Table Of Contents
Cable Commands: d through h
depi cin-failover
depi-class
depi eqam-stats
depi-tunnel
description (bonding-group)
description (cable fiber-node)
dest-ip
diagnostic load
diagnostic ondemand action-on-failure
diagnostic ondemand iterations
diagnostic unload
docsis cvc mfg
docsis cvc mso
docsis cvc test
docsis-policy
docsis-version
download
downstream
downstream cable
downstream integrated-cable rf-channel (interface)
downstream local upstream
downstream modular-cable rf-channel (interface)
downstream modular-cable rf-channel
duration
enabled (enforce-rule)
enforced qos-profile
exception pxf
facility-alarm (ubr10012)
hccp authentication
hccp authentication key-chain
hccp bypass version
hccp channel-switch
hccp check version
hccp ds-switch
hccp lockout
hccp protect
hccp resync
hccp revertive
hccp reverttime
hccp switch
hccp timers
hccp track
hccp unlockout
hccp working
hold-queue
hw-module bay reload
hw-module shutdown (ubr10012)
hw-module slot pos
hw-module slot srp
Cable Commands: d through h
Revised: August 12, 2013, OL-15510-17
New Commands
Command
|
Cisco IOS Software Release
|
downstream local upstream
|
12.3(23)BC
|
downstream modular-cable rf-channel (interface)
|
12.3(23)BC
|
downstream integrated-cable rf-channel (interface)
|
12.2(33)SCB
|
depi-class
|
12.2(33)SCC
|
depi-tunnel
|
12.2(33)SCC
|
dest-ip
|
12.2(33)SCC
|
docsis-policy
|
12.2(33)SCC
|
docsis-version
|
12.2(33)SCC
|
downstream
|
12.2(33)SCC
|
depi eqam-stats
|
12.2(33)SCE
|
depi cin-failover
|
12.2(33)SCF
|
description (bonding-group)
|
12.2(33)SCG
|
Modified Commands
Command
|
Cisco IOS Software Release
|
downstream local upstream
|
12.2(33)SCB
|
downstream modular-cable rf-channel
|
12.2(33)SCB
|
downstream modular-cable rf-channel (interface)
|
12.2(33)SCB
|
flowcontrol
|
12.2(33)SCB
|
hold-queue
|
12.2(33)SCB
|
hw-module bay reload
|
12.2(33)SCB
|
duration
|
12.2(33)SCD2
|
downstream modular-cable rf-channel (interface)
|
12.2(33)SCE
|
Replaced Commands
The following commands have been replaced by new commands beginning in the following Cisco IOS software releases:
Command
|
Replacement Command
|
Beginning Cisco IOS Release
|
enforced qos-profile
|
qos-profile enforced
|
12.3(9a)BC
|
depi cin-failover
To enable a failover when Converged Interconnect Network (CIN) failure occurs on Downstream External PHY Interface (DEPI), use the depi cin-failover command in global configuration mode. To disable the failover when the CIN fails on the DEPI, use the no form of this command.
depi cin-failover [cpu-threshold {high threshold_value low threshold_value}]
no depi cin-failover
Syntax Description
cpu-threshold
|
Configures the CPU threshold on the line card.
|
high
|
Sets the high threshold level. Default value is 95.
|
low
|
Sets the low threshold level. Default value is 85.
|
threshold_value
|
Threshold value of CPU usage in percentage. The valid range is from 0 to 100.
|
Command Default
The DEPI CIN failover configuration is disabled by default.
Command Modes
Global configuration (config)
Command History
Release
|
Modification
|
12.2(33)SCF
|
This command was introduced.
|
12.2(33)SCF4
|
This command was modified. The cpu-threshold keyword was added to the command.
|
Usage Guidelines
If DEPI Control Plane High Availability is configured, the depi cin-failover command, which is configured globally, triggers a cable line card switchover when a CIN failure occurs.
The depi cin-failover cpu-threshold command allows you to set a CPU threshold to alter when a failover due to CIN failure is allowed to happen.
•
When the high threshold is reached, a failover due to CIN failure is disabled.
•
If (and only if) the high threshold was reached, the CPU will have to drop lower than the configured low threshold before a failover due to CIN failure is enabled again.
Note
In Cisco IOS Release 12.2(33)SCE, DEPI CIN triggered failover is automatically enabled with control plane DEPI. The depi cin-failover command is introduced in Cisco IOS Release 12.2(33)SCF and is disabled by default.
Examples
The following example shows how to configure a CIN failover:
Router(config)# depi cin-failover
The following example shows how to set the CPU threshold value:
Router(config)# depi cin-failover cpu-threshold high 95 low 85
Related Commands
Command
|
Description
|
show depi tunnel
|
Displays all active control connections.
|
show depi session
|
Displays information about DEPI sessions.
|
depi-class
To create a template of Downstream External PHY Interface (DEPI) control plane configuration settings, which different pseudowire classes can inherit, and to enter the DEPI class configuration mode, use the depi-class command in global configuration mode. To remove a specific DEPI class configuration, use the no form of this command.
depi-class depi-class-name
no depi-class depi-class-name
Syntax Description
depi-class-name
|
Name of the DEPI class. The depi-class-name argument must be specified to configure multiple sets of DEPI control parameters.
|
Command Default
No DEPI classes are defined.
Command Modes
Global configuration (config)
Command History
Release
|
Modification
|
12.2(33)SCC
|
This command was introduced.
|
Usage Guidelines
The depi-class depi-class-name command allows you to configure a DEPI class template that consists of configuration settings used by different pseudowire classes. The depi-class command enters DEPI class configuration mode, where DEPI control plane parameters are configured.
You must use the same DEPI class in the pseudowire configuration at both ends of a Layer 2 control channel.
Examples
The following example shows how to enter DEPI class configuration mode to create a DEPI class configuration template for the class named SPA0:
Router# configure terminal
Router(config)# depi-class SPA0
Router(config-depi-ctrl SPA0)#
Related Commands
Command
|
Description
|
l2tp-class
|
Creates a template of Layer 2 Tunnel Protocol (L2TP) control plane configuration settings that can be inherited by different pseudowire classes and enters the L2TP class configuration mode.
|
depi-tunnel
|
Creates a template of Downstream External PHY Interface (DEPI) tunnel configuration settings, which different pseudowire classes can inherit, and enters the DEPI data session configuration mode.
|
show depi tunnel
|
Displays all active control connections.
|
show depi session
|
Displays established DEPI data sessions.
|
depi eqam-stats
To enable debugging information for Downstream External PHY Interface (DEPI) EQAM statistics on the Cisco CMTS router, use the depi eqam-stats command in global configuration mode. To disable debugging information, use the no form of this command.
depi eqam-stats
no depi eqam-stats
Syntax Description
This command has no arguments or keywords.
Command Default
The DEPI EQAM statistics configuration is enabled by default.
Command Modes
Global configuration (config)
Command History
Release
|
Modification
|
12.2(33)SCE
|
This command was introduced.
|
Usage Guidelines
Cisco RF Gateway 10 sends EQAM statistics to the Cisco CMTS router. No other EQAM supports the EQAM statistics feature.
Examples
The following example shows how to configure DEPI EQAM statistics on the Cisco CMTS router:
Router# configure terminal
Router(config)# depi eqam-stats
Related Commands
Command
|
Description
|
show depi session
|
Displays information about DEPI sessions.
|
depi-tunnel
To create a template of Downstream External PHY Interface (DEPI) tunnel configuration settings, which different pseudowire classes can inherit, and to enter the DEPI data session configuration mode, use the depi-tunnel command in the global configuration mode or subinterface configuration mode. To remove a configured DEPI tunnel, use the no form of this command.
depi-tunnel depi-tunnel-name
no depi-tunnel depi-tunnel-name
Syntax Description
depi-tunnel-name
|
Name of the DEPI tunnel.
|
Command Default
This command has no default behavior or values.
Command Modes
Global configuration (config)
Subinterface configuration (config-subif)
Command History
Release
|
Modification
|
12.2(33)SCC
|
This command was introduced.
|
Usage Guidelines
The depi-tunnel creates a template of DEPI tunnel configuration settings. The DEPI data session inherits the control plane configuration settings of a depi-control template.
The following depi data session configuration options are available in this mode:
•
l2tp-class
•
depi-class
•
dest-ip
•
tos
Examples
The following example shows how to create a template of DEPI tunnel configuration settings in the global configuration mode and enter the DEPI data session configuration mode:
Router# configure terminal
Router(config)# depi-tunnel rf6
Router(config-depi-tunnel)#
The following example shows how to create a template of DEPI tunnel configuration settings in the subinterface configuration mode:
Router(config)# interface qam 6/4.1
Router(config-subif)# depi-tunnel 0
Related Commands
Command
|
Description
|
l2tp-class
|
Creates a template of Layer 2 Tunnel Protocol (L2TP) control plane configuration settings, which different pseudowire classes can inherit, and enters the L2TP class configuration mode.
|
depi-class
|
Creates a template of Downstream External PHY Interface (DEPI) control plane configuration settings, which different pseudowire classes can inherit, and enters the DEPI class configuration mode.
|
dest-ip
|
Assigns an IP address to the destination network.
|
tos
|
Configures the Type of Service (ToS) byte in the header of Layer 2 tunneled packets.
|
show depi tunnel
|
Displays all active control connections.
|
show depi session
|
Displays established DEPI data sessions.
|
description (bonding-group)
To add a description for a bonding group on the Cisco CMTS router, use the description command in cable interface configuration mode. To remove a description for a bonding group, use the no form of this command.
description description
no description
Syntax Description
description
|
Specifies a description for the bonding group. The character-string can be up to 128 characters long.
|
Command Default
By default, description for a bonding group does not exist.
Command Modes
Interface configuration (config-if)
Command History
Release
|
Modification
|
12.2(33)SCG
|
This command was introduced.
|
Usage Guidelines
The description command adds a comment to the configuration to provide information about the bonding group.
Examples
The following example shows how to specify a description for bonding group 1:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# interface cable 8/0/0
Router(config-if)# cable upstream bonding-group 1
Router(config-upstream-bonding)# description UBG1
Router(config-upstream-bonding)# end
Router# show running interface cable 8/0/0
Building configuration...
Current configuration : 1443 bytes
downstream Modular-Cable 8/0/0 rf-channel 0-3
cable upstream max-ports 4
cable upstream bonding-group 1
Associated Features
The description command is used to configure the Upstream Channel Bonding feature.
Related Commands
Command
|
Description
|
cable fiber-node
|
Enters cable fiber-node configuration mode to configure a fiber node.
|
upstream cable connector
|
Specifies the upstream channel ports for a fiber node.
|
description (cable fiber-node)
To specify a description for a fiber node, use the description command in cable fiber-node configuration mode. To remove a description for a fiber node, use the no form of this command.
description description
no description
Syntax Description
description
|
Specifies a description for the cable fiber node. The character-string can be up to 80 characters long.
|
Command Default
If the description command is not issued, a description does not exist.
Command Modes
Cable fiber-node configuration (config-fiber-node)
Command History
Release
|
Modification
|
12.3(21)BC
|
This command was introduced for the Cisco uBR10012 router.
|
12.2(33)SCA
|
This command was integrated into Cisco IOS release 12.2(33)SCA.
|
Usage Guidelines
The description command adds a comment to the configuration to provide information about the fiber node.
Examples
The following example shows how to specify a description for fiber node 5:
Router# configure terminal
Router(config)# cable fiber-node 5
Router(config-fiber-node)# description Branch office 5
Related Commands
Command
|
Description
|
cable fiber-node
|
Enters cable fiber-node configuration mode to configure a fiber node.
|
downstream cable
|
Assigns a primary downstream channel for a fiber node.
|
downstream modular-cable rf-channel
|
Specifies the RF channels that are available for wideband channels on a fiber node.
|
upstream cable connector
|
Specifies the upstream channel ports for a fiber node.
|
dest-ip
To assign an IP address to the edge quadrature amplitude modulation (EQAM), use the dest-ip command in DEPI tunnel configuration mode. To remove a specific destination IP address, use the no form of this command.
dest-ip dest-ip-address
no dest-ip dest-ip-address
Syntax Description
dest-ip-address
|
IP address of the EQAM.
|
Command Default
This command has no default behavior or values.
Command Modes
DEPI tunnel configuration
Command History
Release
|
Modification
|
12.2(33)SCC
|
This command was introduced.
|
Usage Guidelines
The dest-ip dest-ip-address command allows you to configure the IP address of the EQAM.
Examples
The following example shows how to assign 1.3.4.155 as the destination IP address:
Router# configure terminal
Router(config)# depi-tunnel rf6
Router(config-depi-tunnel)# dest-ip 1.3.4.155
Related Commands
Command
|
Description
|
l2tp-class
|
Creates a template of Layer 2 Tunnel Protocol (L2TP) control plane configuration settings, which different pseudowire classes can inherit, and enters the L2TP class configuration mode.
|
depi-class
|
Creates a template of Downstream External PHY Interface (DEPI) control plane configuration settings, which different pseudowire classes can inherit, and enters the DEPI class configuration mode.
|
depi-tunnel
|
Specifies the name of the depi-tunnel and enters the DEPI tunnel configuration mode.
|
tos
|
Configures the Type of Service (ToS) byte in the header of Layer 2 tunneled packets.
|
show depi tunnel
|
Displays all active control connections.
|
show depi session
|
Displays established DEPI data sessions.
|
diagnostic load
To load a Field Diagnostic image to the line card for field diagnostic testing, enter the diagnostic load command.
diagnostic load {slot slot | subslot slot/subslot} image-url [autostart test {all [port port-number
| WORD]}| basic | default | per-port port-number}]
Syntax Description
slot
|
Specifies that the line card downloading the Field Diagnostic image is in a full slot as opposed to a subslot.
|
subslot
|
Specifies that the line card downloading the Field Diagnostic image is in a subslot (in other words, a half-height line card) as opposed to a full slot.
|
slot
|
Specifies the number of the slot where the line card downloading the Field Diagnostic image is located on the router.
|
subslot
|
Specifies the number of the subslot where the line card downloading the Field Diagnostic image is located on the router.
|
image-url
|
Specifies the path where the Field Diagnostic image is being downloaded from.
• If the Field Diagnostic image was saved to the router's Flash file system, enter the file system (such as disk0: or disk1:) as the image-url.
• If the Field Diagnostic image was saved to a server, the image-url will include server-type://path, where server-type is the type of server (typically either FTP or TFTP) and path is the path to the file on the TFTP server where the Field Diagnostic image has been saved.
|
autostart
|
If autostart is specified, the diagnostic testing process for the line card will begin automatically once the Field Diagnostic image has been loaded onto the line card.
|
test
|
The test option is used to specify which type of testing will occur. If the test option is not entered, the default test is used.
|
all
|
When used after the test option, specifies that all Field Diagnostic tests will be run during the testing period, including the external loopback test. When used after the port option, specifies that external loopback tests should be run on all ports on the line card.
|
port port-number
|
Specifies the port number on the interface that should perform the external loopback test.
|
WORD
|
Specifies a range of ports.
|
basic
|
Specifies that the basic Field Diagnostic test suite will be run. The basic test suite will catch most hardware problems but not run each individual test like the all test suite option. The advantage of running the basic test suite is that it takes less time to run than the other test suites.
|
default
|
Specifies that the default test suite will be run. The default test suite will run all Field Diagnostic tests for the particular line card with the exception of the external loopback test.
If no test suite or test is specified when requesting a test, the default test suite is run.
|
per-port port-number
|
Specifies that an external loopback test should be run on a specific port.
|
Command Default
If the autostart option is entered but no test is specified, the default test suite is the suite used to test the line card.
Command Modes
Priviliged EXEC
Command History
Release
|
Modification
|
12.2(16)BX
|
This command was introduced.
|
12.3(13)BC
|
This command was integrated into Cisco IOS Release 12.3(13)BC.
|
Usage Guidelines
Entering this command and successfully downloading the Field Diagnostic image will disrupt normal line card operation. To remove the Field Diagnostic image from a line card and restore normal line card operation, use the diagnostic unload command.
If the autostart option is not specified, diagnostic tests can be run on the line card after the Field Diagnostic image has been loaded by entering the diagnostic start command.
