Home
Cisco
Network Router
ASR 5500
Cisco ASR 5500 System Administration Guide
5
of 1
of 1 rating
430 pages
Give review
Manual
Specs
To Next Page
To Next Page
To Previous Page
To Previous Page
Loading...
{
ip
|
ipv6
}
access-list
acl_list_name
end
Notes:
•
The
maximum
number
of
ACLs
that
can
be
configured
per
context
is
limited
by
the
amount
of
available
memory
in
the
VPN
Manager
software
task.
T
ypically
,
the
maximum
is
less
than
200.
Configuring Action and Criteria for Subscriber T
raffic
T
o
create
rules
to
deny/permit
the
subscriber
traffic
and
apply
the
rules
after
or
before
action,
enter
the
following
command
sequence
from
the
Exec
mode
of
the
system
CLI:
configure
context
acl_ctxt_name
[
-noconfirm
]
{
ip
|
ipv6
}
access-list
acl_list_name
deny
{
ip_addr
ess
|
any
|
host
|
icmp
|
ip
|
log
|
tcp
|
udp
}
permit
{
ip_address
|
any
|
host
|
icmp
|
ip
|
log
|
tcp
|
udp
}
after
{
deny
|
permit
|
readdress
|
redir
ect
}
before
{
deny
|
permit
|
readdr
ess
|
redir
ect
}
end
Notes:
The
system
does
not
apply
a
"deny
any"
rule,
unless
it
is
specified
in
the
ACL.
This
behavior
can
be
changed
by
adding
a
"deny
any"
rule
at
the
end
of
the
ACL.
Caution
•
The
maximum
number
of
rules
that
can
be
configured
per
ACL
varies
depending
on
how
the
ACL
is
to
be
used.
For
more
information,
refer
to
the
Engineering
Rules
chapter
.
•
Use
the
information
provided
in
the
Actions
and
Criteria
to
configure
the
rules
that
comprise
the
ACL.
For
more
information,
refer
to
the
ACL
Configuration
Mode
Commands
and
IPv6
ACL
Configuration
Mode
Commands
chapters
in
the
Command
Line
Interface
Refer
ence
.
Configuring an Undefined ACL
As
discussed
previously
the
system
uses
an
"undefined"
ACL
mechanism
for
filtering
the
packet(s)
in
the
event
that
an
ACL
that
has
been
applied
is
not
present.
This
scenario
is
likely
the
result
of
a
mis-configuration
such
as
the
ACL
name
being
mis-typed
during
the
configuration
process.
For
these
scenarios,
the
system
provides
an
"undefined"
ACL
that
acts
as
a
default
filter
for
all
packets
into
the
context.
The
default
action
is
to
"permit
all".
T
o
modify
the
default
behavior
for
unidentified
ACLs,
use
the
following
configuration:
configure
context
acl_ctxt_name
[-noconfirm]
access-list
undefined
{
deny-all
|
permit-all
}
end
Notes:
ASR 5500 System Administration Guide, StarOS Release 21.5
187
Access Control Lists
Configuring Action and Criteria for Subscriber T
raffic
212
214
Table of Contents
Default Chapter
3
Table of Contents
3
About this Guide
25
Conventions Used
25
Terminology
27
Logical Interfaces
28
AAA Servers
29
Trusted Builds
30
Context Selection for Context-Level Administrative User Sessions
31
Context Selection for Subscriber Sessions
34
IP Address Notation
35
CIDR Notation
36
Character Set
37
Quoted Strings
38
Getting Started
39
Configuring System Administrative Users
39
Limiting the Number of Concurrent CLI Sessions
39
Automatic Logout of CLI Sessions
40
Configuring SSH Options
40
SSH Host Keys
41
Setting SSH Key Size
41
Configuring SSH Key Generation Wait Time
41
Specifying SSH Encryption Ciphers
42
Generating SSH Keys
43
Setting SSH Key Pair
43
Authorized SSH User Access
44
Authorizing SSH User Access
44
SSH User Login Restrictions
44
Creating an Allowed Users List
45
SSH User Login Authentication
45
Secure Session Logout
46
Changing Default Sshd Secure Session Logout Parameters
47
SSH Client Login to External Servers
47
Setting SSH Client Ciphers
47
