  4. Enter a hostname for the router (this example uses myrouter):
  5. Enter an enable secret password. This password is encrypted (for more security) and cannot be seen when viewing the configuration.
  6. Enter an enable password that is different from the enable secret password. This password is not encrypted (and is less secure) and can be seen when viewing the configuration.
  7. Enter the virtual terminal password, which prevents unauthenticated access to the router through ports other than the console port:
  8. Respond to the following prompts as appropriate for your network:
  9. Respond to the following prompts as appropriate for your network:
  10. Respond to the following prompts. Select [2] to save the initial configuration.

DETAILED STEPS


Step 1

From the Cisco IOS-XE CLI, enter the setup command in privileged EXEC mode:

Example:


Router> enable
 
Password: <password>
 
Router# setup
 
         --- System Configuration Dialog ---
Continue with configuration dialog? [yes/no]:

The prompts in the setup command facility vary depending on your router model, on the installed interface modules, and on the software image. The following steps and the user entries (in bold) are shown as examples only.

Step 2

To proceed using the setup command facility, enter yes .

Example:


Continue with configuration dialog? [yes/no]:
At any point you may enter a question mark '?' for help.
Use ctrl-c to abort configuration dialog at any prompt.
Default settings are in square brackets '[]'.

Step 3

Basic management setup configures only enough connectivity.

Example:


Would you like to enter basic management setup? [yes/no]: yes

Step 4

Enter a hostname for the router (this example uses myrouter):

Example:


Configuring global parameters:
Enter host name [Router]: myrouter

Step 5

Enter an enable secret password. This password is encrypted (for more security) and cannot be seen when viewing the configuration.

Example:


The enable secret is a password used to protect access to
privileged EXEC and configuration modes. This password, after
entered, becomes encrypted in the configuration.
Enter enable secret: cisco

Step 6

Enter an enable password that is different from the enable secret password. This password is not encrypted (and is less secure) and can be seen when viewing the configuration.

Example:


The enable password is used when you do not specify an
enable secret password, with some older software versions, and
some boot images.
Enter enable password: cisco123

Step 7

Enter the virtual terminal password, which prevents unauthenticated access to the router through ports other than the console port:

Example:


The virtual terminal password is used to protect
access to the router over a network interface.
Enter virtual terminal password: cisco

Step 8

Respond to the following prompts as appropriate for your network:

Example:


Configure SNMP Network Management? [no]: yes
    Community string [public]:

A summary of the available interfaces is displayed. The interface summary includes interface numbering, which is dependent on the router model and the installed modules and interface cards.

Example:


Current interface summary
Interface              IP-Address      OK? Method Status                Protocol
Te0/0/0                20.1.1.1        YES NVRAM  administratively down down    
Te0/0/1                21.1.1.1        YES NVRAM  administratively down down    
GigabitEthernet0/0/0   11.1.1.1        YES NVRAM  down                  down    
GigabitEthernet0/0/1   12.1.1.1        YES NVRAM  administratively down down    
GigabitEthernet0/0/2   13.1.1.1        YES NVRAM  administratively down down    
GigabitEthernet0/0/3   14.1.1.1        YES NVRAM  administratively down down    
GigabitEthernet0/0/4   15.1.1.1        YES NVRAM  administratively down down    
GigabitEthernet0/0/5   200.1.1.1       YES NVRAM  administratively down down    
Te0/1/0                22.1.1.1        YES NVRAM  administratively down down    
GigabitEthernet0       2.1.12.233      YES NVRAM  up                    up
Any interface listed with OK? value "NO" does not have a valid configuration

Step 9

Respond to the following prompts as appropriate for your network:

Example:


Configuring interface GigabitEthernet0/0/1
:
  Configure IP on this interface? [yes]: yes
    IP address for this interface [10.10.10.12
]: 
    Subnet mask for this interface [255.0.0.0] : 255.255.255.0
    Class A network is 10.0.0.0, 24 subnet bits; mask is /24

The following configuration command script is created:

Example:


hostname myrouter
enable secret 5 $1$t/Dj$yAeGKviLLZNOBX0b9eifO0
enable password cisco123 
line vty 0 4 password cisco snmp-server community public !
no ip routing
!
interface GigabitEthernet0/0/0
shutdown
no ip address
!
interface GigabitEthernet0/0/1
no shutdown
ip address 10.10.10.12 255.255.255.0
!
interface GigabitEthernet0/0/2
shutdown
no ip address
!
.
.
.
end

Step 10

Respond to the following prompts. Select [2] to save the initial configuration.