Examples
In the following example, the diagnostic load command is used to download the Field Diagnostic image in TFTP server 127.1.1.1/mytftpfolder to the line card in slot 2. If yes is entered at the prompt below, the router will be placed in Field Diagnostic mode.
Router# diagnostic load slot 2 tftp://127.1.1.1/mytftpfolder/c10k-fdiagslc-mz.1.1.bin
******************************************************************************
WARNING:The specified line card will be taken offline, please ensure that
all traffic has been redirected before executing this command.
NOTE:The "diagnostic unload <target>" command must be used after diagnostic
testing to resume normal line card operation.
******************************************************************************
Field Diagnostics Image Loading Parameters
==============================================================================
Image URL:tftp://127.1.1.1/mytftpfolder/c10k-fdiagslc-mz.1.1.bin
==============================================================================
% Are you sure that you want to perform this operation? [no]:
Related Commands
Command
|
Description
|
diagnostic event-log size
|
Sets the size of the event table.
|
diagnostic ondemand action-on-failure
|
Sets the number of errors allowed in the Field Diagnostic test before the Field Diagnostic test is stopped.
|
diagnostic ondemand iterations
|
Sets the number of times each specific Field Diagnostic test will be run when a Field Diagnostic test is initiated.
|
diagnostic start
|
Starts Field Diagnostic testing on the line card.
|
diagnostic stop
|
Stops an in-progress Field Diagnostic test.
|
diagnostic unload
|
Unloads the Field Diagnostic image from the line card and restores normal line card operation.
|
show diagnostic content
|
Shows the Field Diagnostic test list for a particular line card.
|
show diagnostic events
|
Displays the history of Field Diagnostic events since the last system reload.
|
show diagnostic ondemand settings
|
Shows the diagnostic on-demand settings.
|
show diagnostic result
|
Shows the results of the Field Diagnostic test.
|
show diagnostic ood-status
|
Displays various status information, such as line card slot and name, Field Diagnostic image status, and previous Field Diagnostic test results.
|
diagnostic ondemand action-on-failure
To set an error count limit or to stop testing once a diagnostic error event is detected, use the diagnostic ondemand action-on-failure command.
diagnostic ondemand action-on-failure [continue failure-limit | stop]
Syntax Description
continue failure-limit
|
Specifies that Field Diagnostic testing should continue on the line card after a failed test occurs. The failure-limit specifies the number of failed tests that can be detected before testing on the line card should stop. A failure-limit of 0 means testing should continue regardless of the number of failed tests.
Note The failure-limit is the number of failed tests, not errors within a single test. For example, if four errors occur during a single test, the failure-limit for that individual test would be 1, not 4.
|
stop
|
Specifies that Field Diagnostic testing should stop when an error event occurs.
|
Command Default
If this command is not entered, a default failure-limit of 0 is used. Therefore, testing will continue regardless of the number of errors unless the diagnostic ondemand action-on-failure command is used to change the default setting.
Command Modes
Privileged EXEC (#)
Command History
Release
|
Modification
|
12.2(16)BX
|
This command was introduced.
|
12.3(13)BC
|
This command was integrated into Cisco IOS Release 12.2(13)BC.
|
Usage Guidelines
The diagnostic ondemand action-on-failure settings cannot be saved to a Cisco IOS configuration file. Therefore, the diagnostic ondemand action-on-failure command will need to be re-entered each time a router is reset or power cycled if the action-on-failure settings should be maintained.
The show diagnostic ondemand settings command can be used to verify the diagnostic ondemand action-on-failure setting.
The show diagnostic events event-type error command can be used to gather additional information about an error event.
Examples
In the following example, the diagnostic on-demand iteration and action-on-failure settings are changed using diagnostic ondemand iterations and diagnostic ondemand action-on-failure. The changed settings are then confirmed using show diagnostic ondemand settings.
Router# diagnostic ondemand iterations 2
Router# diagnostic ondemand action-on-failure stop
Router# show diagnostic ondemand settings
Related CommandsAction on test failure = stop
Command
|
Description
|
diagnostic event-log size
|
Sets the size of the event table.
|
diagnostic load
|
Loads the Field Diagnostic image onto the line card.
|
diagnostic ondemand action-on-failure
|
Sets the number of errors allowed in the Field Diagnostic test before the Field Diagnostic test is stopped.
|
diagnostic ondemand iterations
|
Sets the number of times each specific Field Diagnostic test will be run when a Field Diagnostic test is initiated.
|
diagnostic start
|
Starts Field Diagnostic testing on the line card.
|
diagnostic stop
|
Stops an in-progress Field Diagnostic test.
|
show diagnostic content
|
Shows the Field Diagnostic test list for a particular line card.
|
show diagnostic events
|
Displays the history of Field Diagnostic events since the last system reload.
|
show diagnostic ondemand settings
|
Shows the diagnostic on-demand settings.
|
show diagnostic result
|
Shows the results of the Field Diagnostic test.
|
show diagnostic ood-status
|
Displays various status information, such as line card slot and name, Field Diagnostic image status, and previous Field Diagnostic test results.
|
diagnostic ondemand iterations
To set the number of times a diagnostic test or set of tests will be run when the diagnostic start command is entered, enter the diagnostic ondemand iterations command.
diagnostic ondemand iterations iteration-count
Syntax Description
iteration-count
|
The number of tests to be run each time a Field Diagnostic test is started. For instance, if the iteration-count is set at 2 and the Field Diagnostic test specifies that tests 1, 5, and 10 will be run, tests 1, 5, and 10 will all be run twice. If basic or default testing is specified and the iteration-count is 2, all basic or default tests will be run twice.
|
Command Default
The default iteration-count is 1.
Command Modes
Privileged EXEC (#)
Command History
Release
|
Modification
|
12.2(16)BX
|
This command was introduced.
|
12.3(13)BC
|
This command was integrated into Cisco IOS Release 12.3(13)BC.
|
Usage Guidelines
The diagnostic ondemand iterations settings cannot be saved to a Cisco IOS configuration file. Therefore, the diagnostic ondemand iterations command will need to be re-entered each time a router is reset or power cycled if a nondefault setting needs to be maintained.
The show diagnostic ondemand settings command can be used to verify the diagnostic ondemand iterations setting.
Examples
In the following example, the diagnostic on-demand iteration and action-on-failure settings are changed using diagnostic ondemand iterations and diagnostic ondemand action-on-failure. The changed settings are then confirmed using show diagnostic ondemand settings.
Router# diagnostic ondemand iterations 2
Router# diagnostic ondemand action-on-failure stop
Router# show diagnostic ondemand settings
Action on test failure = stop
In the following example, the diagnostic ondemand iterations command is first used to change the number of iterations per test to 2. Therefore, a Field Diagnostic test is run twice (note that the output of the diagnostic start command reflects the test being run twice).
After the initial test, the iteration-count is then changed to 3 and the same test is run. Note that the output of diagnostic start shows each test being run three times as opposed to two after the iteration-count was changed using the diagnostic ondemand iterations 3 command.
Router# diagnostic ondemand iterations 2
Router# diagnostic start slot 8 test 1
Slot 8: Running test(s) 1 may generate packets out of the card interface.
Do you want to run the selected test(s)? [no]: y
FDIAG [slot 8]> Running Field Diagnostics [Iteration #1] ...
FDIAG [slot 8]> Running MPC860 Register Test {ID=1} ...
FDIAG [slot 8]> MPC860 Register Test {ID=1} passed
FDIAG [slot 8]> Running Field Diagnostics [Iteration #2] ...
FDIAG [slot 8]> Running MPC860 Register Test {ID=1} ...
FDIAG [slot 8]> MPC860 Register Test {ID=1} passed
FDIAG [slot 8]> Total testing time = 00:00:00.500
FDIAG [slot 8]> Field Diagnostics passed with the selected test(s)
*Jun 13 16:05:48.987: %DIAG_C10K-5-TESTING_PASSED: Field Diagnostics passed with the
selected test(s) for card in slot 8
Router# diagnostic ondemand iterations 3
Router# diagnostic start slot 8 test 1
Slot 8: Running test(s) 1 may generate packets out of the card interface.
Do you want to run the selected test(s)? [no]: y
FDIAG [slot 8]> Running Field Diagnostics [Iteration #1] ...
FDIAG [slot 8]> Running MPC860 Register Test {ID=1} ...
FDIAG [slot 8]> MPC860 Register Test {ID=1} passed
FDIAG [slot 8]> Running Field Diagnostics [Iteration #2] ...
FDIAG [slot 8]> Running MPC860 Register Test {ID=1} ...
FDIAG [slot 8]> MPC860 Register Test {ID=1} passed
FDIAG [slot 8]> Running Field Diagnostics [Iteration #3] ...
FDIAG [slot 8]> Running MPC860 Register Test {ID=1} ...
FDIAG [slot 8]> MPC860 Register Test {ID=1} passed
FDIAG [slot 8]> Total testing time = 00:00:00.600
FDIAG [slot 8]> Field Diagnostics passed with the selected test(s)
*Jun 13 16:06:07.291: %DIAG_C10K-5-TESTING_PASSED: Field Diagnostics passed with the
selected test(s) for card in slot 8
Related CommandsAction on test failure = stop
Command
|
Description
|
diagnostic event-log size
|
Sets the size of the event table.
|
diagnostic load
|
Loads the Field Diagnostic image onto the line card.
|
diagnostic ondemand action-on-failure
|
Sets the number of errors allowed in the Field Diagnostic test before the Field Diagnostic test is stopped.
|
diagnostic ondemand iterations
|
Sets the number of times each specific Field Diagnostic test will be run when a Field Diagnostic test is initiated.
|
diagnostic start
|
Starts Field Diagnostic testing on the line card.
|
diagnostic stop
|
Stops an in-progress Field Diagnostic test.
|
show diagnostic content
|
Shows the Field Diagnostic test list for a particular line card.
|
show diagnostic events
|
Displays the history of Field Diagnostic events since the last system reload.
|
show diagnostic ondemand settings
|
Shows the diagnostic on-demand settings.
|
show diagnostic result
|
Shows the results of the Field Diagnostic test.
|
show diagnostic ood-status
|
Displays various status information, such as line card slot and name, Field Diagnostic image status, and previous Field Diagnostic test results.
|
diagnostic unload
To unload the Field Diagnostic on the line card and resume normal line card operation, enter the diagnostic unload command.
diagnostic unload {slot slot-number | subslot slot-number/subslot-number}
Syntax Description
slot
|
Specifies that the line card unloading the Field Diagnostic image is in a full slot as opposed to a subslot.
|
subslot
|
Specifies that the line card unloading the Field Diagnostic image is in a subslot as opposed to a full slot.
|
slot-number
|
Specifies the number of the slot where the line card unloading the Field Diagnostic image is located on the router.
|
subslot-number
|
Specifies the number of the subslot where the line card unloading the Field Diagnostic image is located on the router.
|
Command Default
No default behavior or values.
Command Modes
Privileged EXEC (#)
Command History
Release
|
Modification
|
12.2(16)BX
|
This command was introduced.
|
12.3(13)BC
|
This command was integrated into Cisco IOS Release 12.3(13)BC.
|
Usage Guidelines
The show diagnostic result output will be lost once a Field Diagnostic image is successfully unloaded off a line card. If you want to retain the results of the Field Diagnostic test, enter show diagnostic result and copy the output into a separate file before entering diagnostic unload to unload the Field Diagnostic image off the line card.
Entering this command successfully will resume normal line card operation.
If a line card needs to be placed back online immediately and a Field Diagnostic test is in progress, enter diagnostic stop to stop the in-progress Field Diagnostic test before entering diagnostic unload to unload the Field Diagnostic image off the line card.
Examples
In the following example, the Field Diagnostic image is unloaded off of the line card in slot 2. Note that the command is not successfully executed until confirmed at the screen prompt.
Router# diagnostic unload slot 2
******************************************************************************
WARNING:All Field Diagnostics test results and information will be
unavailable to both the "show diagnostic result <target>" and
"show diagnostic content <target>" commands.
To save the test results, cancel the unloading process and enter
the "show diagnostic result <target>" command. Copy the output
into a file, then re-enter the "diagnostic unload <target>" command
to restore normal line card operation.
******************************************************************************
% Are you sure that you want to perform this operation? [no]:y
FDIAG [slot 2]> Unloading the Field Diagnostics image and restoring the original run-time
image, please wait ...
FDIAG [slot 2]> Field Diagnostics image was successfully unloaded
Related Commands
Command
|
Description
|
diagnostic event-log size
|
Sets the size of the event table.
|
diagnostic load
|
Loads the Field Diagnostic image onto the line card.
|
diagnostic ondemand action-on-failure
|
Sets the number of errors allowed in the Field Diagnostic test before the Field Diagnostic test is stopped.
|
diagnostic ondemand iterations
|
Sets the number of times each specific Field Diagnostic test will be run when a Field Diagnostic test is initiated.
|
diagnostic start
|
Starts Field Diagnostic testing on the line card.
|
diagnostic stop
|
Stops an in-progress Field Diagnostic test.
|
show diagnostic content
|
Shows the Field Diagnostic test list for a particular line card.
|
show diagnostic events
|
Displays the history of Field Diagnostic events since the last system reload.
|
show diagnostic ondemand settings
|
Shows the diagnostic on-demand settings.
|
show diagnostic result
|
Shows the results of the Field Diagnostic test.
|
show diagnostic ood-status
|
Displays various status information, such as line card slot and name, Field Diagnostic image status, and previous Field Diagnostic test results.
|
docsis cvc mfg
To configure the access start times and organization name for the manufacturer's code verification certificate (CVC) to enable the DOCSIS 1.1 secure software download feature on the router, use the docsis cvc mfg command in global configuration mode. To delete this information, use the no form of this command.
Cisco uBR905 and Cisco uBR925 cable access routers, and Cisco CVA122 Cable Voice Adapter
docsis cvc mfg {codeAccessStart start-time | cvcAccessStart start-time | organization name}
no docsis cvc mfg {codeAccessStart start-time | cvcAccessStart start-time | organization name}
Syntax Description
codeAccessStart start-time
|
Specifies the code Access Start Time as a UTC time value (YYMMDDhhmmssZ) in Greenwich Mean Time.
|
cvcAccessStart start-time
|
Specifies the CVC Access Start Time as a UTC time value (YYMMDDhhmmssZ) in Greenwich Mean Time.
|
organization name
|
Specifies the name of the manufacturer of the code file. Use quotes if the name value contains more than one word.
|
Command Default
The codeAccessStart and cvcAccessStart times default to 011219000000Z (midnight on December 19, 2001 Greenwich Mean Time). The organization defaults to Cisco Systems.
Note
Typically, the default values should not be changed unless you are instructed to do so by Cisco TAC or field service engineers.
Command Modes
Global configuration
Command History
Release
|
Modification
|
12.2(15)CZ
|
This command was introduced on the Cisco uBR905 and Cisco uBR925 cable access routers, and the Cisco CVA122 Cable Voice Adapter.
|
Usage Guidelines
This command configures the access start times and organization name that are required by Appendix D in the DOCSIS BPI+ specification. The time values are specified as UTC time values in Greenwich Mean Time, with a two-digit year. If the year is between 50 and 99, it is interpreted as 1950 to 1999. If the year is between 00 and 49, it is interpreted as 2000 to 2049.
The router uses the codeAccessStart value to verify the Code Verification Signature (CVS) that is affixed to the code file downloaded using the secure software download feature. The router uses the ccvAccessStart value to verify the CVC for the code file. The router also uses the organization value to verify that the code file has been created by the proper manufacturer.
Tip
These values are the same that are set using the docsBpi2CodeMfgCodeAccessStart, docsBpi2CodeMfgCvcAccessStart, and docsBpi2CodeMfgOrgName attributes in the BPI+ MIB (DOCS-BPI2-MIB).
Examples
The following example shows the default configuration for the docsis cvc mfg commands:
Router(config)# docsis cvc mfg organization "Cisco Systems"
Router(config)# docsis cvc mfg codeAccessStart 011219000000Z
Router(config)# docsis cvc mfg cvcAccessStart 011219000000Z
Note
You must set the organization name using the docsis cvc mfg organization command before you can set either access start time.
