- Preface
- Cisco ASR1000-RP3 Module Overview
- Preparing to Install the Cisco ASR1000-RP3 Module
- Installing the Cisco ASR1000-RP3 Module
- Software Licensing on Cisco ASR1000-RP3 Module
- Configuring the Cisco ASR1000-RP3 Module
- Upgrading the Cisco ASR1000-RP3 Module
- Upgrading the ROMMON
- Removing and Replacing FRUs from the Cisco ASR1000-RP3 Module
- Checking Conditions Prior to System Startup
- Powering Up the Cisco ASR 1000 Modular Platforms
- Performing the Initial Configuration on the Router
Configuring the Cisco ASR1000-RP3 Module
This chapter guides you through basic router configuration, which is sufficient for you to access the network. Describing complex configuration procedures are beyond the scope of this publication and can be found in the modular configuration and modular command reference publications. These are available in the Cisco IOS software configuration documentation set that corresponds to the software release installed on your Cisco hardware.
Checking Conditions Prior to System Startup
Ensure that all card slots and compartments are closed. Install blank faceplates on empty slots. Always have power supply slots filled. If you leave a power supply slot uncovered, then you risk exposure to hazardous voltages on the power pins on the midplane.

Warning Blank faceplates and cover panels serve three important functions: they prevent exposure to hazardous voltages and currents inside the chassis; they contain electromagnetic interference (EMI) that might disrupt other equipment; and they direct the flow of cooling air through the chassis. Do not operate the system unless all cards, faceplates, front covers, and rear covers are in place. Statement 1029

Note To view the boot sequence, you must have a console connection to the Cisco ASR 1000 Series Router before it powers up.
Ensure that the following conditions are addressed before starting up the router:
- The network interface cable or the optional Fast Ethernet Management port cable is connected.
- The chassis is securely mounted and grounded.
- The power and interface cables are connected.
- Your PC with terminal emulation program (hyperTerminal or equivalent) is connected to the console port, powered up, and is configured for 9600 baud, 8 data bits, 1 stop bit, no parity, with flow control set to none.
- You have selected passwords for access control.
- Captive installation screws are tight on all removable components.
- The console terminal is turned on.
- You have determined the IP addresses for the network interfaces.
- The shared port adapter and the NIM is inserted in its slot, if applicable.
- Empty card slots are filled with card blanks. This ensures proper air flow through the chassis and electromagnetic compatibility (EMC).
Powering Up the Cisco ASR 1000 Modular Platforms
Before you power on, make sure that:
- The power supply cord is plugged into the power supply inlet.
- All cables are connected.
- Your computer is powered up and connected.
You are now ready to power on the system for the first time. Follow these steps.
Step 1 Move the power switch to the ON position. Listen for the fans; you should immediately hear them in operation. Ensure that the power supply LED OK is green and the FAIL LED is not illuminated.
The front-panel indicator LEDs provide power, activity, and status information useful during bootup. For more detailed information about the LEDs, see “LEDs” section.
Step 2 Observe the initialization process. When the system boot is complete (the process takes a few seconds), the Cisco ASR 1000 Modular Platforms (Cisco ASR 1013, Cisco ASR 1006-X, and Cisco ASR 1009-X routers) begins to initialize.
The following is an example of what is displayed during the system boot process:
Example 5-1 Loading from ROMMON with a System Image in Bootflash
Performing the Initial Configuration on the Router
You can perform initial configuration on the router using the procedure described in the following sections:
- “Using the Cisco setup Command Facility” section
- “Using the Cisco IOS-XE CLI—Manual Configuration” section
Using the Cisco setup Command Facility
The setup command facility prompts you to enter the information that is needed to configure a router quickly. The facility takes you through an initial configuration, including LAN and WAN interfaces.

Note The setup command facility is entered automatically if there is no configuration on the router when it is booted into Cisco IOS-XE.
For information on modifying the configuration after you create it, see the Cisco IOS XE Configuration Guide and the Cisco IOS XE Command References.
This section explains how to configure a host name for the router, set passwords, and configure an interface to communicate with the management network.