Example:


[0] Go to the IOS command prompt without saving this config.
[1] Return back to the setup without saving this config.
[2] Save this configuration to nvram and exit.
Enter your selection [2]: 2
Building configuration...
Use the enabled mode 'configure' command to modify this configuration.
Press RETURN to get started! RETURN

The following user prompt is displayed:

Example:


myrouter>

Completing the Configuration

When using the Cisco setup command facility, and after you have provided all the information requested by the facility as described in Using the Cisco setup Command Facility, the final configuration appears. To complete your router configuration, follow these steps:

SUMMARY STEPS

  1. The facility prompts you to save the configuration.
  2. When messages stop appearing on your screen, press Return to get the Router> prompt.
  3. The Router> prompt indicates that you are now at the command-line interface (CLI) and you have just completed an initial router configuration. Note that this is not a complete configuration. At this point, you have two choices:

DETAILED STEPS


Step 1

The facility prompts you to save the configuration.

  • If you answer no, the configuration information you entered is not saved, and you return to the router enable prompt (Router#). Enter setup to return to the System Configuration dialog box.
  • If you answer yes, the configuration is saved, and you are returned to the user EXEC prompt (Router>).
Example:

Use this configuration? {yes/no} : yes
Building configuration...
Use the enabled mode 'configure' command to modify this configuration.
%LINK-3-UPDOWN: Interface GigabitEthernet0/1/0, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1/0, changed state to up
<Additional messages omitted.>

Step 2

When messages stop appearing on your screen, press Return to get the Router> prompt.

Step 3

The Router> prompt indicates that you are now at the command-line interface (CLI) and you have just completed an initial router configuration. Note that this is not a complete configuration. At this point, you have two choices:

  • Run the setup command facility again, and create another configuration:
Example:

Router> enable
Password: password
Router# setup
  • Modify the existing configuration or configure additional features by using the CLI:
Example:

Router> enable
Password: password
Router# configure terminal
Router(config)#

Using the Cisco IOS-XE CLI--Manual Configuration

This section shows you how to access the CLI to perform the initial configuration on the router.

If the system configuration message does not appear, it means a default configuration file was installed on the router prior to shipping. Follow these steps to configure the router.

SUMMARY STEPS

  1. Enter no when the following system message appears on the router:
  2. Press Return and continue with the manual configuration:
  3. Press Return to bring up the Router> prompt.
  4. Type enable to enter privileged EXEC mode:

DETAILED STEPS


Step 1

Enter no when the following system message appears on the router:

Example:


--- System Configuration Dialog ---
Would you like to enter the initial configuration dialog? [yes/no]: no

Step 2

Press Return and continue with the manual configuration:

Several log messages are displayed.

Step 3

Press Return to bring up the Router> prompt.

Step 4

Type enable to enter privileged EXEC mode:

Example:


Router> enable
 
Router#

Configuring the Router Hostname

The hostname is used in CLI prompts and default configuration filenames. If you do not configure the router hostname, the router uses the factory-assigned default hostname Router.

SUMMARY STEPS

  1. enable
  2. configure terminal
  3. hostname name
  4. end

DETAILED STEPS

  Command or Action Purpose

Step 1

enable

Example:

Router> enable

Enables privileged EXEC mode.

Enter your password if prompted.

Step 2

configure terminal

Example:

Router# configure terminal

Enters global configuration mode.

Step 3

hostname name

Example:

Router(config)# hostname myrouter 

Specifies or modifies the hostname for the network server.

Step 4

end

Example:

myrouter# end

(Optional) Returns to privileged EXEC mode.

Configuring the Enable and Enable Secret Passwords

To provide an additional layer of security, particularly for passwords that cross the network or are stored on a TFTP server, you can use either the enable password command or enable secret command. Both commands accomplish the same thing—they allow you to establish an encrypted password that users must enter to access privileged EXEC (enable) mode.

We recommend that you use the enable secret command because it uses an improved encryption algorithm.

For more information, see the “Configuring Passwords and Privileges” chapter in the Cisco IOS Security Configuration Guide . Also see the Cisco IOS Password Encryption Facts tech note and the Improving Security on Cisco Routers tech note.


Note


If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously.


SUMMARY STEPS

  1. enable
  2. configure terminal
  3. enable secret password
  4. end
  5. enable
  6. end

DETAILED STEPS

  Command or Action Purpose

Step 1

enable

Example:

Router> enable

Enables privileged EXEC mode.

  • Enter your password if prompted.

Step 2

configure terminal

Example:

Router# configure terminal

Enters global configuration mode.

Step 3

enable secret password

Example:

Router(config)# enable secret greentree

Specifies an additional layer of security over the enable password command.

Step 4

end

Example:

Router(config)# end

Returns to privileged EXEC mode.

Step 5

enable

Example:

Router> enable

Enables privileged EXEC mode.

Verify that your new enable or enable secret password works.

Step 6

end

Example:

Router(config)# end

(Optional) Returns to privileged EXEC mode.

Configuring the Console Idle Privileged EXEC Timeout

This section describes how to configure the console line’s idle privileged EXEC timeout. By default, the privileged EXEC command interpreter waits 10 minutes to detect user input before timing out.