Related Commands
Command
|
Description
|
docsis cvc mso
|
Configures the access start times and organization name for the optional MSO cosigned code verification certificate (CVC).
|
docsis cvc test
|
Tests the root CA public key and CM private key that are installed on the router.
|
docsis cvc mso
To configure the access start times and organization name for the optional Multi-Service Operator (MSO) cosigned code verification certificate (CVC) for the DOCSIS 1.1 secure software download feature, use the docsis cvc mso command in global configuration mode. To delete the information, use the no form of this command.
Cisco uBR905 and Cisco uBR925 cable access routers, and Cisco CVA122 Cable Voice Adapter
docsis cvc mso {codeAccessStart start-time | cvcAccessStart start-time | organization name}
no docsis cvc mso {codeAccessStart start-time | cvcAccessStart start-time | organization name}
Syntax Description
codeAccessStart start-time
|
Specifies the code Access Start Time as a UTC time value (YYMMDDhhmmssZ) in Greenwich Mean Time.
|
cvcAccessStart start-time
|
Specifies the CVC Access Start Time as a UTC time value (YYMMDDhhmmssZ) in Greenwich Mean Time.
|
organization name
|
Specifies the name of the manufacturer of the code file. Use quotes if the name value contains more than one word.
|
Command Default
No default values or behavior (no cosigner is used).
Command Modes
Global configuration
Command History
Release
|
Modification
|
12.2(15)CZ
|
This command was introduced on the Cisco uBR905 and Cisco uBR925 cable access routers, and the Cisco CVA122 Cable Voice Adapter.
|
Usage Guidelines
This command configures the optional cosigner access start times and organization name that are specified by Appendix D in the DOCSIS BPI+ specification. The time values are specified as UTC time values in Greenwich Mean Time, with a two-digit year. If the year is between 50 and 99, it is interpreted as 1950 to 1999. If the year is between 00 and 49, it is interpreted as 2000 to 2049.
You do not need to use this command unless the MSO or service provider is digitally signing the Cisco IOS software images that it plans to download to the Cisco cable modems. If so, then this command must be used to set the appropriate access times and organization name, so that the cable modem can properly authenticate the software images during a secure software download.
The router uses the codeAccessStart value to verify the cosigner's Code Verification Signature (CVS) that is affixed to the code file downloaded using the secure software download feature. The router uses the ccvAccessStart value to verify the cosigner's CVC that is affixed to the code file. The router also uses the organization value to verify that the code file has been signed by the proper MSO or cable operator.
Tip
These values are the same that are set using the docsdocsBpi2CodeCoSignerCodeAccessStart, Bpi2CodeCoSignerCvcAccessStart, and docsBpi2CodeCoSignerOrgName attributes in the BPI+ MIB (DOCS-BPI2-MIB).
Examples
The following example shows the docsis cvc mso commands being used to configure the router for a cosigned CVC from an organization named "MSO Organization" and with certificate access times of midnight on March 1, 2002 Greenwich Mean Time:
Router(config)# docsis cvc mfg organization "MSO Organization"
Router(config)# docsis cvc mfg codeAccessStart 020301000000Z
Router(config)# docsis cvc mfg cvcAccessStart 020301000000Z
Note
You must set the organization name using the docsis cvc mso organization command before you can set either access start time.
Related Commands
Command
|
Description
|
docsis cvc mfg
|
Configures the access start times and organization name for the manufacturer's code verification certificate (CVC).
|
docsis cvc test
|
Tests the root CA public key and CM private key that are installed on the router.
|
docsis cvc test
To test the root CA public key and CM private key that are installed on the router, use the docsis cvc test command in global configuration mode.
Cisco uBR905 and Cisco uBR925 cable access routers, and Cisco CVA122 Cable Voice Adapter
docsis cvc test
Syntax Description
This command has no arguments or keywords.
Command Default
No default behavior or values.
Command Modes
Global configuration
Command History
Release
|
Modification
|
12.2(15)CZ
|
This command was introduced on the Cisco uBR905 and Cisco uBR925 cable access routers, and the Cisco CVA122 Cable Voice Adapter.
|
Usage Guidelines
This command verifies that the root CA public key and the private key that are installed in the router at the factory are valid. The command uses the root CA public key to encrypt a string, and then it uses the router's private key to decrypt the key.
Typically, the root CA public key and private key are installed at the factory and never need to be updated. However, DOCSIS allows the keys to be updated as part of the secure software download procedure. If this occurs, you can use the docsis cvc test command to verify that the keys are valid and are properly installed.
Examples
The following example shows a typical successful result of the docsis cvc test command:
Router(config)# docsis cvc test
Encrypted sting: This is a test
Encrypt result: xxxxxxxxxxxxxxxxxxxxxxxxxxx
Decrypt result: This is a test
Note
If the decrypt result is not "This is a test," then the test failed, which indicates that either the public key or the private key is not valid.
Related Commands
Command
|
Description
|
docsis cvc mfg
|
Configures the manufacturer's CVC access start time and organization values.
|
docsis cvc mso
|
Configures the MSO cosigned CVC access start time and organization values.
|
docsis-policy
To assign a policy to a DOCSIS load balancing group, use the docsis-policy command in the config-lb-group configuration mode. The policy becomes the default policy assigned to the CM, if the CM does not choose a different policy. To remove the assigned policy, use the no form of this command.
docsis-policy n
no docsis-policy
Syntax Description
n
|
Load balancing group policy number. The policy number can range from 0 to 4294967295.
|
Command Default
No default behavior or values.
Command Modes
DOCSIS load balancing group mode (config-lb-group)
Command History
Release
|
Modification
|
12.2(33)SCC
|
This command was introduced.
|
Examples
The following example shows how to assign a policy to a DOCSIS load balancing group on the CMTS, using the docsis-policy command.
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# cable load-balance docsis-group 1
Router(config-lb-group)# docsis-policy 1
Config: Last Batch 0, 63 bytes
cable load-balance docsis-group 1 index 81
Related Commands
Command
|
Description
|
cable load-balance docsis-group
|
Configures a DOCSIS load balancing group on the CMTS.
|
show cable load-balance docsis-group
|
Displays real-time configuration, statistical, and operational information for load balancing operations on the router.
|
docsis-version
To configure the DOCSIS version of the CM for the CMTS tag, use the docsis-version command in the cmts-tag configuration mode. To remove the configured DOCSIS version from the CMTS tag, use the no form of this command.
[exclude] docsis-version docsis-version
no docsis-version docsis-version
Syntax Description
exclude
|
(Optional) Configures the CMTS tag to exclude the specified DOCSIS version.
|
docsis-version
|
DOCSIS version for the CMTS tag. You can select one of the following DOCSIS versions to match the DOCSIS modems:
• docsis10 - Matches DOCSIS 1.0 modems
• docsis11 - Matches DOCSIS 1.1 modems
• docsis20 - Matches DOCSIS 2.0 modems
• docsis30 - Matches DOCSIS 3.0 modems.
|
Command Default
No default behavior or values.
Command Modes
CMTS tag mode (cmts-tag)
Command History
Release
|
Modification
|
12.2(33)SCC
|
This command was introduced.
|
Examples
The following example shows how to configure the specified DOCSIS version for the CMTS tag using the docsis-version command:
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# cable tag 1
Router(cmts-tag)# docsis-version docsis10
Related Commands
Command
|
Description
|
cable load-balance docsis-group
|
To configure a DOCSIS load balancing group on the CMTS.
|
show cable load-balance docsis-group
|
To display real-time configuration, statistical and operational information for load balancing operations on the router.
|
cable tag
|
To configure a tag for a DOCSIS load balancing group on the CMTS.
|
download
To create a DOCSIS configuration file that instructs the CM to download a new software image, use the download command in cable config-file configuration mode. To disable the specification, use the no form of this command.
download {image filename [oui oui-list] | server ip-address}
no download {image filename [oui oui-list] | server ip-address}
Note
Because of conflicts with other Cisco IOS commands, you cannot abbreviate the no form of this command. You must specify the complete command name and option, such as no download image or no download server.
Syntax Description
image filename
|
Specifies to download an image file.
|
oui oui-list
|
Specifies the list of Organizational Unique Identifiers (OUIs), up to a maximum of 8. (An OUI is the first 3 octets of the CM MAC address and typically indicates the vendor for the CM.)
|
server ip-address
|
Specifies the TFTP server IP address. If no IP address is specified, the CM defaults to using the same TFTP server that provided the configuration file.
|
Command Default
The CM does not download a new software image.
Command Modes
Cable config-file configuration
Command History
Release
|
Modification
|
12.1(2)EC1
|
This command was introduced.
|
12.2(4)BC1
|
Support was added to the Release 12.2 BC train.
|
Usage Guidelines
This command sets the Software Upgrade Filename and Software Upgrade TFTP Server fields in the DOCSIS configuration file. The DOCSIS specification allows the DOCSIS configuration file to specify that the CM must be running a particular software image. If the CM is not currently using that image, it must then download the image before continuing the registration process. For security, performance, and scalability reasons, a particular TFTP server can be specified from which the CM must download the new software image.
The filename specified by download image command must be a fully qualified file and pathname that exactly matches the file and pathname as they exist on the TFTP download server. For example, if the software image is named ubr920-k1v4y556i-mz and is in a subdirectory named cisco_cms on the TFTP server, the filename specified with this command should be cisco_cms/ubr920-k1v4y556i-mz.
If the oui-list parameter is specified, the download image filename is provided only to the CMs that contain those particular OUIs. This helps ensure that the CM does not download a software image that is intended for another vendor's CMs.
Note
For each configuration file, multiple download images can be specified. Because each filename can be listed only once, entering a different list of OUIs for a single filename clears the old list. To support more than eight OUIs with the same file, use a different download software image name, and create a duplicate file or alias on the TFTP server.
The download server command is not required. If it is not specified, the CM uses the same server that provided its DOCSIS configuration file. However, the download server command requires that the image filename also be specified using the download image command.
Examples
The following command shows how to setup a DOCSIS configuration file so that the cable modem will upgrade its software image:
Router(config)# cable config-file upgrade.cm
Router(config-file)# download image ubr920-k1v4y556i-mz.121-3a.T1 oui 00.50.73 00.D0.BA
00.D0.58 00.01.96
Router(config-file)# download server 10.15.24.33
Router(config-file)# exit
Related Commands
Command
|
Description
|
cable config-file
|
Creates a DOCSIS configuration file and enters configuration file mode.
|
access-denied
|
Disables access to the network.
|
channel-id
|
Specifies upstream channel ID.
|
cpe max
|
Specifies CPE information.
|
frequency
|
Specifies downstream frequency.
|
option
|
Provides config-file options.
|
privacy
|
Specifies privacy options for baseline privacy images.
|
service-class
|
Specifies service class definitions for the configuration file.
|
snmp manager
|
Specifies Simple Network Management Protocol (SNMP) options.
|
timestamp
|
Enables time-stamp generation.
|
downstream
To set downstream radio frequency (RF) channels, use the downstream command in the config-lb-group configuration mode. To reset the downstream RF channels, use the no form of this command.
Cisco uBR7200 Series Routers
downstream cable {slot/port}
no downstream cable {slot/port}
Cisco uBR10012 Router
downstream {cable {slot/subslot/port} | Integrated-Cable {slot/subslot/bay} {rf-channel group
list}| Modular-Cable {slot/subslot/bay}{rf-channel group list}}
no downstream {cable {slot/subslot/port} | Integrated-Cable {slot/subslot/bay} {rf-channel
group list}| Modular-Cable {slot/subslot/bay}{rf-channel group list}}
Syntax Description
cable {slot/port}
|
Specifies the CMTS interface slot and port numbers.
|
cable {slot/subslot/port}
|
Specifies the CMTS interface slot, subslot, and port numbers.
|
Integrated-Cable {rf-channel group list}{slot/subslot/bay}
|
Specifies the integrated cable interface with the list of port numbers that range in the associated RF channel. Slot, subslot, and bay numbers of the integrated cable interface is also specified.
|
Modular-Cable {rf-channel group list}} {slot/subslot/bay}
|
Specifies the modular cable interface with the list of port numbers that range in the associated RF channel. It also specifies slot, subslot, and bay numbers of the modular cable interface.
|
Command Default
No default behavior or values.
Command Modes
DOCSIS load balancing group mode (config-lb-group)
Command History
Release
|
Modification
|
12.2(33)SCC
|
This command was introduced.
|
Examples
The following example shows how to set downstream RF channels to a DOCSIS load balancing group on the CMTS, using the downstream command.
Router# configure terminal
Enter configuration commands, one per line. End with CNTL/Z.
Router(config)# cable load-balance docsis-group 1
Router(config-lb-group)# downstream cable 1/1
Router(config-lb-group)# downstream Integrated-Cable 5/0/0 rf-channel 2
Router(config-lb-group)# downstream Modular-Cable 1/0/0 rf-channel 4
Related Commands
Command
|
Description
|
cable load-balance docsis-group
|
Configures a DOCSIS load balancing group on the CMTS.
|
show cable load-balance docsis-group
|
Displays real-time configuration, statistical, and operational information for load balancing operations on the router.
|
downstream cable
To assign a primary downstream channel for a fiber node, use the downstream cable command in cable fiber-node configuration mode. To remove a primary downstream channel for a fiber node, use the no form of the command.
downstream cable slot/subslot/port
no downstream cable slot/subslot/port
Syntax Description
slot
|
The slot used for the cable interface line card. Valid values are 5 to 8.
|
subslot
|
The subslot used for the cable interface line card. Valid values are 0 or 1.
|
port
|
The downstream port that can be used as a primary downstream channel. Valid values are 0 to 4.
|
Command Default
If the downstream cable command is not issued, no primary downstream channel is assigned to the fiber node.
Command Modes
Cable fiber-node configuration
Command History
Release
|
Modification
|
12.3(21)BC
|
This command was introduced for the uBR10012 router.
|
12.2(33)SCA
|
This command was integrated into Cisco IOS Release 12.2(33)SCA.
|
Usage Guidelines
For each fiber node, a traditional DOCSIS downstream channel is used to carry MAC management and signaling messages, and the associated traditional DOCSIS upstream channel is used for return data traffic and signaling. The traditional DOCSIS downstream channel used in this way is called the primary downstream channel.
The downstream cable command assigns a primary downstream channel for a fiber node. Each fiber node must be assigned at least one primary downstream channel and can be assigned multiple primary downstream channels. Cisco IOS software decides which primary downstream channel to use for the fiber node from the set of channels assigned with downstream cable. Assigning more than one primary channel to a fiber node with the downstream cable command can be useful for load-balancing purposes.
Note
If the primary downstream channel for the fiber node is assigned from a SPA downstream, then the downstream cable command is not required.
If a wideband-capable modem registers as a traditional DOCSIS 2.0 modem, it will register on a downstream channel as follows:
•
If the modem's fiber node has been assigned a primary downstream channel with the downstream cable command, the modem registers on that downstream channel.
If the modem's fiber node has not been assigned a primary downstream channel with the downstream cable command, the modem can register on any downstream channel that is visible to it.
For more information on using this command, refer to the Cisco uBR10012 Universal Broadband Router SIP and SPA Software Configuration Guide.
Examples
The following example shows how to assign a primary downstream channel for fiber node 5. The primary downstream channel is the downstream port located on the cable interface line card at slot/subslot/port 6/0/0.
Router# configure terminal
Router(config)# cable fiber-node 5
Router(config-fiber-node)# downstream cable 6/0/0
Related Commands
Command
|
Description
|
cable fiber-node
|
Enters cable fiber-node configuration mode so that you can configure a fiber node.
|
description (cable fiber-node)
|
Specifies a description for a fiber node.
|
downstream modular-cable rf-channel
|
Specifies the RF channels that are available for wideband channels on a fiber node.
|
upstream cable connector
|
Specifies the upstream channel ports for a fiber node.
|
downstream integrated-cable rf-channel (interface)
To associate a set of upstream channels to the integrated downstream channels, use the downstream integrated-cable rf-channel command in interface configuration mode.
downstream integrated-cable slot/card/port rf-channel rf-channels [upstream grouplist]
Syntax Description
slot
|
Identifies the chassis slot where the Cisco cable interface line card resides.