Note If you make a mistake while using the setup command facility, you can exit and run the setup command facility again. Press Ctrl-C, and enter the setup command in privileged EXEC mode (Router#).
Step 1 From the Cisco IOS-XE CLI, enter the setup command in privileged EXEC mode:
The prompts in the setup command facility vary depending on your router model, on the installed interface modules, and on the software image. The following steps and the user entries (in bold) are shown as examples only.
Step 2 To proceed using the setup command facility, enter yes.
At any point you may enter a question mark '?' for help.
Step 3 Enter yes to proceed with the basic management setup that configures only enough connectivity.
Step 4 Enter a hostname for the router (“myrouter” in this example):
Step 5 Enter an enable secret password. This password is encrypted (for more security) and cannot be seen when viewing the configuration.
Step 6 Enter an enable password that is different from the enable secret password. This password is not encrypted (and is less secure) and can be seen when viewing the configuration.
Step 7 Enter the virtual terminal password, which prevents unauthenticated access to the router through ports other than the console port:
Step 8 Respond to the following prompts as appropriate for your network:
A summary of the available interfaces is displayed. The interface summary includes interface numbering, which is dependent on the router model and the installed modules and interface cards.
Step 9 Respond to the following prompts as appropriate for your network:
The following configuration command script is created:
Step 10 Respond to the following prompts. Select [2] to save the initial configuration.
The following user prompt is displayed:
Completing the Configuration
When using the Cisco setup command facility, and after you have provided all the information requested by the facility as described in “Using the Cisco setup Command Facility” section, the final configuration appears. To complete your router configuration, follow these steps:
Step 1 The facility prompts you to save the configuration.
- If you answer no, the configuration information you entered is not saved, and you return to the router enable prompt (Router#). Enter setup to return to the System Configuration dialog box.
- If you answer yes, the configuration is saved, and you are returned to the user EXEC prompt (Router>).
Step 2 When messages stop appearing on your screen, press Return to get the Router> prompt.
Step 3 The Router> prompt indicates that you are now at the command-line interface (CLI) and you have just completed an initial router configuration. Note that this is not a complete configuration. At this point, you have two choices:
Using the Cisco IOS-XE CLI—Manual Configuration
This section shows you how to access the CLI to perform the initial configuration on the router.
If the system configuration message does not appear, it means a default configuration file was installed on the router prior to shipping. Follow these steps to configure the router.
Step 1 Enter no when the following system message appears on the router:
Step 2 Press Return and continue with the manual configuration:
Several log messages are displayed.
Step 3 Press Return to bring up the
Router>
prompt.
Step 4 Type enable to enter privileged EXEC mode:
Configuring the Router Hostname
The hostname is used in CLI prompts and default configuration filenames. If you do not configure the router hostname, the router uses the factory-assigned default hostname Router.
SUMMARY STEPS
DETAILED STEPS
|
|
|
---|---|---|
|
||
|
||
|
||
|
Configuring the Enable and Enable Secret Passwords
To provide an additional layer of security, particularly for passwords that cross the network or are stored on a TFTP server, you can use either the enable password command or enable secret command. Both commands accomplish the same thing—they allow you to establish an encrypted password that users must enter to access privileged EXEC (enable) mode.
We recommend that you use the enable secret command because it uses an improved encryption algorithm.
For more information, see the “Configuring Passwords and Privileges” chapter in the Cisco IOS Security Configuration Guide. Also see the Cisco IOS Password Encryption Facts tech note and the Improving Security on Cisco Routers tech note.
Restrictions
If you configure the enable secret command, it takes precedence over the enable password command; the two commands cannot be in effect simultaneously.
SUMMARY STEPS
DETAILED STEPS
|
|
|
---|---|---|
|
||
|
||
|
Specifies an additional layer of security over the enable password command. |
|
|
||
|
Verify that your new enable or enable secret password works. |
|
|
Configuring the Console Idle Privileged EXEC Timeout
This section describes how to configure the console line’s idle privileged EXEC timeout. By default, the privileged EXEC command interpreter waits 10 minutes to detect user input before timing out.
When you configure the console line, you can also set communication parameters, specify autobaud connections, and configure terminal operating parameters for the terminal that you are using. For more information on configuring the console line, see the Cisco IOS Configuration Fundamentals and Network Management Configuration Guide. In particular, see the “Configuring Operating Characteristics for Terminals” and “Troubleshooting and Fault Management” chapters.
SUMMARY STEPS
DETAILED STEPS
Examples
The following example shows how to set the console idle privileged EXEC timeout to 2 minutes 30 seconds:
The following example shows how to set the console idle privileged EXEC timeout to 30 seconds:
Gigabit Ethernet Management Interface Overview
The router provides an Ethernet management port named GigabitEthernet0.
The purpose of this interface is to allow users to perform management tasks on the router; it is an interface that should not, and often cannot, forward network traffic. It can, however, be used to access the router through Telnet and SSH to perform management tasks on the router. The interface is useful before a router has begun routing, or in troubleshooting scenarios when other forwarding interfaces are inactive.
The following aspects of the management Ethernet interface should be noted:
- The router has one management Ethernet interface named GigabitEthernet0.
- IPv4, IPv6, and ARP are the only routed protocols supported for the interface.
- The interface provides a way to access the router even if forwarding interfaces are not functional, or the Cisco IOS is down.
- The management Ethernet interface is part of its own VRF. See the Cisco ASR 1000 Series Aggregation Services Routers Software Configuration Guide for more details.
Default Gigabit Ethernet Configuration
By default, a forwarding VRF is configured for the interface with a special group named Mgmt-intf. This cannot be changed. This isolates the traffic on the management interface away from the forwarding plane. Otherwise, the interface can be configured like other Gigabit Ethernet interfaces for most functions.
Configuring Gigabit Ethernet Interfaces
This sections shows how to assign an IP address and interface description to an Ethernet interface on your router.
For comprehensive configuration information on Gigabit Ethernet interfaces, see the “Configuring LAN Interfaces” chapter of the Cisco IOS Interface and Hardware Component Configuration Guide.
For information on interface numbering, see the software configuration guide pertaining to your router.
SUMMARY STEPS
DETAILED STEPS