When you configure the console line, you can also set communication parameters, specify autobaud connections, and configure terminal operating parameters for the terminal that you are using. For more information on configuring the console line, see the Cisco IOS Configuration Fundamentals and Network Management Configuration Guide . In particular, see the “Configuring Operating Characteristics for Terminals” and “Troubleshooting and Fault Management” chapters.

SUMMARY STEPS

  1. enable
  2. configure terminal
  3. line console 0
  4. exec-timeout minutes [seconds ]
  5. end
  6. show running-config

DETAILED STEPS

  Command or Action Purpose

Step 1

enable

Example:

Router> enable

Enables privileged EXEC mode.

Enter your password if prompted.

Step 2

configure terminal

Example:

Router# configure terminal

Enters global configuration mode.

Step 3

line console 0

Example:

Router(config)# line console 0 

Configures the console line and starts the line configuration command collection mode.

Step 4

exec-timeout minutes [seconds ]

Example:

Router(config-line)# exec-timeout 0 0

Sets the idle privileged EXEC timeout, which is the interval that the privileged EXEC command interpreter waits until user input is detected.

The example shows how to specify no timeout. Setting the exec-timeout value to 0 will cause the router to never log out once logged in. This could have security implications if you leave the console without manually logging out using the disable command.

Step 5

end

Example:

Router(config)# end

Returns to privileged EXEC mode.

Step 6

show running-config

Example:

Router# show running-config 

Displays the running configuration file.

Verify that you have configured the idle privileged EXEC timeout correctly.

Examples

The following example shows how to set the console idle privileged EXEC timeout to 2 minutes 30 seconds:


line console
 exec-timeout 2 30

The following example shows how to set the console idle privileged EXEC timeout to 30 seconds:


line console
 exec-timeout 0 30 

Gigabit Ethernet Management Interface Overview

The router provides an Ethernet management port named GigabitEthernet0.

The purpose of this interface is to allow users to perform management tasks on the router; it is an interface that should not, and often cannot, forward network traffic, but can be used to access the router via Telnet and SSH to perform management tasks on the router. The interface is most useful before a router has begun routing, or in troubleshooting scenarios when other forwarding interfaces are inactive.

The following aspects of the management Ethernet interface should be noted:

  • The router has one management Ethernet interface named GigabitEthernet0.
  • IPv4, IPv6, and ARP are the only routed protocols supported for the interface.
  • The interface provides a way to access the router even if forwarding interfaces are not functional, or the Cisco IOS is down.
  • The management Ethernet interface is part of its own VRF. See the Cisco ASR 1000 Series Aggregation Services Routers Software Configuration Guide for more details.

Default Gigabit Ethernet Configuration

By default, a forwarding VRF is configured for the interface with a special group named Mgmt-intf. This cannot be changed. This isolates the traffic on the management interface away from the forwarding plane. Otherwise, the interface can be configured like other Gigabit Ethernet interfaces for most functions.

For example, the default configuration is as follows


interface GigabitEthernet0 
vrf forwarding Mgmt-intf 
ip address 172.18.77.212 255.255.255.240 
negotiation auto

Configuring Gigabit Ethernet Interfaces

This sections shows how to assign an IP address and interface description to an Ethernet interface on your router.

For comprehensive configuration information on Gigabit Ethernet interfaces, see the “Configuring LAN Interfaces” chapter of the Cisco IOS Interface and Hardware Component Configuration Guide .

For information on interface numbering, see the software configuration guide pertaining to your router.

SUMMARY STEPS

  1. enable
  2. show ip interface brief
  3. configure terminal
  4. interface gigabitethernet 0
  5. ip address ip-address mask
  6. no shutdown
  7. end
  8. show ip interface brief

DETAILED STEPS

  Command or Action Purpose

Step 1

enable

Example:

Router> enable

Enables privileged EXEC mode.

Enter your password if prompted.

Step 2

show ip interface brief

Example:

Router# show ip interface brief

Displays a brief status of the interfaces that are configured for IP.

Learn which type of Ethernet interface is on your router.

Step 3

configure terminal

Example:

Router# configure terminal

Enters global configuration mode.

Step 4

interface gigabitethernet 0

Example:

Router(config)# interface gigabitethernet 0

Specifies the Ethernet interface and enters interface configuration mode.

Step 5

ip address ip-address mask

Example:

Router(config-if)# ip address 172.16.74.3 255.255.255.0

Sets a primary IP address for an interface.

Step 6

no shutdown

Example:

Router(config-if)# no shutdown 

Enables an interface.

Step 7

end

Example:

Router(config)# end

Returns to privileged EXEC mode.

Step 8

show ip interface brief

Example:

Router# show ip interface brief 

Displays a brief status of the interfaces that are configured for IP.

Verify that the interfaces are up and configured correctly.