• Cisco uBR10012 router—The valid range is from 5 to 8.
• Cisco uBR7225VXR router—The valid value is 1 or 2.
• Cisco uBR7246VXR router—The valid range is from 3 to 6.
|
card
|
(Cisco uBR10012 only) Secondary slot number of the cable interface line card. The valid subslots are 0 or 1.
|
port
|
Downstream port number.
• Cisco uBR7225VXR router and Cisco uBR7246VXR router—The valid value is 0 or 1.
• Cisco uBR10012 router—The valid range is from 0 to 4.
|
rf-channel rf-channel
|
Specifies association of the downstream channels to the channel group descriptor. The valid range is from 0 to 3.
|
upstream grouplist
|
Specifies the logical identifier of upstream channels serving these downstream RF channels. The valid range is from 0 to 7.
|
Command Default
No default upstream channels are configured with the integrated downstream channels.
Command Modes
Interface configuration (config-if)
Command History
Release
|
Modification
|
12.2(33)SCB
|
This command was introduced.
|
Examples
The following example shows how to use the downstream integrated-cable rf-channel command on the Cisco uBR10012 router.
Router# configure terminal
Router(config)# interface cable 7/0/0
Router(config-if)# downstream integrated-Cable 7/0/0 rf-channel 1 upstream 1
Associated Features
The downstream integrated-cable rf-channel command is used to configure the following:
•
Configuring the Cisco UBR-MC20X20V Cable Interface Line Card
•
Configuring the Cisco uBR-MC88V Cable Interface Line Card
Related Commands
Command
|
Description
|
cable upstream max-ports
|
Configures the maximum number of upstreams on a MAC domain on a line card.
|
downstream local upstream
To restrict the set of Cisco uBR10-MC5X20 upstreams associated with the Cisco uBR10-MC5X20 downstreams, use the downstream local upstream command in interface configuration mode.
downstream local upstream grouplist
Syntax Description
grouplist
|
Specifies the number of upstreams associated with the Cisco uBR10-MC5X20 downstream channels.
|
Command Default
All upstreams under the cable interface are associated with the Cisco uBR10-MC5X20 downstreams.
Command Modes
Interface configuration mode (config-if)
Command History
Release
|
Modification
|
12.3(23)BC
|
This command was introduced for the Cisco uBR10012 router.
|
12.2(33)SCB
|
This command was integrated into Cisco IOS Release 12.2(33)SCB.
|
Usage Guidelines
Use this command to restrict a set of Cisco uBR10-MC5X20 upstreams to Cisco uBR10-MC5X20 downstreams. This restricts MAC management messages (MMM) to be sent to the specified upstreams only.
Examples
The following example shows how the downstream local upstream command is used in the
Cisco uBR10012 router.
Router# configure terminal
Router (config)# interface cable 5/1/0
Router(config-if)# downstream local upstream 0-1
Related Commands
Command
|
Description
|
downstream cable
|
Assigns a primary downstream channel for a fiber node.
|
downstream modular-cable rf-channel (interface)
To associate a set of Cisco uBR10-MC5X20 upstreams with individual modular downstream channels from the SPA into a given cable MAC domain, use the downstream modular-cable rf-channel command in interface configuration mode.
Cisco IOS Release 12.3(23)BC
downstream modular-cable slot/subslot/bay rf-channel rf channels [upstream grouplist]
Cisco IOS Release 12.2(33)SCB and later
downstream modular-cable slot/bay/port rf-channel rf channels [upstream grouplist]
Cisco IOS Release 12.2(33)SCE and later
downstream modular-cable slot/subslot/controller rf-channel rf channels [upstream grouplist]
Syntax Description
slot
|
Slot where a SIP resides. On the Cisco uBR10012 router, slots 1 and 3 can be used for SIPs.
For the Cisco uBR-MC3GX60V cable interface line card, the cable interface slot values range from 5 to 8.
|
subslot
|
Subslot where a SIP resides. On the Cisco uBR10012 router, subslot 0 is always specified.
|
bay
|
Bay in a SIP where a SPA is located. The valid values are 0 (upper bay) and 1 (lower bay).
|
port
|
Interface number on the SPA.
|
controller
|
Modular-Cable controller number. The valid values are 0 to 2.
Note This option is available only on the Cisco uBR-MC3GX60V cable interface line card and on the Cisco router running Cisco IOS Release 12.2(33)SCE and later releases.
|
rf-channel
|
Specifies the association of a continuous range of RF channels within the SPA downstream.
|
rf channels
|
Range of RF channel physical ports on the SPA FPGA.
|
upstream
|
Specifies a set of ranges of upstream to allow association of a noncontiguous list of upstreams to one or more SPA downstreams. If the range is not specified, all the upstreams in the MAC domain are associated.
|
grouplist
|
Number of upstreams with the modular cable downstream channel.
|
Command Default
By default, all upstream channels in an interface are associated with the modular downstream channels in the same interface.
Command Modes
Interface configuration (config-if)
Command History
Release
|
Modification
|
12.3(23)BC
|
This command was introduced for the Cisco uBR10012 router.
|
12.2(33)SCB
|
This command was integrated into Cisco IOS Release 12.2(33)SCB. This command was modified to change the addressing format for the modular cable interface from slot/subslot/bay to slot/bay/port.
|
12.2(33)SCE
|
This command was modified to change the valid range of slot.
|
Usage Guidelines
Use this command to create primary-capable channels by associating a single or a set of
Cisco uBR10-MC 5X20 upstream channels with individual modular downstream channels on a fiber node. When a primary-capable channel is created, the same modular downstream channel cannot be used as a primary-capable channel in another MAC domain. However, it can be used as non-primary-capable channel in another MAC domain.
Examples
The following example shows how to use the downstream modular-cable rf-channel command on the Cisco uBR10012 router.
Router# configure terminal
Router (config)# interface cable 5/1/0
Router(config-if)# downstream modular-cable 1/0/0 rf-channel 0-2 upstream 0-1 4-5
Related Commands
Command
|
Description
|
downstream modular-cable rf-channel
|
Specifies the RF channels that are available for wideband channels on a fiber node.
|
rf-channel cable downstream channel-id
|
Assigns a downstream channel ID to an RF channel.
|
downstream modular-cable rf-channel
To specify the RF channels that are available for wideband channels on a fiber node, use the downstream modular-cable rf-channel command in cable fiber-node configuration mode. To remove RF channels that are available for wideband channels on a fiber node, use the no form of this command.
Cisco IOS Release 12.3(23)BC
downstream modular-cable slot/subslot/bay rf-channel {rf-port | low-high}
no downstream modular-cable slot/subslot/bay rf-channel {rf-port | low-high}
Cisco IOS Release 12.2(33)SCB
downstream modular-cable slot/bay/port rf-channel {rf-port | low-high}
no downstream modular-cable slot/bay/port rf-channel {rf-port | low-high}
Syntax Description
slot
|
The slot where a SIP resides. On the Cisco uBR10012 router, slots 1 and 3 can be used for SIPs.
|
subslot
|
The subslot where a SIP resides. On the Cisco uBR10012 router, subslot 0 is always specified.
|
bay
|
The bay in a SIP where a SPA is located. Valid values are 0 (upper bay) and 1 (lower bay).
|
port
|
Specifies the interface number on the SPA.
|
rf-port
|
Specifies the RF channel physical port on the Wideband SPA FPGA. Valid values for rf-port depend on the configuration set with the annex modulation command.
|
low-high
|
A range of RF channel physical ports on the Wideband SPA FPGA. The low and high values are separated by a hyphen.
|
Command Default
If the downstream modular-cable rf-channel command is not issued, no RF channels are configured for wideband channels on the fiber node.
Command Modes
Cable fiber-node configuration (fiber-node)
Command History
Release
|
Modification
|
12.3(21)BC
|
This command was introduced for the Cisco uBR10012 router.
|
12.2(33)SCA
|
This command was integrated into Cisco IOS Release 12.2(33)SCA.
|
12.2(33)SCB
|
This command was modified to change the addressing format for the modular cable interface from slot/subslot/bay to slot/bay/port.
|
Usage Guidelines
The downstream modular-cable rf-channel command makes RF channels available for use on a fiber node. Fiber node software configuration mirrors the physical topology of the cable network. The cable rf-channel command configures the RF channels that will be used for a wideband channel on a Wideband SPA.
The Cisco uBR10012 router supports two Wideband SPAs. Each Wideband SPA supports up to 24 RF channels depending on how the SPA is configured with the annex modulation command.
Note
Effective with Cisco IOS Release 12.3(23)BC, the annex modulation command is obsolete and annex and modulation are included as keyword options in the rf-channel frequency command.
•
For annex A and 256 QAM, each Wideband SPA supports 18 RF channels. In this case, valid values for the rf-port argument are 0 to 17.
•
For all other cases, the SPA supports 24 RF channels. In these cases, valid values for the rf-port argument are 0 to 23.
A fiber node can be configured to have RF channels from one or both Wideband SPAs. However, a wideband channel cannot be comprised of RF channels from two different SPAs.
Each time the downstream modular-cable rf-channel command is issued for a fiber node, the set of RF channels that are available for use on that fiber node is added to in a cumulative manner. For example, if the following downstream modular-cable rf-channel commands were issued, the set of RF channels available for fiber node 1 is RF channels 0 to 10 on the Wideband SPA in slot/subslot/bay 1/0/0.
Router# configure terminal
Router(config)# cable fiber-node 1
Router(config-fiber-node)# downstream modular-cable 1/0/0 rf-channel 0-5
Router(config-fiber-node)# downstream modular-cable 1/0/0 rf-channel 6-10
Examples
The following example shows how to specify that RF channels 0 to 7 on a Wideband SPA will be available for use on fiber node 5. The Wideband SPA is located in slot/subslot/bay 1/0/0.
Router# configure terminal
Router(config)# cable fiber-node 5
Router(config-fiber-node)# downstream modular-cable 1/0/0 rf-channel 0-7
Related Commands
Command
|
Description
|
cable fiber-node
|
Enters cable fiber-node configuration mode to configure a fiber node.
|
description (cable fiber-node)
|
Specifies a description for a fiber node.
|
downstream cable
|
Assigns a primary downstream channel for a fiber node.
|
upstream cable connector
|
Specifies the upstream channel ports for a fiber node.
|
duration
To specify the time period and sample rate to be used for monitoring subscribers, use the duration command in enforce-rule configuration mode. To reset an enforce-rule to its default values, use the no form of this command.
duration minutes avg-rate rate sample-interval minutes [penalty minutes] {upstream |
downstream} [enforce]
no duration
Syntax Description
minutes
|
Specifies the size of the sliding window (in minutes) during which subscriber usage is monitored. The valid range is 10 to 44640 with a default of 360 (6 hours).
|
avg-rate rate
|
Specifies the average sampling rate in kilobits per second for the specified duration. The valid range is 1 to 400000 kilobits with no default.
|
sample-interval minutes
|
Specifies how often (in minutes) the CMTS router should sample a service flow to get an estimate of subscriber usage. The valid range is 1 to 30, with a default value of 15.
|
penalty minutes
|
(Optional) Specifies the period (in minutes) during which a cable modem (CM) can be under penalty. The valid range is 1 to 10080.
|
upstream
|
Specifies monitoring of traffic in the upstream direction.
|
downstream
|
Specifies monitoring of traffic in the downstream direction.
|
enforce
|
(Optional) Specifies that the enforce-rule QoS profile should be applied automatically if a user violates their registered QoS profile.
|
Command Default
The duration value defaults to 360 minutes (6 hours), and the sample-interval value defaults to 15 minutes.
Command Modes
Enforce-rule configuration (enforce-rule)
Command History
Release
|
Modification
|
12.3(9a)BC
|
This command was introduced. This command replaces the monitoring-duration command.
|
12.2(33)SCA
|
This command was integrated into Cisco IOS Release 12.2(33)SCA. Support for the Cisco uBR7225VXR router was added.
|
12.2(33)SCD2
|
The penalty keyword option was added.
|
Usage Guidelines
Note
This command is applicable only after the monitoring-basics command is configured with the keyword legacy.
When you enable an enforce-rule, the CMTS router periodically checks the bandwidth being used by subscribers to determine whether any subscribers are consuming more bandwidth than that specified by the avg-rate configured in enforce-rule. The CMTS router keeps track of subscribers using a sliding window that begins at each sample interval and continues for the duration period and average rate.
For example, with the default sample interval of 15 minutes and the default sliding window period of 360 minutes, the CMTS router samples the bandwidth usage every 15 minutes and counts the total bytes transmitted at the end of each 360-minute period. Each sample interval begins a new sliding window period for which the CMTS router keeps track of the total bytes transmitted.
Note
Changing the duration minutes, avg-rate rate, or sample-interval minutes values resets the byte counters for that particular enforce-rule and begins a new sliding window period.
When you change the configuration of a currently active enforce-rule, that rule begins using the new configuration immediately to manage the cable modems tracked by this enforce-rule.
The penalty duration, which is configured using this command, is unique to weekdays, and takes precedence over the global penalty duration configured using the penalty-period command.
When you use the show running-configuration command to display the configuration, the keyword options for the duration command are truncated. In the following example, "pen" represents penalty, "do" represents downstream, and "enf" represents enforce:
Router# show running-configuration
duration 10 avg-rate 1 sample-interval 10 pen 11 do enf
For more information about the Subscriber Traffic Management feature and to see an illustration of a sample monitoring window, refer to the Subscriber Traffic Management for the Cisco CMTS Routers feature document on Cisco.com.
Examples
The following example shows an enforce-rule being configured for a sliding window that is 20 minutes in length, an avg-rate of 1 kilobit per second, and a sampling interval of every 10 minutes.
Router# configure terminal
Router(config)# cable qos enforce-rule residential
Router(enforce-rule)# duration 20 avg-rate 1 sample-interval 10 penalty 11 do enf
Related Commands
Command
|
Description
|
cable qos enforce-rule
|
Creates an enforce-rule to enforce a particular QoS profile for subscriber traffic management and enters enforce-rule configuration mode.
|
enabled (enforce-rule)
|
Activates an enforce-rule and begins subscriber traffic management on a Cisco CMTS router.
|
debug cable subscriber-monitoring
|
Displays enforce-rule debug messages for subscriber traffic management on the Cisco CMTS routers.
|
monitoring-basics
|
Specifies the type of monitoring for subscriber traffic management on a Cisco CMTS router.
|
peak-time1
|
Specifies peak and offpeak monitoring times on a Cisco CMTS router.
|
penalty-period
|
Specifies the period for which an enforced quality of service (QoS) profile should be in force for subscribers who violate their registered QoS profile.
|
qos-profile registered
|
Specifies the registered QoS profile that should be used for this enforce-rule. This command is applicable only for DOCSIS 1.0 cable modems.
|
qos-profile enforced
|
Specifies a QoS profile that should be enforced when users violate their registered QoS profile. This command is applicable only for DOCSIS 1.0 cable modems.
|
service-class (enforce-rule)
|
Specifies a service class (enforced or registered) that should be used for cable modem monitoring in an enforce-rule. This command is applicable for DOCSIS 1.1 or later cable modems.
|
show cable qos enforce-rule
|
Displays the QoS enforce-rules that are currently defined.
|
show cable subscriber-usage
|
Displays subscribers who are violating their registered QoS profiles.
|
weekend duration
|
Configures different subscriber monitoring options over weekends on a Cisco CMTS router.
|
enabled (enforce-rule)
To activate an enforce-rule and begin subscriber traffic management on a Cisco CMTS router, use the enabled command in enforce-rule configuration mode. To disable the enforce-rule without deleting it, use the no form of this command.
enabled
no enabled
Syntax Description
This commands has no keywords or arguments.
Command Default
Enforce-rules are disabled.
