CH A P T E R 5 Configuring Additional Router Features This chapter contains instructions and information for entering basic configurations using the command-line interface (CLI).
Chapter 5 Configuring Additional Router Features Configuring the Domain Name and Domain Name Server To configure the DNS and DNS server, complete the following steps: SUMMARY STEPS 1. configure 2. domain name domain-name-of-organization 3. domain name-server ipv4-address 4. commit or end 5. show hosts DETAILED STEPS Step 1 Command or Action Purpose configure Enters global configuration mode.
Chapter 5 Configuring Additional Router Features Configuring the Domain Name and Domain Name Server Step 4 Command or Action Purpose end or commit Saves configuration changes.
Chapter 5 Configuring Additional Router Features Configuring Telnet, HTTP, and XML Host Services Configuring Telnet, HTTP, and XML Host Services For security, some host services are disabled by default. Host services, such as Telnet, Extensible Markup Language (XML), and HTTP, can be optionally enabled using the commands described in this section. Host services provide the following features: • Enabling the Telnet server allows users to log in to the router using IPv4 or IPv6 Telnet clients.
Chapter 5 Configuring Additional Router Features Configuring Telnet, HTTP, and XML Host Services DETAILED STEPS Step 1 Command or Action Purpose configure Enters global configuration mode. Example: RP/0/RP0/CPU0:router# configure Step 2 telnet ipv4 server max-servers limit or Enables Telnet services on the router and specifies the maximum number of allowable Telnet servers.
Chapter 5 Configuring Additional Router Features Managing Configuration History and Rollback Examples In the following example, the host services are enabled: RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# telnet ipv6 server max-servers 5 RP/0/RP0/CPU0:router(config)# http server RP/0/RP0/CPU0:router(config)# xml agent corba RP/0/RP0/CPU0:router(config)# commit Related Documents Related Topic Document Title Installation and activation of the Manageability and Security Packages Upgradin
Chapter 5 Configuring Additional Router Features Managing Configuration History and Rollback • Loading Rollback Configuration Changes to the Target Configuration, page 5-112 • Deleting CommitIDs, page 5-113 Displaying the CommitIDs To display a history of up to 100 of the most recent commitIDs, enter the show configuration commit list command in EXEC or administration EXEC mode. Up to 100 of the most recent commitIDs are saved by the system.
Chapter 5 Configuring Additional Router Features Managing Configuration History and Rollback Previewing Rollback Configuration Changes The show configuration rollback changes command allows you to preview the configuration changes that take place if you roll back the configuration to a specific commitID. For example, if you want to roll back the configuration to a specific point, all configuration changes made after that point must be undone.
Chapter 5 Configuring Additional Router Features Managing Configuration History and Rollback Tip To preview the commands that undo the configuration during a rollback, use the show configuration rollback changes command. To roll back the router configuration to a previously committed configuration, go to EXEC or administration EXEC mode and enter the rollback configuration to commitId command: RP/0/RP1/CPU0:router# rollback configuration to 1000000220 Loading Rollback Changes.
Chapter 5 Configuring Additional Router Features Managing Configuration History and Rollback Note Unlike the rollback process, loading the commitID configuration changes loads only the changes made during that commit operation. The load process does not load all changes made between the commitID and the current committed configuration.
Chapter 5 Configuring Additional Router Features Managing Configuration History and Rollback To load rollback configuration changes from the current configuration to a specific session, go to global configuration or administration configuration mode and enter the load rollback changes to commitId command: RP/0/0/CPU0:router(config)# load rollback changes to 1000000068 Building configuration... Loading.
Chapter 5 Configuring Additional Router Features Configuring Logging and Logging Correlation Configuring Logging and Logging Correlation System messages generated by the Cisco IOS XR software can be logged to a variety of locations based on the severity level of the messages. For example, you could direct information messages to the system console and also log debugging messages to a network server.
Chapter 5 Configuring Additional Router Features Configuring Logging and Logging Correlation Alarm Logging Correlation Alarm logging correlation is used to group and filter similar messages to reduce the amount of redundant logs and isolate the root causes of the messages. For example, the original message describing a card online insertion and removal (OIR) and system state being up or down can be reported, and all subsequent messages reiterating the same event can be correlated.
Chapter 5 Configuring Additional Router Features Configuring Logging and Logging Correlation Step 4 Command or Action Purpose logging console [severity] Logs messages on the console. • When a severity level is specified, only messages at that severity level are logged on the console. • See Table 5-2 for a summary of the logging severity levels.
Chapter 5 Configuring Additional Router Features Creating and Modifying User Accounts and User Groups RP/0/RP0/CPU0:Apr RP/0/RP0/CPU0:Apr RP/0/RP0/CPU0:Apr LC/0/1/CPU0:Apr 8 LC/0/6/CPU0:Apr 8 RP/0/RP0/CPU0:Apr RP/0/RP1/CPU0:Apr LC/0/1/CPU0:Apr 8 LC/0/6/CPU0:Apr 8 RP/0/RP0/CPU0:Apr RP/0/RP1/CPU0:Apr RP/0/RP0/CPU0:Apr RP/0/RP0/CPU0:Apr RP/0/RP0/CPU0:Apr --More-- 8 19:18:58.679 8 19:19:01.287 8 19:22:15.658 19:22:30.122 : 19:22:30.160 : 8 19:22:30.745 8 19:22:32.596 19:22:35.181 : 19:22:35.223 : 8 19:22:36.