Note For comprehensive configuration information about IP routing and IP routing protocols, see the Configuring IP Routing Protocol-Independent Feature on Cisco.com.
Saving Your Router Configuration
This section describes how to avoid losing your configuration at the next system reload or power cycle by saving the running configuration to the startup configuration in NVRAM. The NVRAM provides 32 MB of storage on the router.
SUMMARY STEPS
DETAILED STEPS
|
|
|
---|---|---|
|
||
copy running-config startup-config |
Saves the running configuration to the startup configuration. |

Note To aid file recovery and minimize downtime in case of file corruption, we recommend that you save backup copies of the startup configuration file and the Cisco IOS-XE software system image file on a server.

Note To avoid losing work you have completed, be sure to save your configuration occasionally as you proceed. Use the copy running-config startup-config command to save the configuration to NVRAM.
Verifying the Initial Configuration
Enter the following commands in Cisco IOS-XE to verify the initial configuration on the router:
- show version —Displays the system hardware version, the installed software version, the names and sources of configuration files, the boot images, and the amount of installed DRAM, NVRAM, and flash memory.
- show diag —Lists and displays diagnostic information about the installed controllers, interface processors, and port adapters.
- show configuration —Helps verify if you have configured the correct hostname and password.
After you have completed and verified the initial configuration, the specific features and functions are ready to be configured. See the Cisco ASR 1000 Series Aggregation Services Routers Software Configuration Guide .
Powering Off the Cisco ASR 1000 Modular Platforms
This section explains how to shut down the Cisco ASR 1000 Modular Platforms (Cisco ASR 1013, Cisco ASR 1006-X, and Cisco ASR 1009-X routers). We recommend that before turning off all power to the chassis, you issue the reload command. This ensures that the operating system cleans up all the file systems.
To remove power from the Cisco ASR 1000 Modular Platforms safely, follow this procedure:
Step 1 Slip on the ESD-preventive wrist strap included in the accessory kit.
Step 2 Enter the reload command.
Step 3 Confirm the reload command:
Step 4 After confirming the reload command, wait until the system bootstrap message is displayed before powering off the system:
Step 5 Place the Standby switch in the Standby position.

Note The fans in the power supply modules continue to run even if the Standby switch is in the Standby position.