Command Modes
Enforce-rule configuration (enforce-rule)
Command History
Release
|
Modification
|
12.2(15)BC1
|
This command was introduced.
|
12.3(9a)BC
|
This command was integrated into Cisco IOS Release 12.3(9a)BC.
|
12.2(33)SCA
|
This command was integrated into Cisco IOS Release 12.2(33)SCA. Support for the Cisco uBR7225VXR router was added.
|
12.2(33)SCB
|
This command was integrated into Cisco IOS Release 12.2(33)SCB.
|
Usage Guidelines
An enforce-rule is created and configured using the cable qos enforce-rule command, but it is not activated until you run the enabled command. Use the no enabled command to disable an enforce-rule without removing it from the CMTS configuration. When you disable an enforce-rule, all cable modems with that rule's registered QoS profile are no longer tracked by the Subscriber Traffic Management feature and all cable modems in penalty are moved to their registered QoS profile.
Examples
The following example shows an enforce-rule being enabled:
Router# configure terminal
Router(config)# cable qos enforce-rule residential
Router(enforce-rule)# enabled
The following example shows an enforce-rule being disabled. The rule remains in the CMTS configuration file.
Router# configure terminal
Router(config)# cable qos enforce-rule residential
Router(enforce-rule)# no enabled
Related Commands
Command
|
Description
|
cable qos enforce-rule
|
Creates an enforce-rule to enforce a particular QoS profile for subscriber traffic management and enters enforce-rule configuration mode.
|
qos-profile enforced
|
Specifies a QoS profile that should be enforced when users violate their registered QoS profiles.
|
duration
|
Specifies the time period and sample rate to be used for monitoring subscribers.
|
penalty-period
|
Specifies the time period that an enforced QoS profile should be in effect for subscribers that violate their registered QoS profiles.
|
qos-profile registered
|
Specifies the registered QoS profile that should be use for this enforce-rule.
|
show cable qos enforce-rule
|
Displays the QoS enforce-rules that are currently defined.
|
show cable subscriber-usage
|
Displays subscribers who are violating their registered QoS profiles.
|
enforced qos-profile
Note
Effective with Cisco IOS Release 12.3(9a)BC, the enforced qos-profile command is replaced by the qos-profile enforced command.
To specify a quality of service (QoS) profile that should be enforced when users violate their registered QoS profiles, use the enforced qos-profile command in enforce-rule configuration mode. To delete the enforced QoS profile from the enforce-rule, use the no form of this command.
enforced qos-profile profile-id [no-persistence]
no enforced qos-profile profile-id [no-persistence]
Syntax Description
profile-id
|
Specifies the QoS profile to be enforced. The valid range is 0 to 16383, with a default of 0.
|
no-persistence
|
(Optional) Specifies that the enforced QoS profile should not remain in force when a cable modem reboots. Instead, when a cable modem (CM) that is in the penalty period reboots, it is automatically removed from the penalty period and assigned the QoS profile that is specified in its DOCSIS configuration file.
The default is without this option, so that enforced QoS profiles remain in effect for cable modems across reboots.
|
Command Default
The profile ID defaults to 0, and enforced QoS profiles are persistent across cable modem reboots.
Command Modes
Enforce-rule configuration (enforce-rule)
Command History
Release
|
Modification
|
12.2(15)BC1
|
This command was introduced.
|
12.3(9a)BC
|
This command was replaced by the qos-profile enforced command.
|
Usage Guidelines
Both the originally provisioned QoS profile and the enforced QoS profile must be created on the Cisco CMTS router. This command does not support profiles that are created by the cable modem.
An enforce-rule can specify an enforced QoS profile, which is automatically applied to subscribers that transmit more traffic than what is allowed by their registered QoS profile. The enforced QoS profile remains in effect during the penalty time period (see the penalty-period command). At the end of the penalty period, the subscriber returns to their registered QoS profile.
If a cable modem reboots while it is in its penalty time period, it continues using the enforced QoS profile, unless the service provider has manually changed the cable modem's registered QoS profile using the cable modem qos profile command.
When you change the enforced QoS profile for a currently active enforce-rule, any cable modems using this rule that are currently in the penalty period continue using the previously configured enforced QoS profile. Any cable modems that enter the penalty period after this configuration change, however, use the new enforced QoS profile.
An enforced QoS profile must already have been created on the Cisco CMTS router before you can assign it to an enforce-rule. If the rule does not exist, the system displays an error message.
When the no-persistence option is specified, the enforced QoS profile is still automatically applied to subscribers that violate their bandwidth requirements. However, when the cable modem reboots, the Cisco CMTS router allows the cable modem to use the QoS profile that is specified in its DOCSIS configuration file.
The no-persistence option can be used when initially using subscriber traffic management to identify potential problem applications and users. When repeat offenders are identified, they can then be assigned enforce-rules that do not use the no-persistence option, so that they remain in the penalty period even if they reboot their cable modems.
Note
In software releases prior to Cisco IOS Release 12.3(9a)BC, the system automatically applies the enforced QoS profile to violators only if the enforce keyword has been used with the activate-rule at-byte-count command.
Examples
The following example shows profile 12 being assigned as the enforced QoS profile to an enforce-rule:
Router# configure terminal
Router(config)# cable qos enforce-rule residential
Router(enforce-rule)# enforced qos-profile 12
The following example shows profile 12 being assigned as the enforced QoS profile to an enforce-rule, but with the no-persistence option specified, so that the enforced QoS profile does not remain in force if the cable modem reboots:
Router# configure terminal
Router(config)# cable qos enforce-rule residential
Router(enforce-rule)# enforced qos-profile 12 no-persistence
The following example shows the error message that is displayed when the specified QoS profile does not exist on the CMTS:
Router# configure terminal
Router(config)# cable qos enforce-rule test
Router(enforce-rule)# enforced qos-profile 98
The qos profile 98 doesn't exist or it's a cm created QoS profile
Related Commands
Command
|
Description
|
activate-rule at-byte-count
|
Specifies the number of bytes that a subscriber can transmit during the monitoring period on a Cisco CMTS router.
|
cable qos enforce-rule
|
Creates an enforce-rule to enforce a particular QoS profile for subscriber traffic management and enters enforce-rule configuration mode.
|
enabled (enforce-rule)
|
Activates an enforce-rule and begins subscriber traffic management on a Cisco CMTS router.
|
duration
|
Specifies the time period and sample rate to be used for monitoring subscribers.
|
penalty-period
|
Specifies the time period that an enforced QoS profile should be in effect for subscribers that violate their registered QoS profiles.
|
qos-profile registered
|
Specifies the registered QoS profile that should be used for this enforce-rule.
|
show cable qos enforce-rule
|
Displays the QoS enforce-rules that are currently defined.
|
show cable subscriber-usage
|
Displays subscribers who are violating their registered QoS profiles.
|
exception pxf
To control the core dumps that are generated when an exception occurs in one of the Parallel eXpress Forwarding (PXF) columns, use the exception pxf command in global configuration mode. To disable the creation of core dumps during PXF exceptions, use the no form of this command.
exception pxf {core-file filename | flash device | style {full | localized | minimal | smart} }
no exception pxf {core-file | flash | style }
Syntax Description
core-file filename
|
Sets the filename for the core-dump file generated during a PXF exception.
|
flash device
|
Specifies the Flash memory device on which to save the core-dump file generated during a PXF exception.
|
style
|
Specifies the type of core-dump file to be generated during a PXF exception.
|
full
|
Creates a full core-dump file of all PXF columns.
|
localized
|
Creates a core-dump file of the PXF column that failed, along with its neighboring columns.
|
minimal
|
Creates a minimal core-dump file of the PXF exception.
|
smart
|
Creates a core-dump file that contains the data related to the PXF exception.
|
Defaults
Core dumps are not generated during PXF exceptions.
Command Modes
Global configuration
Command History
Release
|
Modification
|
12.2(4)XF1
|
This command was introduced for the Cisco uBR10012 router.
|
Usage Guidelines
Caution 
Use the
exception pxf command only under the direction of a technical support representative. Creating a core dump can disrupt network operations. The core dump is a large binary file that can be interpreted only by technical personnel who have access to source code and detailed memory maps.
Examples
The following example shows how to specify that the Cisco uBR10012 router should create a minimal core-dump file for PXF exceptions, and that this file should be named ubr10k-pxf and be written to the disk1 device:
Router# configure terminal
Router(config)# exception pxf style minimal
Router(config)# exception pxf core-file ubr10k-pxf
Router(config)# exception pxf flash disk1:
Related Commands
Command
|
Description
|
show pxf xcm
|
Displays the current state of error checking and correcting (ECC) for the External Column Memory (XCM) on the Parallel eXpress Forwarding (PXF) processor.
|
facility-alarm (ubr10012)
To set the temperature thresholds at which the Performance Routing Engine (PRE) module generates a critical, major, or minor alarm to warn of potential equipment damage, use the facility-alarm command in global configuration mode. To disable the temperature alarms, use the no form of this command.
facility-alarm {core-temperature | intake-temperature}
{critical exceed-action shutdown | major [temp] | minor [temp]}
no facility-alarm {core-temperature | intake-temperature}
{critical exceed-action shutdown | major [temp] | minor [temp]}
Syntax Description
core-temperature
|
Specifies the temperature threshold for the temperature sensors near the center of the PRE module.
|
intake-temperature
|
Specifies the temperature threshold for the temperature sensors at the air intake slots.
|
critical exceed-action shutdown
|
In Cisco IOS Release 12.2(11)BC1 and later releases, specifies that a critical temperature alarm should shut down the router after two minutes. This was the default behavior in previous releases.
|
major [temp]
|
Specifies the temperature, in degrees Centigrade, at which the PRE module generates a major alarm to warn of potential damage from excessive temperatures.
The valid range for temp is 20 to 67 degrees Centigrade, with a default of 58 for the core temperature threshold and 54 for the intake-temperature threshold.
|
minor [temp]
|
Specifies the temperature, in degrees Centigrade, at which the PRE module generates a minor alarm to warn of potential damage from excessive temperatures.
The valid range for temp is 20 to 67 degrees Centigrade, with a default of 50 for the core temperature threshold and 45 for the intake-temperature threshold.
|
Command Default
If no specific temperature is given, that particular facility alarm is reset to its default value. The default core temperature thresholds are 85 (critical), 58 (major), and 50 (minor). The default intake-temperature thresholds are 72 (critical), 54 (major), and 45 (minor) degrees Centigrade.
In Cisco IOS releases previous to Cisco IOS Release 12.2(11)BC1, a critical alarm automatically shuts down the router after two minutes to prevent temperature damage. In Cisco IOS Release 12.2(11)BC1 and later, a critical alarm by default does not shut down the router.
Note
The default temperature thresholds for the critical core and intake temperatures were changed in Cisco IOS Release 12.2(11)BC1.
Command Modes
Global configuration (config)
Command History
Release
|
Modification
|
12.2(1)XF1
|
This command was introduced for the Cisco uBR10012 router.
|
12.2(11)BC1
|
The critical exceed-action shutdown option was added. In addition, the default value for the core critical temperature threshold was raised from 57 to 67 degrees Centigrade, and the default value for the intake critical temperature threshold was raised from 60 to 85 degrees Centigrade.
|
12.3BC
|
This command was integrated into Cisco IOS Release 12.3BC.
|
12.2(33)SCA
|
This command was integrated into Cisco IOS Release 12.2(33)SCA.
|
Usage Guidelines
Note
The facility-alarm core-temperature critical and facility-alarm intake-temperature critical commands are available only if the service internal command is defined in the configuration.
The PRE module on the Cisco uBR10012 router contains temperature sensors that monitor the temperature at the air intake slots and on the PRE module itself. The facility-alarm command configures the router for the temperature thresholds that will generate a minor, major, or critical alarm, so as to notify the system operators of the temperature problem before excessive heat can damage the router or any of its components.
Before Cisco IOS Release 12.2(11)BC1, a critical alarm would also automatically shut down the router after two minutes. Cisco IOS Release 12.2(11)BC1 made this automatic shutdown a configurable option, so that the system operators can decide whether or not a critical alarm should power down the router.
As a general rule, do not disable the automatic shutdown of the router unless you have a systems operator available to immediately respond to any critical temperature alarms, because this could result in system damage. Typically, the primary reason to disable the automatic shutdown would be if you are replacing the fan tray assembly and want to ensure that the router does not power down if the procedure takes longer than expected.
Note
A line card also automatically shuts itself down if the temperature exceeds operational levels. In addition, the AC and DC PEMs also automatically power down if they exceed their operational temperature. However, high temperatures could still cause damage to other components if the problem is not quickly resolved.
Examples
The following example shows how to configure the Cisco uBR10012 router so that it generates a minor alarm when the intake temperature exceed 55°C:
Router# configure terminal
Router(config)# facility-alarm intake-temperature minor 55
The following example shows how to configure the Cisco uBR10012 router to automatically shut down if the high temperature continues for more than two minutes:
Router# configure terminal
Router(config)# service internal
Router(config)# facility-alarm core-temperature critical exceed-action shutdown
The following example shows how to disable the automatic shutdown feature for both the core and intake temperatures. A critical alarm is still generated when the default critical temperatures are exceeded, but the router does not automatically shut itself down:
Router# configure terminal
Router(config)# no facility-alarm core-temperature critical exceed-action shutdown
Router(config)# no facility-alarm intake-temperature critical exceed-action shutdown
The following commands disable major and minor alarms for both the core and intake temperature thresholds (but critical alarms are still generated):
Router# configure terminal
Router(config)# no facility-alarm core-temperature major
Router(config)# no facility-alarm core-temperature minor
Router(config)# no facility-alarm intake-temperature major
Router(config)# no facility-alarm intake-temperature minor
Related Commands
Command
|
Description
|
clear facility-alarm
|
Clears some or all of the facility alarms on the Cisco uBR10012 router.
|
show facility-alarm status
|
Displays the current temperature thresholds that will trigger a facility alarm.
|
hccp authentication
To specify the authentication algorithm on a working or protect cable interface, or both use the hccp authentication command in cable interface configuration mode. To disable authentication on a Working CMTS or Protect CMTS, use the no form of this command.
hccp group authentication {md5 | text}
no hccp group authentication {md5 | text}
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
md5
|
Authentication algorithm. In Cisco IOS Release 12.1(3a)EC, MD5 is the only authentication algorithm supported.
|
text
|
Unencrypted text specification. Rather than automatically encrypting the authentication key-chain when using the MD5 authentication algorithm, Cisco IOS software simply passes the authentication key-chain as standard, unencrypted text.
|
Command Default
The default authentication algorithm is MD5.
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
12.2(15)BC1
|
Support was added for the Cisco uBR-MC5X20U/S BPE on the Cisco uBR10012 router.
|
12.3(17a)BC2
|
Support was added for the Cisco uBR-MC5X20H BPE on the Cisco uBR10012 router.
|
12.3(21)BC
|
This command is obsolete on the Cisco uBR7246VXR router.
|
Usage Guidelines
Use this command together with the hccp authentication key-chain command to enable and specify the type of N+1 redundancy authentication you will use in your protection scheme.
Examples
The following example shows how to specify MD5 as the authentication algorithm for group 1:
Router(config-if)# hccp 1 authentication md5
Related Commands
Command
|
Description
|
hccp authentication key-chain
|
Enables authentication on a given interface and specifies one or more keys that can be used to perform authentication for a specified group.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp authentication key-chain
To enable authentication and define one or more authentication keys to use in a specified group, use the hccp authentication key-chain command in cable interface configuration mode. To disable authentication, use the no form of this command. The key chains you define must match one or more key chains configured in the Working CMTS or Protect CMTS configuration file.
hccp group authentication key-chain key-chain
no hccp group authentication key-chain [key-chain]
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
key-chain
|
A text string matching a key chain in the Working CMTS or Protect CMTS configuration file. A key chain must have at least one key and can have up to 2,147,483,647 keys.
|
Command Default
No default behavior or values
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
12.2(15)BC1
|
Support was added for the Cisco uBR-MC5X20U/S BPE on the Cisco uBR10012 router.
|
12.3(17a)BC2
|
Support was added for the Cisco uBR-MC5X20H BPE on the Cisco uBR10012 router.
|
12.3(21)BC
|
This command is obsolete on the Cisco uBR7246VXR router.
|
Usage Guidelines
Use this command in conjunction with the hccp authentication command to enable and specify the type of 1+1 redundancy authentication you will use in your protection scheme.
Note
You cannot perform authentication on a specified group until you have first defined at least one authentication key chain in global configuration mode.