Chapter 5 Configuring Additional Router Features Creating and Modifying User Accounts and User Groups Note The management of user accounts, user groups, and task IDs is part of the “AAA” feature in the Cisco IOS XR software. AAA stands for “authentication, authorization, and accounting,” a suite of security features included in the Cisco IOS XR software.
Chapter 5 Configuring Additional Router Features Creating and Modifying User Accounts and User Groups Configuring User Accounts User accounts, user groups, and task groups are created by entering the appropriate commands in one of the “AAA” configuration submodes, as shown in Figure 5-1. This section describes the process to configure usernames. For instructions to configure user groups, task groups, and other AAA security features, see the Cisco IOS XR System Security Configuration Guide.
Chapter 5 Configuring Additional Router Features Creating and Modifying User Accounts and User Groups DETAILED STEPS Step 1 Command or Action Purpose configure Enters global configuration mode. Example: RP/0/RP0/CPU0:router# configure Step 2 Creates a name for a new user (or identifies a current user) and enters username configuration submode. username user-name • Example: RP/0/RP0/CPU0:router(config)# username user1 Step 3 Specifies a password for the user named in Step 2.
Chapter 5 Configuring Additional Router Features Configuring Software Entitlement Configuring Software Entitlement Beginning in Cisco IOS XR Software Release 3.5.0, certain software and hardware features are enabled using software entitlement. Software entitlement is a system that consists of a license manager on a Cisco IOS XR device that manages licenses for various software and hardware features. The license manager parses and authenticates a license before accepting it.
Chapter 5 Configuring Additional Router Features Configuration Limiting Static Route Configuration Limits Table 5-4 summarizes the maximum limits for static routes, including the commands used to display and change the limits.
Chapter 5 Configuring Additional Router Features Configuration Limiting Examples In the following example, the maximum number of active parallel paths for each route is increased to 10, and the maximum number of prefixes redistributed into IS-IS is increased to 12,000: RP/0/RP1/CPU0:router# configure RP/0/RP1/CPU0:router(config)# router isis 100 address-family ipv4 RP/0/RP1/CPU0:router(config-isis-af)# maximum-paths 10 RP/0/RP1/CPU0:router(config-isis-af)# maximum-redistributed-prefixes 12000 RP/0/RP1/CPU
Chapter 5 Configuring Additional Router Features Configuration Limiting Examples The following examples illustrate OSPF configuration limits: • Maximum Interfaces for Each OSPF Instance: Example, page 5-124 • Maximum Routes Redistributed into OSPF: Example, page 5-125 • Number of Parallel Links (max-paths): Example, page 5-125 Maximum Interfaces for Each OSPF Instance: Example In the following example, the show ospf command is used to display the maximum number of OSPF interfaces: RP/0/RP1/CPU0:rou
Chapter 5 Configuring Additional Router Features Configuration Limiting Maximum Routes Redistributed into OSPF: Example In the following example, the maximum redistributed-prefixes command is used to set the maximum routes redistributed into OSPF: RP/0/RP1/CPU0:router# configure RP/0/RP1/CPU0:router(config)# router ospf 100 RP/0/RP1/CPU0:router(config-router)# maximum redistributed-prefixes 12000 RP/0/RP1/CPU0:router(config-router)# end Uncommitted changes found, commit them? [yes]: y RP/0/RP1/CPU0:Mar 30
Chapter 5 Configuring Additional Router Features Configuration Limiting Table 5-7 BGP Configuration Limits and Commands (continued) Feature Limit Description Default Absolute Maximum Maximum Limit Limit Configuration Command (Router Configuration Mode) Show Current Settings Command (EXEC Mode) IPv4 multicast maximum prefixes that can be received from a neighbor 131,072 4,294,967, maximum-prefix n 295 show bgp neighbor IP_address IPv6 unicast maximum prefixes that can be received from a neighbor
Chapter 5 Configuring Additional Router Features Configuration Limiting A cease-notification message is sent to the neighbor and the peering with the neighbor is terminated when the number of prefixes received from the peer for a given address family exceeds the maximum limit (either set by default or configured by the user) for that address family.
Chapter 5 Configuring Additional Router Features Configuration Limiting Examples In the following example, the show rpl maximum command is used in EXEC mode to display the current setting for RPL limits and number of each limit currently in use. A summary of the memory used by all of the defined policies is also shown below the limit settings.
Chapter 5 Configuring Additional Router Features Configuration Limiting Multicast Configuration Limits Table 5-9 summarizes the maximum limits for multicast configuration, including the commands used to display and change the limits.
Chapter 5 Configuring Additional Router Features Configuration Limiting MPLS Configuration Limits Table 5-10 summarizes the maximum limits for MPLS configuration, including the commands used to display and change the limits.