What to do next

Note


For comprehensive configuration information about IP routing and IP routing protocols, see the Configuring IP Routing Protocol-Independent Feature on Cisco.com.

Saving Your Router Configuration

This section describes how to avoid losing your configuration at the next system reload or power cycle by saving the running configuration to the startup configuration in NVRAM. The NVRAM provides 32 MB of storage on the router.

SUMMARY STEPS

  1. enable
  2. copy running-config startup-config

DETAILED STEPS

  Command or Action Purpose

Step 1

enable

Example:


Router> enable

Enables privileged EXEC mode.

Enter your password if prompted.

Step 2

copy running-config startup-config

Example:


Router# copy running-config startup-config 

Saves the running configuration to the startup configuration.

What to do next


Note


To aid file recovery and minimize downtime in case of file corruption, we recommend that you save backup copies of the startup configuration file and the Cisco IOS-XE software system image file on a server.

Note


To avoid losing work you have completed, be sure to save your configuration occasionally as you proceed. Use the copy running-config startup-config command to save the configuration to NVRAM.

Verifying the Initial Configuration

Enter the following commands in Cisco IOS-XE to verify the initial configuration on the router:

  • show version —Displays the system hardware version, the installed software version, the names and sources of configuration files, the boot images, and the amount of installed DRAM, NVRAM, and flash memory.
  • show diag —Lists and displays diagnostic information about the installed controllers, interface processors, and port adapters.
  • show interfaces — Shows if interfaces are operating correctly and if interfaces and line protocols are in the correct state, either up or down
  • show ip interface brief —Displays a summary of the interfaces configured for IP protocol.
  • show configuration —Helps verify if you have configured the correct hostname and password.

After you have completed and verified the initial configuration, the specific features and functions are ready to be configured. See the Cisco ASR 1000 Series Aggregation Services Routers Software Configuration Guide .

Powering Off the Cisco ASR 1001-X Router Safely

This section explains how to shut down the Cisco ASR 1001-X Router. We recommend that before turning off all power to the chassis, you issue the reload command. This ensures that the operating system cleans up all the file systems.

To remove power from the Cisco ASR 1001-X Router safely, follow this procedure:

SUMMARY STEPS

  1. Slip on the ESD-preventive wrist strap included in the accessory kit.
  2. Enter the reload command.
  3. Confirm the reload command:
  4. After confirming the reload command, wait until the system bootstrap message is displayed before powering off the system:
  5. Place the Standby switch in the Standby position.

DETAILED STEPS


Step 1

Slip on the ESD-preventive wrist strap included in the accessory kit.

Step 2

Enter the reload command.

Step 3

Confirm the reload command:

Example:


Router# reload
Proceed with reload? [confirm]
Apr 21 03:42:45.619 EDT: %SYS-5-RELOAD: Reload requested by console. Reload Reason: Reload Command.Apr 21 03:42:59.920 R0/0: %PMAN-5-EXITACTION: Process manager is exiting: process exit with reload chassis code 

Step 4

After confirming the reload command, wait until the system bootstrap message is displayed before powering off the system:

Example:


System Bootstrap, Version 15.4(2r)S, RELEASE SOFTWARE (fc1)
Copyright (c) 1994-2014  by cisco Systems, Inc.
Current image running: Boot ROM0
Last reset cause: LocalSoft
ASR1001-X platform with 16777216 Kbytes of main memory
rommon 1 >

Step 5

Place the Standby switch in the Standby position.

Note

 
The fans in the power supply modules will continue to run even if the Standby switch is in the Standby position.

Note

 
After powering off the router, wait for a minimum of 30 seconds before powering it on again.

Environmental Monitoring and Reporting Functions

Environmental monitoring and reporting functions allow you to maintain normal system operation by identifying and resolving adverse conditions prior to loss of operation.


Caution


To prevent overheating of the chassis, ensure that your system is drawing cool inlet air. Over temperature conditions may occur if the system is drawing in the exhaust air of other equipment. Ensure adequate clearance around the sides of the chassis so that cooling air can flow through the chassis interior unimpeded and exhaust air exits the chassis and is not drawn into the inlet vent of another device.


Cisco ASR1001-X Router Alarm Monitoring

The Cisco ASR 1001-X Router displays the CRIT, MAJ, and MIN alarm indicator LEDs. The three system alarm LEDs on the Cisco ASR 1001-X Router provide visual alarm notification in the router. These LEDs indicate router status at all times, but you must directly observe these LEDs to become aware of a router alarm condition. Additionally, you can use the show facility-alarm status command to view the alarms.