Note After powering off the router, wait for a minimum of 30 seconds before powering it on again.
Cisco ASR1000-RP3 Alarm Monitoring
The Cisco ASR1000-RP3 faceplate displays the CRIT, MAJ, and MIN alarm indicator LEDs. An external element can be connected to a power supply using the DB-25 alarm connector on the power supply. The external element is a DC light bulb for a visual alarm and a bell for an audible alarm.
If an alarm illuminates the CRIT, MIN, or MAJ LED on the Cisco ASR 1000 Series Route Processor (RP) faceplate, and a visual or audible alarm is wired, the alarm also activates an alarm relay in the power supply DB-25 connector (on the Cisco ASR 1006 Router and Cisco ASR 1004 Router). The bell rings or the light bulb flashes and alerts site personnel that a router alarm condition exists.

Note Shielded cables must be used to connect to the DB-25 alarm connector on both the AC and DC power supplies, in order to comply with the FCC/EN55022/CISPR22 Class A emissions requirements.
The alarm signals sent to this DB-25 connector are identical in function to those sent to the system LEDs on the Cisco ASR1000-RP1, Cisco ASR1000-RP2, and Cisco ASR1000-RP3. Each alarm consists of three contact pins that are switched when an alarm becomes active, which causes a corresponding contact closure between the DB-25 connector pins. As a result, a critical, major, or minor alarm condition detected in the router can trigger a simultaneous fault indication in some of the following ways:
- System alarm LEDs—The three system alarm LEDs on the Cisco ASR1000-RP3 faceplate constitute the standard method of alarm notification in the router. These LEDs indicate router status at all times, but you must directly observe these LEDs to become aware of a router alarm condition See Cisco ASR 1000 Series Route Processor LEDs for LED descriptions.
- External alarm monitoring facility—By equipping your router with a telco-style external alarm monitoring facility, you can provide a more physical indication of router status. A visual alarm, however, can be reset only by resolving the problem that caused the alarm condition.
An external audible alarm can be reset by clearing the condition that caused the alarm or by pressing the Audible Cutoff (ACO) button on the Cisco ASR1000-RP3 module. An audible alarm can be sounded to immediately alert you to an alarm condition in the router. An audible alarm generated by the system continues to sound until you either press the ACO button to silence the alarm or clear the alarm condition itself. Pressing this button does not resolve the alarm condition.
– Press the Audible Cut Off button on the route processor faceplate (see Figure 2-1: Cisco ASR1000-RP Route Processor Faceplate LEDs and Connectors)
– Enter the clear facility-alarm command.
- To clear a visual alarm, you must resolve the alarm condition. The clear facility-alarm command does not clear an alarm LED on the RP faceplate or turn off the DC light bulb. For example, if a critical alarm LED is illuminated because an active SPA was removed without a graceful deactivation of the SPA, the only way to resolve that alarm is to replace the SPA.
Reporting Functions
The chassis manager on the forwarding engine control processor manages the local resources of the forwarding processor. The Cisco ASR 1000 Modular Platforms (Cisco ASR 1013, Cisco ASR 1006-X, and Cisco ASR 1009-X routers) display warning messages on the console if the chassis interface-monitored parameters exceed a threshold. You can also retrieve and display environmental status reports with the following commands:
- show environment all
- show version
- show inventory
- show platform
- show platform software status control-processor
- show diag
Parameters are measured and reporting functions are updated every 60 seconds. A brief description of each of these commands follows.
The show environment all command displays temperature, voltage, fan, and power supply information.
The following is sample output from the show environment all command.
Example 5-2 show environment all Command
The show version command displays the system hardware configuration, software version, and names and sources of configuration files and boot images.
The following is sample output from the show version command:
Example 5-3 show version Command
The sh ow inventory command displays an extended report that includes the product inventory listing of all the Cisco products installed in the networking device.
The following is sample output from the show inventory command:
Example 5-4 show inventory Command
The sh ow platform command displays platform information.
The following is sample output from the show platform command:
Example 5-5 show platform Command
The show platform software status control-processor command displays the average load, memory usage, and CPU utilization levels at which the router is running. The output also specifies whether the levels of these system health parameters are within defined thresholds.

Note The output does not display SIP-related information on a monolithic router.
The following is sample output from the show platform software status control-processor command:
Example 5-6 show platform software status control-processor Command
The show diag slot R0 eeprom command displays the configuration hardware information.
The following is sample output from the show diag slot R0 eeprom command:
Example 5-7 show diag slot R0 eeprom Command