Examples
The following excerpt from a configuration file enables authentication using the MD5 algorithm and defines the authentication key "cisco1" for group 1:
hccp 1 authentication md5
hccp 1 authentication key-chain cisco1
Related Commands
Command
|
Description
|
hccp authentication
|
Specifies the authentication algorithm for the Working CMTS or Protect CMTS.
|
hccp authentication key-chain
|
Enables authentication on a given interface and specifies one or more keys that can be used to perform authentication for a specified group.
|
key-chain
|
Defines one or more key chains for authentication between the Working CMTS or Protect CMTS.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp bypass version
To enter bypass version mode for a specific Hot Standby Connection-to-Connection Protocol (HCCP) group, in which the hardware and software version checks are not performed before switching over to a protect interface, use the hccp bypass version command in privileged EXEC mode.
hccp group bypass version
Syntax Description
group
|
The group number for the specified interface. The valid range is 1 to 255.
|
Command Default
Normal HCCP operations (hccp group check version), where hardware and software version checks are made between the Working and Protect cable interface line cards.
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.2(4)XF1, 12.2(4)BC1
|
This command was introduced for the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card with the Cisco RF Switch.
|
12.2(8)BC2
|
Support was added for the Cisco uBR10012 router using the Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards with the Cisco RF Switch.
|
12.2(11)BC1
|
Support was added for the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards with the Cisco RF Switch.
|
12.2(15)BC1
|
Support was added for the Cisco uBR-MC5X20U/S BPE on the Cisco uBR10012 router.
|
12.3(17a)BC2
|
Support was added for the Cisco uBR-MC5X20H BPE on the Cisco uBR10012 router.
|
12.3(21)BC
|
This command is obsolete on the Cisco uBR7246VXR router.
|
Usage Guidelines
By default, the Cisco CMTS verifies that the Working and Protect cable interfaces are using the same versions of software and hardware, so as to avoid potential incompatibilities during a switchover. The hardware check verifies that the Working and Protect cable interface line cards are compatible. The software check verifies that the two cards are running the same major versions of software. If either of these two conditions is not true, the CMTS by default does not perform the switchover.
You can override these version checks for a particular HCCP group by using the hccp bypass version command. After you give this command, the Cisco CMTS does not check the hardware or software versions of the two cable interfaces before performing a switchover. To return to normal HCCP operations, so that version checks are made for a group, use the hccp check version command.
Note
Two cable interface line cards are compatible when the Protect card has at least the same number of upstreams or downstreams as the Working card. The exceptions to this are that the Cisco uBR-MC16E card can be protected only by another Cisco uBR-MC16E card. Also, the DOCSIS versions of the Cisco uBR-MC16 card can be protected only by another Cisco uBR-MC16C card. You cannot use the Cisco uBR-MC28C card to protect a Cisco uBR-MC16B/C/S card.
Examples
The following example shows how to disable the hardware and software version checks for HCCP group number 20. After giving this command, the Cisco CMTS will switchover from the Working to Protect interface in group 20 without first verifying the cards' compatibility:
Router# hccp 20 bypass version
Related Commands
Command
|
Description
|
hccp check version
|
Exits bypass version mode, and returns to normal HCCP operation.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp channel-switch
To configure the Cisco CMTS so that a Cisco RF Switch or Vecima (Wavecom) upconverter becomes a Hot Standby Connection-to-Connection Protocol (HCCP) member in a particular HCCP group, use the hccp channel-switch command in cable interface configuration mode. To remove the configuration for the Cisco RF Switch or upconverter, use the no form of this command.
hccp group channel-switch member-id switch-name rfswitch-group rfswitch-ip-address
module-bitmap position
hccp group channel-switch member-id switch-name rfswitch-module rfswitch-ip-address
module-number position
hccp group channel-switch member-id switch-name tty-switch [aux | console | vty] line-number
port
hccp group channel-switch member-id switch-name {wavecom-hd | wavecom-ma}
prot-ip-address protect-module work-ip-address work-module
no hccp group channel-switch member-id switch-name
Syntax Description
group
|
The group number for the specified interface. The valid range is 1 to 255.
|
member-id
|
The member number within the specified group. The valid range is 1 to 255.
|
switch-name
|
(Optional) Alpha-numeric string specifies the name of the Cisco RF Switch.
|
rfswitch-group
|
Specifies that this is the configuration for a Cisco RF Switch group.
|
rfswitch-module
|
Specifies that this is the configuration for a Cisco RF Switch module.
|
rfswitch-ip-address
|
Specifies the IP address of the Cisco RF Switch to which the CMTS is connected.
|
module-bitmap
|
Specifies the module-bitmap in hexadecimal. The valid range is 0 to FFFFFFFF.
Tip  See the TAC-authored N+1 Tips and Configuration document on Cisco.com for more information on the format of the bitmap, and for a worksheet that can be used to calculate the bitmap.
|
module-number
|
Specifies the module number on the Cisco RF Switch. The valid range is 1 to 255.
Note This setting must be configured on the Cisco RF Switch as well as the Cisco CMTS.
|
position
|
Specifies the position for the Working channel on the Cisco RF Switch. The valid range is 1 to 8.
|
tty-switch
|
Specifies the configuration of a Cisco RF Switch that is controlled by its TTY line. You can further specify the type of port being used to control the switch. By default, one of the Cisco RF Switch's serial ports is used, or you can use the aux, console, or vty lines.
Note Ensure that the switch's DIP switch is set to 00.
|
aux
|
(Optional) Specifies that the auxiliary port is being used to control the Cisco RF Switch.
|
console
|
(Optional) Specifies that the console port is being used to control the Cisco RF Switch.
|
vty
|
(Optional) Specifies that a Virtual Terminal connection (Telnet connection) is being used to control the Cisco RF Switch.
|
line-number
|
Specifies the line number on which the Cisco RF Switch is receiving control information for this CMTS. The valid range is 0 to 17 for the default serial port, 0 for the aux port, 0 for the console port, and 0 to 99 for the vty port.
|
port
|
Specifies the port number being used on the Cisco RF Switch. The valid range is 1 to 255.
|
wavecom-hd
|
Specifies that this is the configuration for a Vecima (Wavecom) HD4040 and QHD4040 upconverter.
|
wavecom-ma
|
Specifies that this is the configuration for a Vecima (Wavecom) DUAL4040D, MA4040D, or UC4040D upconverter.
|
prot-ip-address
|
Specifies the IP address for the upconverter used for the Protect interface used for this cable interface.
|
protect-module
|
Specifies the module number on the upconverter used for the Protect interface to be used for this cable interface. The valid range is 1 to 255.
|
work-ip-address
|
Specifies the IP address for the upconverter used for the Working interface used for this cable interface.
|
work-module
|
Specifies the module number on the upconverter used for the Working interface to be used for this cable interface. The valid range is 1 to 255.
|
Command Default
The CMTS is not configured to use a Cisco RF Switch by default, and no cable interfaces are configured for N+1 redundancy by default.
Command Modes
Interface configuration—cable interface only (config-if)
Command History
Release
|
Modification
|
12.2(4)XF1, 12.2(4)BC1
|
This command was introduced for the Cisco uBR10012 router, replacing the hccp ds-switch command for use with the Cisco RF Switch.
|
12.2(8)BC2
|
Support was added for the Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards on the Cisco uBR10012 router.
|
12.2(11)BC1
|
Support was added for the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
12.3(21)BC
|
This command is obsolete on the Cisco uBR7246VXR router.
|
Usage Guidelines
You must configure each Working and Protect cable interface for use with the Cisco RF Switch, typically specifying one hccp channel-switch command to configure the Cisco RF Switch information, and another hccp channel-switch command to configure the upconverter.
The Protect interface is configured with the same hccp channel-switch commands as those that are used on the Working interface. However, typically, the same Protect interface is configured with multiple hccp channel-switch commands to protect multiple Working interfaces.
Examples
The following example shows the cable interface 8/1/0 being configured as member 1 for the Working interface of HCCP group 1. This interface is configured to use the Wavecom HD4040 upconverter with the IP address of 10.97.1.21. The upconverter's module number 2 (B) is used for the Protect interface, and module number 16 (P) is used for the Working interface. The interface uses the Cisco RF Switch at IP address 10.97.1.20, using a module bitmap of AA200000 in switch slot 1.
Router# configure terminal
Router(config)# interface cable8/1/0
Router(config-if)# hccp 1 working 1
Router(config-if)# hccp 1 channel-switch 1 uc wavecom-hd 10.97.1.21 2 10.97.1.21 16
Router(config-if)# hccp 1 channel-switch 1 rfswitch rfswitch-group 10.97.1.20 AA200000 1
The following example shows the corresponding configuration for the Protect interface for member 1 of HCCP group 1, which is cable interface 5/1/0 on the same chassis. The hccp channel-switch commands are identical to those used for cable interface 8/1/0.
Router# configure terminal
Router(config)# interface cable5/1/0
Router(config-if)# hccp 1 protect 1 10.97.1.8
Router(config-if)# hccp 1 channel-switch 1 uc wavecom-hd 10.97.1.21 2 10.97.1.21 16
Router(config-if)# hccp 1 channel-switch 1 rfswitch rfswitch-group 10.97.1.20 AA200000 1
Typically, the same Protect interface is used to protect multiple Working cable interfaces. For example, this same interface could be configured as follows to protect a Working interface that is using module number 14 (N) on the same Wavecom HD4040 upconverter, using slot 2 in the RF Switch.
Router# configure terminal
Router(config)# interface cable5/1/0
Router(config-if)# hccp 1 protect 2 10.97.1.8
Router(config-if)# hccp 1 channel-switch 2 uc wavecom-hd 10.97.1.21 2 10.97.1.21 14
Router(config-if)# hccp 1 channel-switch 2 rfswitch rfswitch-group 10.97.1.20 AA200000 2
Related Commands
Command
|
Description
|
hccp check version
|
Exits bypass version mode, and returns to normal HCCP operation.
|
hccp ds-switch
|
Specifies the downstream upconverter module for a Working CMTS or Protect CMTS (deprecated command).
|
hccp protect
|
Allows you to configure a Cisco CMTS to be a Protect CMTS for a specified Working CMTS in a 1+1 redundancy environment.
|
hccp working
|
Allows you to designate a Cisco CMTS to be a Working CMTS in a 1+1 redundancy environment.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp check version
To exit bypass version mode and return to normal Hot Standby Connection-to-Connection Protocol (HCCP) operations for a specific HCCP group, use the hccp check version command in privileged EXEC mode.
hccp group check version
Syntax Description
group
|
The group number for the specified interface. The valid range is 1 to 255.
|
Command Default
Normal HCCP operations (hccp group check version), where hardware and software version checks are made between the Working and Protect cable interface line cards.
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.2(4)XF1, 12.2(4)BC1
|
This command was introduced for the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card with the Cisco RF Switch.
|
12.2(8)BC2
|
Support was added for the Cisco uBR10012 router using the Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards with the Cisco RF Switch.
|
12.2(11)BC1
|
Support was added for the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards with the Cisco RF Switch.
|
Usage Guidelines
By default, the Cisco CMTS verifies that the Working and Protect cable interfaces are using the same versions of software and hardware, so as to avoid potential incompatibilities during a switchover. The hardware check verifies that the Working and Protect cable interface line cards are compatible. The software check verifies that the two cards are running the same major versions of software. If either of these two conditions is not true, the CMTS by default does not perform the switchover.
You can override these version checks for a particular HCCP group by using the hccp bypass version command. After you give this command, the Cisco CMTS does not check the hardware or software versions of the two cable interfaces before performing a switchover. To return to normal HCCP operations, so that version checks are made for a group, use the hccp check version command.
Note
Two cable interface line cards are compatible when the Protect card has at least the same number of upstreams or downstreams as the Working card. The exceptions to this are that the Cisco uBR-MC16E card can be protected only by another Cisco uBR-MC16E card. Also, the DOCSIS versions of the Cisco uBR-MC16 card can be protected only by another Cisco uBR-MC16C card. You cannot use the Cisco uBR-MC28C card to protect a Cisco uBR-MC16B/C/S card.
Examples
The following example shows how to cancel a previous hccp bypass version command for HCCP group 1 and to return to normal HCCP operations:
Router# hccp 1 check version
Related Commands
Command
|
Description
|
hccp bypass version
|
Enters bypass version mode for a specific HCCP group, in which the hardware and software version checks are not performed before switching over to a protect interface.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp ds-switch
To specify the downstream upconverter module for a Working CMTS or Protect CMTS, use the hccp ds-switch command in cable interface configuration mode. To negate a downstream upconverter assignment, use the no form of this command.
hccp group ds-switch member make host-ipaddr host-module peer-ipaddr peer-module
no hccp group ds-switch member
Note
This command has been deprecated in current Cisco IOS releases and has been replaced by the hccp channel-switch command.
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
member
|
The member number within the specified group.
|
make
|
The maker of the specified upconverter. Currently, only the Wavecom upconverter is supported (wavecom).
|
host-ipaddr
|
The IP address of the upconverter module1 to which the host CMTS is connected.
|
host-module
|
The upconverter module number to which the host CMTS is connected. This location is expressed as a simple numeric designation.
|
peer-ipaddr
|
The IP address of the upconverter module to which the peer (or remote) CMTS is connected.
|
peer-module
|
The upconverter module number1 to which the peer (or remote) CMTS is connected. This location is expressed as a simple numeric designation.
|
Command Default
Upconverter specification and activation is disabled by default and must be specified before switching can take place.
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
This command was deprecated and replaced by the hccp channel-switch command.
|
Usage Guidelines
It is necessary to configure the downstream upconverter module for all Protect CMTS and Working CMTS systems. If you do not specify the downstream upconverter module for all Protect CMTS and Working CMTS systems, you cannot switch between a Protect CMTS and Working CMTS.
Examples
The following excerpt from a configuration file specifies module 2 on a Wavecom upconverter at IP address 1.1.11.3 as the host switch module connected to Working CMTS 1 and module 1 on the same Wavecom upconverter (with the same IP address location) as the peer or remote switch module connected to the Protect CMTS:
hccp ds-switch 1 wavecom 1.1.11.3 2 1.1.11.3 1
Related Commands
Command
|
Description
|
hccp channel-switch
|
(replaces the hccp ds-switch command).
|
hccp protect
|
Allows you to configure a Cisco CMTS to be a Protect CMTS for a specified Working CMTS in a 1+1 redundancy environment.
|
hccp working
|
Allows you to designate a Cisco CMTS to be a Working CMTS in a 1+1 redundancy environment.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp lockout
To prevent a Working CMTS from automatically switching to a Protect CMTS in the same group, use the hccp lockout command in privileged EXEC mode.
Note
This command is applicable only to Working CMTS in a given group. Issuing this command on a Protect CMTS has no effect.
hccp group lockout member
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
member
|
The member number within the specified group.
|
Command Default
By default, the hccp lockout command is inactive.
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
Usage Guidelines
Typically the hccp lockout command is used to disable HCCP switchovers before removing the HCCP configuration on the Working interface. Otherwise, when you remove the HCCP configuration from the Working interface, the Protect interface assumes the Working interface has failed and switches over.
You might also want to prevent a Working CMTS from automatically switching back to a Protect CMTS for testing or additional configuration purposes. For example, you might want to fully test protecting cable interfaces on your Cisco CMTS before returning it to protect status.
Examples
The following example shows how to activate the lockout feature of a Working CMTS in group 1:
Related Commands
Command
|
Description
|
hccp unlockout
|
Negates the effects of the hccp lockout EXEC command, making the CMTS available for automatic switchover from a Working CMTS to a Protect CMTS.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp protect
To configure a particular cable interface to protect another cable interface in the same group, use the hccp protect command in cable interface configuration mode. To undo a particular host cable interface protection assignment, use the no form of this command.
hccp group protect member ipaddr
no hccp group protect member
Syntax Description
group
|
The group number of both the Working and Protect cable interfaces. Valid values are any number from 1 to 255, inclusive.
|
member
|
The member number of the specified Working cable interface. Valid values are any number from 1 to 255, inclusive.
|
ipaddr
|
An IP address for any working interface (other than protected cable interfaces) installed in the Working CMTS that can transmit and receive redundancy status messages.
|
Command Default
No default behavior or values
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
Usage Guidelines
The protect cable interface must be configured identically to the working cable interface, which typically means the interfaces must be the same card type. However, when the Cisco uBR-MC16S card is used, it can be used with either another Cisco uBR-MC16S card or a Cisco uBR-MC16C card.