Router# show facility-alarm status
System Totals  Critical: 4  Major: 0  Minor: 0
Source                     Time                   Severity      Description [Index]
------                     ------                 --------      -------------------
Power Supply Module 1      Mar 12 2014 09:05:21   CRITICAL      Power Supply Failure [0]
xcvr container 0/0/0       Mar 12 2014 09:05:42   CRITICAL      Transceiver Missing - Link Down [1]
xcvr container 0/0/1       Mar 12 2014 09:05:42   INFO          Transceiver Missing [0]
xcvr container 0/0/2       Mar 12 2014 09:05:42   CRITICAL      Transceiver Missing - Link Down [1]
xcvr container 0/0/3       Mar 12 2014 09:05:42   CRITICAL      Transceiver Missing - Link Down [1]
xcvr container 0/0/4       Mar 12 2014 09:05:42   INFO          Transceiver Missing [0]
xcvr container 0/0/5       Mar 12 2014 09:05:42   INFO          Transceiver Missing [0]
xcvr container 0/0/6       Mar 12 2014 09:05:42   INFO          Transceiver Missing [0]
xcvr container 0/0/7       Mar 12 2014 09:05:42   INFO          Transceiver Missing [0]

Note


There is no external alarm monitoring facility on the Cisco ASR 1001-X Router.

To clear a visual alarm, you must resolve the alarm condition. The clear facility-alarm command does not clear an alarm LED on the Cisco ASR 1001-X Router. For example, if a critical alarm LED is illuminated because an active SPA was removed without a graceful deactivation of the SPA, the only way to resolve that alarm is to replace the SPA.

Environmental Monitoring

The environmental monitoring functions use sensors to monitor the temperature of the cooling air as it moves through the chassis.

The local power supplies provide the ability to monitor:

  • Input and output voltage
  • Output current
  • Outlet temperature

The Cisco ASR 1001-X Router is expected to meet the following environmental operating conditions:

  • Operating Temperature Nominal: 0° to 40°C
  • Operating Temperature Short Term: 0° to +55°C
  • Operating Humidity Nominal (relative humidity): 10 to 90% relative
  • Operating Humidity Short Term: 5 to 90% relative
  • Operating Altitude: –500 to 10,000 feet
  • DC Input Range: –40 to –72 VDC
  • AC Input Range: 85 to 264 VAC

In addition, the power supplies monitor internal power supply temperatures and voltages. A power supply is either within tolerance (normal) or out of tolerance (critical). If an internal power supply temperature or voltage reaches a critical level, the power supply shuts down without any interaction with the system processor.

The environmental monitoring functions use the following levels of status conditions to monitor the system:

  • Normal—All monitored parameters are within normal tolerances.
  • Warning—The system has exceeded a specified threshold. The system continues to operate, but operator action is recommended to bring the system back to a normal state.
  • Critical—An out-of-tolerance temperature or voltage condition exists. The system continues to operate, but the system is approaching shutdown. Immediate operator action is required.
  • Shutdown—Before any shutdown, the system logs the status of monitored parameters in NVRAM so that you can retrieve it later to help determine the cause of the problem.
  • Power supply shutdown—The power supply detected an internal out-of-tolerance overvoltage, overcurrent, or temperature condition and shut itself down. All DC power remains disabled until you toggle the power switch.

The Cisco ASR 1001-X Router does not shut down automatically during an over-temperature condition. The router will remain active irrespective of what the ambient temperature is, if the router is exposed to an extremely hot environment for a prolonged period of time, it will remain active until the hardware fails.

The facility-alarm critical exceed-action shutdown command is disabled on the Cisco ASR 1001-X Router.

The console terminal displays the following error message if you execute the facility-alarm critical exceed-action shutdown command:

Router(config)# facility-alarm critical exceed-action shutdown

Router(config)# end

Router#

*Apr 22 15:27:26.939: %CMANRPCHAIN-6-NOSHUTWARN: Shutdown not supported on this platform

*Apr 22 15:27:27.974: %SYS-5-CONFIG_I: Configured from console by console

Router#

If the air temperature exceeds a defined threshold, the system controller displays the following warning message on the console terminal:

Router#

*Apr 22 15:30:37.749: %CMRP_ENVMON-3-TEMP_WARN_CRITICAL: R0/0: cmand: WARNING: Temp: Inlet temperature sensor on R0 is in a critical state reading 81

Router#

The console terminal displays the following status if you execute the show facility-alarm status command:

Router# show facility-alarm status

System Totals Critical: 2 Major: 0 Minor: 0

Source Time Severity Description [Index]

------ ------ -------- -------------------

xcvr container 0/0/1 Apr 22 2014 15:25:57 CRITICAL Transceiver Missing - Link Down [1]

Temp: Inlet R0/30 Apr 22 2014 15:30:37 CRITICAL Temp Above Normal (Shutdown) [1]

GigabitEthernet0 Apr 22 2014 15:25:42 INFO Physical Port Administrative State Down [2]

Router#

Fan Failures

Four internal fans draw cooling air into the chassis and across internal components to maintain an acceptable operating temperature. The fans are located in the center of the chassis. The fans are numbered from 0 to 3, right to left. When the system power is on, all fans should be operational. However, the system continues to operate even if a fan fails.

