![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring the Cisco IOS Auto-Upgrade Manager
![]() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Contents
Configuring the Cisco IOS Auto-Upgrade ManagerLast Updated: November 30, 2011
The Cisco IOS Auto-Upgrade Manager (AUM) feature simplifies the software image upgrade process by providing a simple interface to specify, download, and upgrade a new Cisco IOS image. You can upgrade to a new Cisco IOS image in interactive mode by allowing the Auto-Upgrade Manager to guide you through the process. Alternatively, you can perform the upgrade by issuing a single Cisco IOS command or a series of commands. All three methods utilize the Warm Upgrade functionality to perform the upgrade and minimize downtime.
Finding Feature InformationYour software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required. Prerequisites for Cisco IOS Auto-Upgrade Manager
Restrictions for Cisco IOS Auto-Upgrade ManagerThe Cisco IOS Auto-Upgrade Manager will not run to completion if the router does not have sufficient memory resource to load and store the requested Cisco IOS software image. The Cisco IOS software image can be downloaded from www.cisco.com only if the current Cisco IOS software image running in the router is a cryptographic image. Information About Cisco IOS Auto-Upgrade Manager
Cisco IOS Auto-Upgrade Manager OverviewThe Cisco IOS Auto-Upgrade Manager streamlines the process of upgrading to a new Cisco IOS software image. You can run the Cisco IOS Auto-Upgrade Manager through the command-line interface (CLI). AUM enables the router to connect to the Cisco website (www.cisco.com) and send the cisco.com username and password for authentication. After authentication, the router passes the name of the Cisco IOS software image that is specified by the user to the Cisco server. The Cisco server returns the complete URL of the Cisco IOS software image to the router. The Cisco IOS Auto-Upgrade Manager configured on the router can then manage the entire process of upgrading to the Cisco IOS software image. AUM upgrades the router with the software image at the time specified by the user by performing the following tasks:
The figure below illustrates the workflow of the Cisco IOS Auto-Upgrade Manager. Specific Cisco IOS Software Image Download from the Cisco WebsiteYou can download a specific Cisco IOS software image from www.cisco.com. AUM uses Secure Socket Layer (SSL) for a secure connection, requiring the user to configure the certificate. The router passes the name of the Cisco IOS software image along with your username and password to log in to the www.cisco.com server. The Cisco server returns the complete URL for the specific Cisco IOS software image to the router. The Cisco IOS Auto-Upgrade Manager can then automatically download the Cisco IOS software image that you have specified from www.cisco.com, verify it, and upgrade the router with the downloaded image.
Additionally, the Cisco IOS Auto-Upgrade Manager provides the following optional services:
These services are available for download from a Cisco or non-Cisco server, both in the interactive and command line modes. Specific Cisco IOS Software Image Download from a Non-Cisco ServerYou can download a Cisco IOS software image that is present on a local or non-Cisco TFTP or FTP server. You can provide an FTP username and password using the ipftpusername and ipftppasswordglobal configuration commands for an FTP download. The Cisco IOS Auto-Upgrade Manager automates the process of downloading the specific Cisco IOS software image from a non-Cisco server and warm upgrade services. It also provides the disk clean-up utility to delete the files if the space required to download the new Cisco IOS software image is not sufficient. Interactive and Single Command Line ModeYou can download a specific Cisco IOS software image from www.cisco.com using the CLI or through the following user interfaces: Interactive ModeThe Auto-Upgrade Manager guides you through the process of upgrading to a new Cisco IOS image in the interactive mode. When you choose automatic upgrade, you are required to answer a few questions in the interactive mode to complete the device upgrade. You can initiate interactive mode by issuing the upgradeautomatic command without any options. For more details, refer to the Cisco IOS Configuration Fundamentals Command Reference. Single Command Line ModeThe non-interactive single line CLI is for advanced users. You can download and upgrade to a new Cisco IOS software image from a Cisco or non-Cisco server by using the upgradeautomaticgetversion command and specifying all the required arguments. For more details, refer to the Cisco IOS Configuration Fundamentals Command Reference. The interactive mode and single line CLI mode are applicable to downloads from Cisco and non-Cisco servers. How to Upgrade a Cisco IOS Software Image Using the Cisco IOS Auto-Upgrade Manager
Configuring the SSL Certificate for a Cisco DownloadBefore You Begin
SUMMARY STEPS
The SSL certificate must be configured to download from cisco.com. The certificate is required for secure HTTP communication. You can obtain the SSL certificate from the Cisco website (www.cisco.com) to configure it on the router. Perform the following task to obtain the SSL certificate from the Cisco website:
DETAILED STEPS
Configuring the Cisco IOS Auto-Upgrade Manager
SUMMARY STEPS
DETAILED STEPS Downloading the Cisco IOS Software ImagePerform this task to download the Cisco IOS software image from the Cisco website (www.cisco.com) or from a non-Cisco server. DETAILED STEPS
Reloading the Router with the New Cisco IOS software Image
SUMMARY STEPS
DETAILED STEPS
Canceling the Cisco IOS Software Image ReloadPerform this task to cancel a scheduled reload of a specific Cisco IOS software image. You can cancel an image reload under the following conditions:
DETAILED STEPS
Configuration Examples for Cisco IOS Auto-Upgrade Manager
Configuring the DNS Server IP Address ExampleYou should configure the DNS server IP address on the router before configuring the Cisco IOS Auto-Upgrade Manager. This sequence of events enables the router to use the ping command with a hostname rather than an IP address. You can successfully ping the Cisco website (www.cisco.com) after configuring the DNS server IP address on the router. This action also ensures that the router is connected to the Internet. The following example shows how to configure the DNS server IP address on your router. After configuring the DNS server IP address, you should be able to ping www.cisco.com successfully. configure terminal ip domain name mycompany.com ip name-server 10.2.203.1 end ping www.cisco.com Configuring the SSL Certificate for a Cisco Download ExampleYou should configure the SSL certificate of the Cisco server on the router before using the Cisco IOS Auto-Upgrade Manager to download an image from the Cisco website. The following example shows how to configure the SSL certificate: configure terminal
crypto pki trustpoint cisco_ssl_cert
enrollment terminal
revocation-check none
exit
crypto ca authenticate cisco_ssl_cert
!Enter the base 64 encoded CA certificate and end this with a blank line or the word quit
. !The console waits for the user input. Paste the SSL certificate text and press Return.
-----BEGIN CERTIFICATE-----
<The content of the certificate>
-----END CERTIFICATE-----
!Trustpoint 'cisco_ssl_cert' is a subordinate CA and holds a non self signed cert
!Trustpoint 'cisco_ssl_cert' is a subordinate CA.
!but certificate is not a CA certificate.
!Manual verification required
!Certificate has the following attributes:
! Fingerprint MD5: 49CE9018 C0CC41BA 1D2FBEA7 AD3011EF
! Fingerprint SHA1: A88EAA5D 73D63CB7 BF25197B 9C35ED97 023BB57B
% Do you accept this certificate? [yes/no]: yes
Trustpoint CA certificate accepted.
% Certificate successfully imported
Additional ReferencesRelated Documents
MIBsTechnical Assistance
Feature Information for Cisco IOS Auto-Upgrade ManagerThe following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
GlossaryCLI --command-line interface IDA or Cisco server --Intelligent Download Application Cisco IOS --Cisco Internetworking Operating System Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R) Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental. © 2011 Cisco Systems, Inc. All rights reserved.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|