Table 26 shows how a switchover affects the enhanced spectrum management features of the Cisco uBR-MC16S card.
Table 26 Switchover Operation for a Cisco uBR-MC16C/Cisco uBR-MC16S Configuration
Working Cable Interface
|
Protect Cable Interface
|
Operation After Switchover
|
Cisco uBR-MC16C
|
Cisco uBR-MC16S
|
The protect card (Cisco uBR-MC16S) uses the same upstream frequency as the working card, but after the system stabilizes, the protect card begins using the enhanced spectrum management features of the Cisco uBR-MC16S card, as configured on the protect CMTS.
|
Cisco uBR-MC16S
|
Cisco uBR-MC16C
|
The protect card (Cisco uBR-MC16C) uses the same upstream frequency as the working card. If the upstream becomes unstable, the Cisco uBR-MC16C performs only blind frequency hopping.
|
Cisco uBR-MC16S
|
Cisco uBR-MC16S
|
The protect card initially uses the same upstream frequency as the working card, but after the system stabilizes, the protect card continues using the enhanced spectrum management features of the Cisco uBR-MC16S card.
|
Examples
The following example configures host cable interface 4/0 to protect member 2 of group 2 at IP address 1.1.11.2:
Router(config)# interface cable 4/0
Router(config-if)# hccp 2 protect 2 1.1.11.2
Related Commands
Command
|
Description
|
cable downstream rf-power
|
Sets the RF power output level on a cable interface line card with an integrated upconverter (including the ability to specify an override or delta power value for a Protect interface).
|
hccp working
|
Configures a specified cable interface to be a working member of a given group.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp resync
To manually synchronize the Inter-database between the Working and Protect interfaces for a particular member in an Hot Standby Connection-to-Connection Protocol (HCCP) group, use the hccp resync command in privileged EXEC mode.
hccp group resync member
Syntax Description
group
|
The group number for the specified interface. The valid range is 1 to 255.
|
member
|
The member ID to be resynchronized. The valid range is 1 to 255.
|
Command Default
No default behavior or values.
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.2(4)XF1, 12.2(4)BC1
|
This command was introduced for the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card with the Cisco RF Switch.
|
12.2(8)BC2
|
Support was added for the Cisco uBR10012 router using the Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards with the Cisco RF Switch.
|
12.2(11)BC1
|
Support was added for the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards with the Cisco RF Switch.
|
Usage Guidelines
The Cisco CMTS automatically synchronizes the Working and Protect interfaces to ensure that when a switchover occurs, the Protect interface will run with a configuration that is identical to that of the Working interface. However, if you are troubleshooting HCCP problems, you can manually resynchronize the databases using the hccp resync command before performing any switchover tests.
Note
When a SYNC event command is occurring, CLI commands might be very slow to respond. In particular, if you enter a show command at the same time a SYNC event is occurring, the command might respond produce a blank display, or it might display an error message similar to the following:
%No response from slot 6/1. Command aborted
If this occurs, wait a minute or so and retry the command.
Examples
The following example shows how to manually resynchronize the Inter-database between the Working and Protect interfaces for member 4 in HCCP group 13:
Related Commands
Command
|
Description
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp revertive
To configure a cable interface on a Protect CMTS that has assumed working capacity to automatically revert back to the Working CMTS, use the hccp revertive command in cable interface configuration mode. To disable the ability for the specified cable interface to automatically revert back to protect status, use the no form of this command.
hccp group revertive
no hccp group revertive
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
Command Default
Enabled
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
12.3(21)BC
|
This command is obsolete on the Cisco uBR7246VXR router.
|
Usage Guidelines
Using this command in conjunction with the hccp reverttime command gives you the ability to set up your protecting cable interfaces to automatically switch between working and protecting capacity without your intervention. Otherwise, whenever a switchover has occurred, you must manually reactivate the failed Working CMTS and manually return the Protect CMTS to protect status using the hccp switch command.
Tip
If you are using the hccp revertive command on a cable interface, do not also configure the hccp track command. Configuring both commands on the same interface can cause multiple switchovers on the same fault.
Using hccp track with hccp revertive
As a general rule, if you are using the hccp track command on a cable interface, do not also configure the hccp revertive command without also configuring no keepalive on the cable interface. Configuring both commands on the same interface, along with keepalives, can cause multiple switchovers on the same fault.
If you want to use keepalives along with both the hccp track and hccp revertive commands,use the hccp track command on both the Working and Protect interfaces, so that the Working interfaces on the same card track each other and the Protect interfaces on the same card track each other. Table 27 summarizes the guidelines for using these three commands:
Table 27 Possible hccp track and hccp revertive Configurations
hccp track
(Working I/Fs)
|
hccp track
(Protect I/Fs)
|
hccp revertive
|
keepalive Configuration
|
Yes
|
No
|
No
|
keepalive or no keepalive
|
Yes
|
No
|
Yes
|
no keepalive
|
Yes
|
Yes
|
Yes
|
keepalive or no keepalive
|
Examples
The following example shows cable interface 4/0 on a Protect CMTS in group 2 being configured to automatically revert to protect status after the Working CMTS peer has returned to active duty:
router(config)# interface cable 4/0
router(config-if)# hccp 2 revertive
Related Commands
Command
|
Description
|
hccp reverttime
|
Specifies the time that the Working CMTS waits before automatically switching back to a Working CMTS following system switchover.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp reverttime
To specify the amount of time a Protect interface waits before automatically reverting back to a Working interface following a system switchover, use the hccp reverttime command in cable interface configuration mode on the Working CMTS. To set the revert-time back to its default value, use the no form of this command.
hccp group reverttime revert-time
no hccp group reverttime
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
revert-time
|
The amount of time (in minutes) that a Protect interface waits before automatically switching back to a Working interface following a system switchover. The allowable range is 1 to 65,535 minutes, with a default of 30 minutes.
|
Defaults
30 minutes
Command Modes
Interface configuration (cable interface only, on the Working CMTS)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
Usage Guidelines
Use this command to configure the revert-time on the cable interfaces on the Working CMTS so that the Working CMTS will automatically resume normal operations and the Protect CMTS will automatically resume normal protect operations, in case an operator forgets to manually switch the Working CMTS back into operation after fixing the original problem.
The Working CMTS first counts down two minutes of suspend time before starting to count down the revert-time. Any failures that occur within this two-minute suspend time are considered part of the same failure.
This means that the actual time that the Working CMTS will attempt to switch back after a switchover is two minutes plus the revert-time. For example, if the revert-time is set to its default of 30 minutes, the Working CMTS will attempt to switch back into operation 32 minutes after the initial switchover to the Protect CMTS.
After the suspend time has occurred, a failure in the Protect CMTS will cause a switchover to the Working CMTS, regardless of whether the revert-time has expired or not. You can force such a failure in the Protect CMTS, and restore the Working CMTS to operation without waiting for the revert-time, by using the cable power off and cable power on commands to turn off and turn on the protect interface on the Protect CMTS.
When choosing a revert-time, take into account all possible sources of failures, including third-party equipment. For example, an upconverter failure can trigger a switchover to the Protect CMTS. You should configure the revert-time so that the Working CMTS does not switch back into operation until technicians have had sufficient time to fix the equipment failure.
Tip
To disable the revert-time feature, use the no version of the hccp revertive command on the Protect CMTS.
Examples
The following example shows cable interface 3/0 on a Working CMTS in group 2 being configured to wait 15 minutes before automatically reverting back to working status after a system switchover:
router(config)# interface cable 3/0
router(config-if)# hccp 2 reverttime 15
The following example shows how to give the no form of this command, which resets the interface back to its default value of 30 minutes.
router(config)# interface cable 5/1/0
router(config-if)# no hccp 2 reverttime
Related Commands
Command
|
Description
|
hccp revertive
|
Configures a cable interface on a Protect CMTS to automatically revert back to a Working CMTS.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp switch
To manually switch a Protect CMTS with its Working CMTS peer (or vice versa), use the hccp switch command in privileged EXEC mode.
hccp group switch member
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
member
|
The member number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
Command Default
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
12.2(11)BC3
|
This command is automatically disabled for approximately 2 to 3 seconds after a PRE module switches over to allow the system to stabilize before performing another switchover.
|
Usage Guidelines
This command overrides any configuration you may have made on your Protect CMTS and Working CMTS using the hccp revert and hccp reverttime commands. In addition, you can issue the hccp switch command on either a Protect CMTS or a Working CMTS to force it to change places with its peer.
Examples
The following example shows the host Protect CMTS being configured to assume traffic responsibility for member 2 Working CMTS in group 2:
Related Commands
Command
|
Description
|
hccp lockout
|
Prevents a Working CMTS from automatically switching to a Protect CMTS in the same group.
|
hccp unlockout
|
Negates the effects of the hccp lockout command, making the CMTS available for automatic switchover from a Working CMTS to a Protect CMTS.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp timers
To configure HELLO packet interval and hold time for a specified group on a Protect CMTS, use the hccp timers command in cable interface configuration mode. To erase the HELLO interval and hold time configuration and to assume the default values for each parameter, use the no form of this command.
hccp group timers hello-time hold-time
no hccp group timers [hello-time hold-time]
Note
Issuing the no form of this command erases any manual HELLO interval and hold time values and automatically resets them to their default values.
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
hello-time
|
The HELLO packet interval (in milliseconds) between subsequent HELLO packet transmissions. The acceptable range is 1666 to 5,000 milliseconds, inclusive.
|
hold-time
|
The time (in milliseconds) that a Protect CMTS will wait before assuming control of voice traffic for a Working CMTS that has failed to acknowledge a series of HELLO packets. The acceptable range is 5,000 to 25,000 milliseconds, inclusive.
|
Command Default
The default HELLO interval is 2,000 milliseconds, and the default hold time is 6,000 milliseconds.
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
Examples
The following example shows the HELLO interval and hold time on a Protect CMTS in group 2 being configured to 1,750 and 3,000 milliseconds, respectively:
Router(config)# interval c4/0
Router(config-if)# hccp 2 timers 1750 3000
Related Commands
Command
|
Description
|
hccp protect
|
Configures a particular cable interface to protect another peer cable interface in the same group.
|
hccp working
|
Configures a specified cable interface to be a working member of a given group.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp track
To configure a cable interface on a Working CMTS or Protect CMTS to enable automatic switchover based on the interface state, use the hccp track command in cable interface configuration mode. To disable the automatic switchover based on interface state, use the no form of this command.
hccp group track [interface]
no hccp group track [interface]
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
interface
|
Specifies another cable interface (the default is the current cable interface).
|
Command Default
Enabled for the current interface
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
Usage Guidelines
This command enables automatic switchover of one interface when a tracked interface switches over from "up" to "down."
Typically, this command is used to allow all interfaces on one card to track one another, so that if one interface goes down and switches over to the Protect, all other interfaces can also switch over, allowing the Protect card to assume full operation for these interfaces. This allows support engineers to troubleshoot the problem on the Working interface, or to remove and replace the Working card, if necessary, without interfering with traffic.
Using hccp track with hccp revertive
As a general rule, if you are using the hccp track command on a cable interface, do not also configure the hccp revertive command without also configuring no keepalive on the cable interface. Configuring both commands on the same interface, along with keepalives, can cause multiple switchovers on the same fault.
If you want to use keepalives along with both the hccp track and hccp revertive commands,use the hccp track command on both the Working and Protect interfaces, so that the Working interfaces on the same card track each other and the Protect interfaces on the same card track each other. Table 28 summarizes the guidelines for using these three commands:
Table 28 Possible hccp track and hccp revertive Configurations
hccp track
(Working I/Fs)
|
hccp track
(Protect I/Fs)
|
hccp revertive
|
keepalive Configuration
|
Yes
|
No
|
No
|
keepalive or no keepalive
|
Yes
|
No
|
Yes
|
no keepalive
|
Yes
|
Yes
|
Yes
|
keepalive or no keepalive
|
Examples
The following example shows switchover behavior being enabled on a Cisco CMTS in group 2:
Router(config)# interface c3/0
Router(config-if)# hccp 2 track
Router(config-if)# keepalive
The following example shows two Cisco uBR-LCP2-MC28C cards being used in a Cisco uBR10012 router, with each downstream being configured for a separate HCCP group. The card in slot 5/1 is being configured as the Working interfaces and the card in slot 6/1 is being configured as the Protect interfaces.
The two downstreams on each card track each other, so if one downstream fails and switches over, the other can do so as well, allowing the Protect card to assume full control of both interfaces. Similarly, when the Working interfaces come back into service, both Protect interfaces switch back at the same time.
Router(config)# interface cable c5/1/0
Router(config-if)# hccp 1 working 1
Router(config-if)# hccp 1 track c5/1/1
Router(config-if)# keepalive 3
Router(config)# interface cable c5/1/1
Router(config-if)# hccp 2 working 1
Router(config-if)# hccp 2 track c5/1/0
Router(config-if)# keepalive 3
Router(config)# interface cable c6/1/0
Router(config-if)# hccp 1 protect 1 ip-address-of-mgmt-lan
Router(config-if)# hccp 1 track c6/1/1
Router(config-if)# keepalive 3
Router(config)# interface cable c6/1/1
Router(config-if)# hccp 2 protect 1 ip-address-of-mgmt-lan
Router(config-if)# hccp 2 track c6/1/0
Router(config-if)# keepalive 3
Related Commands
Command
|
Description
|
keepalive
|
A global configuration command that allows you to specify the keepalive message transmission interval on a Working CMTS or Protect CMTS. For more specific information, see the Cisco IOS Interface Command Reference on Cisco.com.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp unlockout
To reverse the effects of the hccp lockout command—that is, to make a Working CMTS available for automatic switchover to Protect CMTS, use the hccp unlockout command in privileged EXEC mode.
hccp group unlockout member
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
member
|
The member number within the specified group.
|
Command Default
By default, the hccp unlockout command is active for all groups and members.
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
Usage Guidelines
This command reverses the effect of the hccp lockout command. Once you have reconfigured or tested your Protect CMTS, issuing this command manually reintroduces the CMTS back into your 1+1 redundancy protection scheme.
Note
This command is applicable only on a Working CMTS in a given group. Issuing this command on a Protect CMTS has no effect.
Examples
The following example shows the lockout feature of a Working CMTS in group 1 being deactivated:
Related Commands
Command
|
Description
|
hccp lockout
|
Prevents a Working CMTS from automatically switching to a Protect CMTS in the same group.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hccp working
To designate a cable interface on a CMTS in the specified group to be a Working CMTS, use the hccp working command in cable interface configuration mode. To remove a Working CMTS assignment, use the no form of this command.
hccp group working member
no hccp group working member
Syntax Description
group
|
The group number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
member
|
The member number for the specified interface. Valid values are any number from 1 to 255, inclusive.
|
Command Default
No default behavior or values
Command Modes
Interface configuration (cable interface only)
Command History
Release
|
Modification
|
12.1(3a)EC
|
This command was introduced for the Cisco uBR7200 series routers.
|
12.1(7)EC1
|
Support was added for the Cisco uBR-MC16S cable interface line card.
|
12.2(4)XF1, 12.2(4)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC28C card.
|
12.2(8)BC2
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR10012 router and Cisco uBR-LCP-MC16C, Cisco uBR-LCP-MC16E, and Cisco uBR-LCP-MC16S cards.
|
12.2(11)BC1
|
Support was added for the N+1 (1:n) RF Switch with the Cisco uBR7246VXR router and Cisco uBR-MC16C, Cisco uBR-MC16S, and Cisco uBR-MC28C cards.
|
Usage Guidelines
When N+1 HCCP redundancy is configured, the Protect interface switches over and becomes the active interface when it detects a situation similar to the following:
•
The Working interface is removed from the chassis, is powered down, or is reset
•
The Working interface crashes
•
The Working interface no longer sends out regular keepalive messages
•
The Working interface loses connectivity with the cable network
The Protect cable interface must be configured identically to the Working cable interface, which typically means the interfaces should be the same card type. However, when the Cisco uBR-MC16S is used, it can be used with either another Cisco uBR-MC16S card or a Cisco uBR-MC16C card.