Use the show platform hardware slot < slot> fan status command to view the status of the fans, for example:

Router# show platform hardware slot P2 fan status

Fan group 1 speed: 60%

Fan 0: Normal

Fan 1: Normal

Fan 2: Normal

Fan 3: Fail

Reporting Functions

The chassis manager on the forwarding engine control processor manages the local resources of the forwarding processor. The Cisco ASR 1001-X Router displays warning messages on the console if the chassis interface-monitored parameters exceed a threshold. You can also retrieve and display environmental status reports with the following commands:

  • show environment all
  • show version
  • show inventory
  • show platform
  • show platform software status control-processor
  • show diag

Parameters are measured and reporting functions are updated every 60 seconds. A brief description of each of these commands follows.

The show environment all command displays temperature, voltage, fan, and power supply information.

The following is sample output from the show environment all command.

show environment all Command


Router# show environment all
Sensor List:  Environmental Monitoring
 Sensor           Location          State             Reading
 PEM Iout         P0                Normal            6 A
 PEM Vout         P0                Normal            12 V DC
 PEM Vin          P0                Normal            117 V AC
 Temp: PEM In     P0                Normal            35 Celsius
 Temp: PEM Out    P0                Normal            32 Celsius
 Temp: PEM Int    P0                Normal            37 Celsius
 PEM Iout         P1                Normal            6 A
 PEM Vout         P1                Normal            12 V DC
 PEM Vin          P1                Normal            117 V AC
 Temp: PEM In     P1                Normal            31 Celsius
 Temp: PEM Out    P1                Normal            27 Celsius
 Temp: PEM Int    P1                Normal            31 Celsius
 VVM 0: VX1       R0                Normal            1502 mV
 VVM 0: VX2       R0                Normal            751 mV
 VVM 0: VX3       R0                Normal            1004 mV
 VVM 0: VX4       R0                Normal            1055 mV
 VVM 0: VX5       R0                Normal            901 mV
 VVM 0: VP1       R0                Normal            5096 mV
 VVM 0: VP3       R0                Normal            1505 mV
 VVM 0: VP4       R0                Normal            1792 mV
 VVM 0: VH        R0                Normal            11940 mV
 VVM 1: VX1       R0                Normal            1203 mV
 VVM 1: VX2       R0                Normal            859 mV
 VVM 1: VX3       R0                Normal            857 mV
 VVM 1: VX4       R0                Normal            999 mV
 VVM 1: VX5       R0                Normal            950 mV
 VVM 1: VP2       R0                Normal            3320 mV
 VVM 1: VP3       R0                Normal            1787 mV
 VVM 1: VP4       R0                Normal            997 mV
 VVM 1: VH        R0                Normal            11945 mV
 VVM 2: VX1       R0                Normal            1112 mV
 VVM 2: VX2       R0                Normal            1102 mV
 VVM 2: VX3       R0                Normal            1216 mV
 VVM 2: VX4       R0                Normal            2516 mV
 VVM 2: VX5       R0                Normal            910 mV
 VVM 2: VP2       R0                Normal            1526 mV
 VVM 2: VP3       R0                Normal            1508 mV
 VVM 2: VP4       R0                Normal            2481 mV
 VVM 2: VH        R0                Normal            11935 mV
 VVM 2: AUX1      R0                Normal            747 mV
 VVM 2: AUX2      R0                Normal            752 mV
 Temp: sTCAM      R0                Normal            31 Celsius
 Temp: Inlet      R0                Normal            22 Celsius
 Temp: Outlet     R0                Normal            36 Celsius
 Temp: QFP Die    R0                Normal            58 Celsius
 Temp: Center     R0                Normal            37 Celsius
 Temp: Oct Die    R0                Normal            41 Celsius
 Temp: CPU Inlt   R0                Normal            26 Celsius
 Temp: CPU VRM    R0                Normal            24 Celsius
 Temp: CPU Die    R0                Normal            37 Celsius
 Temp: FC FANS    R0                Fan Speed 60%     21 Celsius

The show version command displays the system hardware configuration, software version, and names and sources of configuration files and boot images.

The following is sample output from the show version command:

show version Command


Router# show version
Cisco IOS XE Software, Version BLD_V154_2_S_XE312_THROTTLE_LATEST_20140709_150034-std
Cisco IOS Software, ASR1000 Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Experimental Version 15.4(20140709:163658) [v154_2_s_xe312_throttle-BLD-BLD_V154_2_S_XE312_THROTTLE_LATEST_20140709_150034-ios 159]
Copyright (c) 1986-2014 by Cisco Systems, Inc.
Compiled Wed 09-Jul-14 12:25 by mcpre
Cisco IOS-XE software, Copyright (c) 2005-2014 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.  For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.
ROM: IOS-XE ROMMON
Router uptime is 21 hours, 43 minutes
Uptime for this control processor is 21 hours, 44 minutes
System returned to ROM by reload
System image file is "tftp:images/rls_3_12_nightster/asr1001x-universalk9.BLD_V154_2_"
Last reload reason: Reload Command
This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.
A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html
If you require further assistance please contact us by sending email to
export@cisco.com.
License Level: adventerprise
License Type: Permanent
Next reload license Level: adventerprise
cisco ASR1001-X (1NG) processor with 6837243K/6147K bytes of memory.
Processor board ID JAE17460APT
6 Gigabit Ethernet interfaces
3 Ten Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
16777216K bytes of physical memory.
6684671K bytes of eUSB flash at bootflash:.
Configuration register is 0x0
Router#

The show inventory command displays an extended report that includes the product inventory listing of all the Cisco products installed in the networking device.

The following is sample output from the show inventory command:

show inventory Command


Router# show inventory
NAME: "Chassis", DESCR: "Cisco ASR1001-X Chassis"
PID: ASR1001-X , VID: V00, SN: P3A-9 
NAME: "Power Supply Module 0", DESCR: "Cisco ASR1001-X AC Power Supply"
PID: ASR1001X-PWR-AC , VID: V00, SN: LIT171616HJ
NAME: "Power Supply Module 1", DESCR: "Cisco ASR1001-X AC Power Supply"
PID: ASR1001X-PWR-AC , VID: V00, SN: LIT171616GG
NAME: "Fan Tray 0", DESCR: "Cisco ASR1001-X Fan Tray"
PID: ASR1001-X-FANTRAY , VID: , SN: 
NAME: "module 0", DESCR: "Cisco ASR1001-X SPA Interface Processor"
PID: ASR1001-X , VID: , SN: 
NAME: "SPA subslot 0/1", DESCR: "4-port Serial Shared Port Adapter"
PID: SPA-4XT-SERIAL , VID: V01, SN: JAB111105M4
NAME: "NIM subslot 0/2", DESCR: "NIM SSD Module"
PID: NIM-SSD , VID: V01, SN: FOC18071SNN
NAME: "subslot 0/2 disk0", DESCR: "harddisk"
PID: Micron P400m-MTFDDAK400MAN , VID: 0225 , SN: MSA1802019A
NAME: "subslot 0/2 disk1", DESCR: "harddisk"
PID: UB88RTB400HE6-NTH-EID , VID: 5.2.4 , SN: 11000302418 
NAME: "SPA subslot 0/0", DESCR: "8-port Built-in GE SPA"
PID: BUILT-IN-2T+6X1GE , VID: , SN: 
NAME: "module R0", DESCR: "Cisco ASR1001-X Route Processor"
PID: ASR1001-X , VID: V00, SN: JAE1719030S
NAME: "module F0", DESCR: "Cisco ASR1001-X Embedded Services Processor"
PID: ASR1001-X , VID: , SN: 
Router#

The show platform command displays platform information.

The following is sample output from the show platform command:

show platform Command


Router# show platform
Chassis type: ASR1001-X
Slot      Type                State                 Insert time (ago) 
--------- ------------------- --------------------- ----------------- 
0         ASR1001-X           ok                    00:34:05      
 0/0      BUILT-IN-2T+6X1GE   ok                    00:33:14      
 0/1      SPA-4XT-SERIAL      ok                    00:33:14      
 0/2      NIM-SSD             ok                    00:33:11      
R0        ASR1001-X           ok                    00:34:05      
 R0/0                         ok, active            00:34:05      
 R0/1                         ok, standby           00:32:47      
F0        ASR1001-X           ok, active            00:34:05      
P0        ASR1001X-PWR-AC     ps, fail              00:33:44      
P1        ASR1001X-PWR-AC     ok                    00:33:42      
P2        ASR1001-X-FANTRAY   ok                    00:33:47      
Slot      CPLD Version        Firmware Version                        
--------- ------------------- --------------------------------------- 
0         14041015            15.4(2r)S                           
R0        14041015            15.4(2r)S                           
F0        14041015            15.4(2r)S

The show platform software status control-processor command displays the average load, memory usage, and CPU utilization levels at which the router is running. The output also specifies whether the levels of these system health parameters are within defined thresholds.


Note


The output does not display SIP-related information on a monolithic router.