Table 26 shows how a switchover affects the enhanced spectrum management features of the Cisco uBR-MC16S card.
Table 0-29 Switchover Operation for a Cisco uBR-MC16C/Cisco uBR-MC16S Configuration
Working Cable Interface
|
Protect Cable Interface
|
Operation After Switchover
|
Cisco uBR-MC16C
|
Cisco uBR-MC16S
|
The protect card (Cisco uBR-MC16S) uses the same upstream frequency as the working card, but after the system stabilizes, the protect card begins using the enhanced spectrum management features of the Cisco uBR-MC16S card, as configured on the protect CMTS.
|
Cisco uBR-MC16S
|
Cisco uBR-MC16C
|
The protect card (Cisco uBR-MC16C) uses the same upstream frequency as the working card. If the upstream becomes unstable, the Cisco uBR-MC16C performs only blind frequency hopping.
|
Cisco uBR-MC16S
|
Cisco uBR-MC16S
|
The protect card initially uses the same upstream frequency as the working card, but after the system stabilizes, the protect card continues using the enhanced spectrum management features of the Cisco uBR-MC16S card.
|
Examples
The following example shows cable interface 4/0 being designated as a Working CMTS interface as member number 2 of group 2:
Router(config)# interface cable 4/0
Router(config-if)# hccp 2 working 2
Related Commands
Command
|
Description
|
hccp protect
|
Configures a particular cable interface to protect another cable interface in the same group.
|
show hccp
|
Displays information for all cable interfaces on which one or more HCCP groups and authentication modes have been configured.
|
show hccp interface
|
Displays group information for a specific cable interface on which one or more groups and authentication modes have been configured.
|
hold-queue
To limit the size of the IP output queue on an interface, use the hold-queue command in interface configuration mode. To restore the default values, use the no form of this command.
hold-queue length {in | out}
no hold-queue {in | out}
Syntax Description
length
|
Integer that specifies the maximum number of packets in the queue. The range of valid values is from 0 to 65535.
|
in
|
Specifies the input queue. The default is 75 packets. For asynchronous interfaces, the default is 10 packets.
|
out
|
Specifies the output queue. The default is 40 packets. For asynchronous interfaces, the default is 10 packets.
|
Defaults
Input hold-queue limit is 75 packets.
Output hold-queue limit is 40 packets.
Asynchronous interfaces default is 10 packets.
Command Modes
Interface configuration (config-if)
Command History
Release
|
Modification
|
10.0
|
This command was introduced.
|
11.1
|
The no hold-queue command was added.
|
12.2(14)SX
|
Support for this command was introduced on the Supervisor Engine 720.
|
12.2(17d)SXB
|
Support for this command on the Supervisor Engine 2 was extended to Cisco IOS Release 12.2(17d)SXB.
|
12.2(33)SRA
|
This command was integrated into Cisco IOS Release 12.2(33)SRA.
|
12.2(33)SCB
|
This command was integrated into Cisco IOS Release 12.2(33)SCB.
|
Usage Guidelines
Defaults
The default limits or this command prevent a malfunctioning interface from consuming an excessive amount of memory. There is no fixed upper limit to a queue size.
Back-to-Back Routing Updates
The default of 10 packets allows the Cisco IOS software to queue a number of back-to-back routing updates. This is the default for asynchronous interfaces only; other media types have different defaults.
Hold Queues and Priority Queueing
•
The hold queue stores packets received from the network that are waiting to be sent to the client. Cisco recommends that the queue size not exceed10 packets on asynchronous interfaces. For most other interfaces, queue length should not exceed 100.
•
The input hold queue prevents a single interface from flooding the network server with too many input packets. Further input packets are discarded if the interface has too many input packets outstanding in the system.
•
If you are using priority output queueing, the length of the four output queues is set using the priority-list global configuration command. The hold-queue command cannot be used to set an output hold queue length in this situation.
•
For slow links, use a small output hold-queue limit to prevent storing packets at a rate that exceeds the transmission capability of the link.
•
For fast links, use a large output hold-queue limit. A fast link may be busy for a short time (and require the hold queue) but can empty the output hold queue quickly when capacity returns.
•
You can display the current hold-queue setting and the number of packets that are discarded because of hold-queue overflows by using the show interfaces command in user EXEC mode.
Caution 
Increasing the hold queue can have detrimental effects on network routing and response times. For protocols that use seq/ack packets to determine round-trip times, do not increase the output queue. Dropping packets instead informs hosts to slow down transmissions to match available bandwidth.
This is generally better than having duplicate copies of the same packet within the network (which can happen with large hold queues).
Examples
The following example shows how to set a small input queue on a slow serial line:
Router(config)# interface serial 0
Router(config-if)# hold-queue 30 in
Cisco uBR10012 Universal Broadband Router
The following example shows how to modify the input hold queue on a Gigabit Ethernet SPA:
Router# configure terminal
Router(config)#interface GigabitEthernet3/0/0
Router(config-if)#hold-queue 30 in
Related Commands
Command
|
Description
|
priority-list
|
Establishes queueing priorities based on the protocol type.
|
show interfaces
|
Displays statistics for all interfaces configured on the router or access server.
|
hw-module bay reload
To reload the software and restart a SPA, use the hw-module bay reload command in privileged EXEC mode.
Cisco IOS Releases 12.3(23)BC and 12.2(33)SCA
hw-module bay slot/subslot/bay reload
Cisco IOS Release 12.2(33)SCB
hw-module bay slot/bay/port reload
Syntax Description
slot
|
The slot where a SIP resides. On the Cisco uBR10012 router, slots 1 and 3 can be used for SIPs.
|
subslot
|
The subslot where a SIP resides. On the Cisco uBR10012 router, subslot 0 is always specified.
|
bay
|
The bay in a SIP where a SPA is located. Valid values are 0 (upper bay) and 1 (lower bay).
|
port
|
Specifies the interface number on the SPA.
|
Command Default
No default behavior or values
Command Modes
Privileged EXEC (#)
Command History
Release
|
Modification
|
12.3(21)BC
|
This command was introduced for the Cisco uBR10012 router.
|
12.2(33)SCA
|
This command was integrated into Cisco IOS Release 12.2(33)SCA.
|
12.2(33)SCB
|
This command was modified to change the addressing format for a SPA from slot/subslot/bay to slot/bay/port.
|
Usage Guidelines
The hw-module bay reload command reloads the software and restarts a SPA.
Examples
The following example shows how to reload the software for the Cisco Wideband SPA in slot 1, subslot 0, and bay 1.
Router# hw-module bay 1/0/1 reload
Related Commands
Command
|
Description
|
hw-module shutdown
|
Shuts down a PRE1 module, line card, SIP, or SPA.
|
hw-module shutdown (ubr10012)
To shut down a particular Performance Routing Engine (PRE1) module, line card, Wideband SIP or Wideband SPA, use the hw-module shutdown (ubr10012) command in global configuration mode. To activate a specific PRE1, line card, Wideband SIP or Wideband SPA, use the no form of this command.
hw-module {main-cpu | pre {A|B} | sec-cpu | slot slot-number | subslot slot/subslot|
bay slot/subslot/bay} shutdown [unpowered]
no hw-module {main-cpu | pre {A|B} | sec-cpu | slot slot-number | subslot slot/subslot |
bay slot/subslot/bay} shutdown
Syntax Description
main-cpu
|
Shuts down the PRE1 module that is currently acting as the active PRE1 module.
|
pre {A|B}
|
Shuts down the PRE1 module that is physically in either PRE slot A (left slot) or PRE slot B (right slot).
|
sec-cpu
|
Shuts down the PRE1 module that is currently acting as the standby PRE1 module.
|
slot slot-number
|
Shuts down the line cards that are physically present in the specified slot-number (valid range is 1 to 8).
|
subslot slot/subslot
|
Shuts down the line card or SIP that is physically present in the slot with the specified slot and subslot numbers. The following are the valid values:
• slot = 1 to 8
• subslot = 0 or 1
|
bay slot/subslot/bay
|
Shuts down the SPA in the location specified by the slot/subslot/bay argument. The following are the valid values:
• slot = 1 to 3
• subslot = 0 or 1 (0 is always specified)
• bay = 0 (upper bay) or 1 (lower bay)
|
unpowered
|
Used with the Wideband SPA, shuts down the SPA and its interfaces, and leaves them in an administratively down state without power.
|
Command Default
No default behavior or values
Command Modes
Global configuration
Command History
Release
|
Modification
|
12.2(4)XF
|
This command was introduced for the Cisco uBR10012 router.
|
12.3(21)BC
|
Support was added for the Cisco Wideband SIP and Cisco 1-Gbps Wideband SPA.
|
Usage Guidelines
The hw-module shutdown (ubr10012) command shuts down in a controlled manner a particular Performance Routing Engine (PRE1) module, line card, Wideband SIP or Wideband SPA. To activate a specific PRE1, line card, Wideband SIP, or Wideband SPA, use the no form of this command.
Caution 
Shutting down the active PRE1 module will trigger a switchover, so that the standby PRE1 module becomes the active PRE1 module.
Examples
The following example shows the standby PRE1 module being shut down:
Router(config)# hw-module sec-cpu shutdown
The following example shows the active PRE1 module being shut down (which will trigger a switchover to the standby PRE1 module):
Router(config)# hw-module main-cpu shutdown
The following example shows the PRE1 module in PRE1 slot B being shut down:
Router(config)# hw-module pre B shutdown
Note
The hw-module pre B shutdown command shuts down the PRE1 module that is physically present in slot B, regardless of whether the module is the active or standby PRE1 module.
The following example shows how to deactivate and verify deactivation for the Cisco Wideband SPA located in slot 1, subslot 0, bay 0. In the output of the show hw-module bay oir command, notice the "admin down" in the Operational Status field.
Router# configure terminal
Router(config)# hw-module bay 1/0/0 shutdown unpowered
%SPAWBCMTS-4-SFP_MISSING: Wideband-Cable 1/0/0, 1000BASE-SX SFP missing from port 0
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:1, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:2, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:3, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:4, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:5, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:6, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:7, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:8, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:9, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:10, changed state to down
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:11, changed state to down
Router# show hw-module bay 1/0/0 oir
Module Model Operational Status
-------------- ------------------ -------------------------
bay 1/0/0 SPA-24XDS-SFP admin down
The following example shows how to activate and verify activation for the Cisco Wideband SPA located in slot 1, subslot 0, bay 0. In the output of the show hw-module bay oir command, notice the "ok" in the Operational Status field.
Router# configure terminal
Router(config)# no hw-module bay 1/0/0 shutdown
%SPAWBCMTS-4-SFP_OK: Wideband-Cable 1/0/0, 1000BASE-SX SFP inserted in port 0
%SPAWBCMTS-4-SFP_LINK_OK: Wideband-Cable 1/0/0, port 0 link changed state to up
%SNMP-5-LINK_UP: LinkUp:Interface Wideband-Cable1/0/0:0 changed state to up
%LINK-3-UPDOWN: Interface Cable1/0/0:0, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:1, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:2, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:3, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:4, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:5, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:6, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:7, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:8, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:9, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:10, changed state to up
%LINK-3-UPDOWN: Interface Wideband-Cable1/0/0:11, changed state to up
%LINEPROTO-5-UPDOWN: Line protocol on Interface Wideband-Cable1/0/0:0, changed state to up
Router# show hw-module bay 1/0/0 oir
Module Model Operational Status
-------------- ------------------ -------------------------
bay 1/0/0 SPA-24XDS-SFP ok
Related Commands
Command
|
Description
|
hw-module reset
|
Resets a PRE1 module or line card.
|
hw-module reload
|
Reloads the software in and restarts a Cisco 1-Gbps Wideband SPA.
|
redundancy force-failover main-cpu
|
Forces a manual switchover between the active and standby PRE1 modules.
|
hw-module slot pos
To configure a line card slot for Packet over SONET (POS) operation, use the hw-module slot pos command in privileged EXEC mode. To remove the configuration for a line card slot, use the no form of this command.
hw-module slot slot-number pos
no hw-module slot slot-number pos
Syntax Description
slot-number
|
Resets the line cards that are physically present in the specified slot-number (valid range is 1 to 8).
|
Defaults
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.2(11)BC3
|
This command was introduced for the Cisco uBR10012 OC-48 Dynamic Packet Transport (DPT) Interface Module for the Cisco uBR10012 router.
|
Usage Guidelines
You must first use the hw-module slot pos command to preconfigure a line card slot for POS operation of the Cisco uBR10012 OC-48 DPT card before you can configure the card with any further commands. You must also use the card 1oc48dpt/pos-1 command to configure the card slot for the proper card type.
Note
If you have previously used the hw-module slot srp command to configure line card slots for Spatial Reuse Protocol (SRP) operation, you must first cancel that configuration using the no hw-module slot srp command before you can configure the slots for POS operation using the hw-module slot pos command.
Examples
The following example shows the Cisco uBR10012 OC-48 DPT line card in slot 3 being configured for POS operation:
Router# hw-module slot 3 pos
Router# card 3/0 1oc48dpt/pos-1
The following example shows the Cisco uBR10012 OC-48 DPT line cards in slots 3 and 4 being reconfigured from SRP operation to POS operation:
Router# no hw-module slot 3 srp
Router# no hw-module slot 4 srp
Router# hw-module slot 3 pos
Router# card 3/0 1oc48dpt/pos-1
Router# hw-module slot 4 pos
Router# card 4/0 1oc48dpt/pos-1
Related Commands
Command
|
Description
|
hw-module reset
|
Resets a PRE1 module or line card.
|
hw-module shutdown (ubr10012)
|
Shuts down a PRE1 module or line card.
|
hw-module slot srp
|
Configures a line card slot for SRP operation.
|
hw-module slot srp
To configure a line card slot for Spatial Reuse Protocol (SRP) operation, use the hw-module slot srp command in privileged EXEC mode. To remove the configuration for a line card slot, use the no form of this command.
hw-module slot slot-number srp
no hw-module slot slot-number srp
Syntax Description
slot-number
|
Resets the line cards that are physically present in the specified slot-number (valid range is 1 to 8).
|
Defaults
No default behavior or values
Command Modes
Privileged EXEC
Command History
Release
|
Modification
|
12.2(11)BC3
|
This command was introduced for the Cisco uBR10012 OC-48 Dynamic Packet Transport (DPT) Interface Module for the Cisco uBR10012 router.
|
12.2(33)SCB
|
This command is obsolete.
|
Usage Guidelines
You must first use the hw-module slot srp command to preconfigure a line card slot for SRP operation of a pair of Cisco uBR10012 OC-48 DPT cards before you can configure the cards with any further commands. You must also use the card 1oc48dpt/pos-1 command to configure each card slot for the proper card type.
Tip
The Cisco uBR10012 OC-48 DPT line cards support SRP operation only when installed in adjacent odd- and even-numbered slots (such as slots 1 and 2 or 3 and 4). You need to use the hw-module slot srp command only for the lower-numbered (odd-numbered) slot to preconfigure both slots of the SRP pair.
Note
If you have previously used the hw-module slot pos command to configure line card slots for Packet over SONET (POS) operation, you must first cancel that configuration using the no hw-module slot pos command before you can configure the slots for POS operation using the hw-module slot srp command.
Examples
The following example shows the Cisco uBR10012 OC-48 DPT line cards in slots 1 and 2 being configured for POS operation:
Router# hw-module slot 1 srp
Router# card 1/0 1oc48dpt/pos-1
Router# card 2/0 1oc48dpt/pos-1
The following example shows the Cisco uBR10012 OC-48 DPT line cards in slots 3 and 4 being reconfigured from POS operation to SRP operation:
Router# no hw-module slot 3 pos
Router# no hw-module slot 4 pos
Router# hw-module slot 3 srp
Router# card 3/0 1oc48dpt/pos-1
Router# card 4/0 1oc48dpt/pos-1
Related Commands
Command
|
Description
|
hw-module reset
|
Resets a PRE1 module or line card.
|
hw-module shutdown (ubr10012)
|
Shuts down a PRE1 module or line card.
|
hw-module slot pos
|
Configures a line card slot for POS operation.
|