The following is sample output from the show platform software status control-processor command:

show platform software status control-processor Command


Router# show platform software status control-processor
RP0: online, statistics updated 1 seconds ago
Load Average: healthy
  1-Min: 0.00, status: healthy, under 8.00
  5-Min: 0.03, status: healthy, under 8.00
  15-Min: 0.07, status: healthy, under 10.00
Memory (kb): healthy
  Total: 8092776
  Used: 3491556 (43%)
  Free: 4601220 (57%)
  Committed: 3566404 (44%), status: healthy, under 95%
Per-core Statistics
CPU0: CPU Utilization (percentage of time spent)
  User:  0.00, System:  0.00, Nice:  0.00, Idle:100.00
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00
CPU1: CPU Utilization (percentage of time spent)
  User:  1.30, System:  0.40, Nice:  0.00, Idle: 98.30
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00
CPU2: CPU Utilization (percentage of time spent)
  User:  0.49, System:  8.89, Nice:  0.00, Idle: 90.60
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00
CPU3: CPU Utilization (percentage of time spent)
  User:  2.00, System:  0.40, Nice:  0.00, Idle: 97.60
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00
CPU4: CPU Utilization (percentage of time spent)
  User:  0.00, System:  0.30, Nice:  0.00, Idle: 99.69
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00
CPU5: CPU Utilization (percentage of time spent)
  User:  0.40, System:  0.10, Nice:  0.00, Idle: 99.50
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00
CPU6: CPU Utilization (percentage of time spent)
  User:  0.40, System:  0.40, Nice:  0.00, Idle: 99.19
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00
CPU7: CPU Utilization (percentage of time spent)
  User:  0.80, System:  1.30, Nice:  0.00, Idle: 97.90
  IRQ:  0.00, SIRQ:  0.00, IOwait:  0.00

The show diag chassis eeprom detail command displays the configuration hardware information, including DRAM and Static RAM (SRAM) on line cards.

The following is sample output from the show diag chassis eeprom detail command:

show diag chassis eeprom detail Command


Router#: show diag chassis eeprom detail
MIDPLANE EEPROM data:
        EEPROM version           : 4
        Compatible Type          : 0xFF
        Controller Type          : 2030
        Hardware Revision        : 1.0
        PCB Part Number          : 73-14409-07
        Board Revision           : A0
        Deviation Number         : 0-0
        Fab Version              : 07
        PCB Serial Number        : JAE1817044D
        RMA Test History         : 00
        RMA Number               : 0-0-0-0
        RMA History              : 00
        Top Assy. Part Number    : 68-4703-07
        CLEI Code                : CMMP410DRA
        Product Identifier (PID) : ASR1001-X
        Version Identifier (VID) : V01
        Manufacturing Test Data  : 00 00 00 00 00 00 00 00
        Field Diagnostics Data   : 00 00 00 00 00 00 00 00
        Chassis MAC Address      : a80c.0dee.c600
        MAC Address block size   : 128
        Chassis Serial Number    : FXS1814Q2K0
        Environment Monitor Data : 00 06 00 FA Asset ID                 :
Power/Fan Module P0 EEPROM data:
        EEPROM version           : 4
        Compatible Type          : 0xFF
        Hardware Revision        : 0.3
        Version Identifier (VID) : V00
        Product Identifier (PID) : ASR1001X-PWR-AC
        PCB Serial Number        : LIT171616GE
        Top Assy. Part Number    : 341-0608-01
        Board Revision           : 01
        Deviation Number         : 0
        Power Supply Type        : AC
        RMA Test History         : 00
        RMA Number               : 0-0-0-0
        RMA History              : 00
        CLEI Code                : UNASSIGNED
        Manufacturing Test Data  : 00 00 00 00 00 00 00 00
        Field Diagnostics Data   : 00 00 00 00 00 00 00 00
        Unknown Field (type 00DA): 00 00 00 00 00 00 00 00
                                   00 00 00 00 00 00 00 00
        Platform features        : 00 01 01 DE 15 F4 07 C6
                                   00 00 00 00 00 00 00 00
                                   4A
        Environment Monitor Data : 00 06 00 FA
        Asset ID                 :
Power/Fan Module P1 EEPROM data:
        EEPROM version           : 4
        Compatible Type          : 0xFF
        Hardware Revision        : 0.3
        Version Identifier (VID) : V00
        Product Identifier (PID) : ASR1001X-PWR-AC
        PCB Serial Number        : LIT171616GX
        Top Assy. Part Number    : 341-0608-01
        Board Revision           : 01
        Deviation Number         : 0
        Power Supply Type        : AC
        RMA Test History         : 00
        RMA Number               : 0-0-0-0
        RMA History              : 00
        CLEI Code                : UNASSIGNED
        Manufacturing Test Data  : 00 00 00 00 00 00 00 00
        Field Diagnostics Data   : 00 00 00 00 00 00 00 00
        Unknown Field (type 00DA): 00 00 00 00 00 00 00 00
                                   00 00 00 00 00 00 00 00
        Platform features        : 00 01 01 DE 15 F4 07 C6
                                   00 00 00 00 00 00 00 00
                                   4A
        Environment Monitor Data : 00 06 00 FA
        Asset ID                 :
Power/Fan Module P2 EEPROM data is not initialized