Setting Preferred Authentication Methods
48
Generating SSH Client Key Pair
49
Pushing an SSH Client Public Key to an External Server
50
Enabling NETCONF
50
System Settings
51
Configuring System Timing
51
Setting the System Clock and Time Zone
52
Verifying and Saving Your Clock and Time Zone Configuration
52
Configuring Network Time Protocol Support
52
Configuring NTP Servers with Local Sources
53
Using a Load Balancer
53
Verifying the NTP Configuration
54
Configuring SF Boot Configuration Pause
55
Configuring CLI Confirmation Prompts
56
Enabling Automatic Confirmation
56
Requiring Confirmation for Autoconfirm and Configure Commands
57
Requiring Confirmation for Specific Exec Mode Commands
57
Enabling CLI Timestamping
56
Configuring System Administrative Users
58
User Name Character Restrictions
59
Configuring Context-Level Administrative Users
59
Configuring Context-Level Security Administrators
59
Configuring Context-Level Administrators
60
Configuring Context-Level Operators
60
Configuring Context-Level Inspectors
61
Segregating System and LI Configurations
61
Verifying Context-Level Administrative User Configuration
62
Configuring Local-User Administrative Users
63
Verifying Local-User Configuration
63
Updating Local-User Database
63
Updating and Downgrading the Local-User Database
64
Restricting User Access to a Specified Root Directory
65
Configuring an SFTP Root Directory
65
Associating an SFTP Root Directory with a Local User
65
Associating an SFTP Root Directory with an Administrator
65
Associating an SFTP Root Directory with a Config Administrator
66
Configuring TACACS+ for System Administrative Users
66
Operation
66
User Account Requirements
67
TACACS+ User Account Requirements
67
Staros User Account Requirements
68
Configuring TACACS+ AAA Services
68
Configuring TACACS+ for Non-Local VPN Authentication
69
Verifying the TACACS+ Configuration
69
Separating Authentication Methods
70
Disable TACACS+ Authentication for Console
70
Disable AAA-Based Authentication for Console
71
Disable TACACS+ Authentication at the Context Level
71
Limit Local-User Login on Console/Vty Lines
71
Limit Console Access for AAA-Based Users
72
Verify Configuration Changes
72
Configuring a Chassis Key
72
Overview
73
Configuring a New Chassis Key Value
73
CLI Commands
73
Quick Setup Wizard
74
Enabling Automatic Reset of FSC Fabric
74
Chapter
74
Config Mode Lock Mechanisms
77
Overview of Config Mode Locking
77
Requesting an Exclusive-Lock
78
Effect of Config Lock on URL Scripts
79
Saving a Configuration File
80
Reload and Shutdown Commands
80
Show Administrators Command
81
Management Settings
83
Orbem
83
Configuring ORBEM Client and Port Parameters
84
Configuring IIOP Transport Parameters
84
Verifying ORBEM Parameters
85
SNMP MIB Browser
85
SNMP Support
88
Configuring SNMP and Alarm Server Parameters
88
Verifying SNMP Parameters
89
Controlling SNMP Trap Generation
90
Verifying and Saving Your Configuration
91
Verifying the Configuration
91
Feature Configuration
91
Service Configuration
92
Context Configuration
92
System Configuration
92
Finding Configuration Errors
92
Synchronizing File Systems
93
Saving the Configuration
93
Chapter
93
System Interfaces and Ports
95
Contexts
95
Creating Contexts
95
Viewing and Verifying Contexts
96
Ethernet Interfaces and Ports
96
Creating an Interface
97
Configuring a Port and Binding It to an Interface
97
Configuring a Static Route for an Interface
97
Viewing and Verifying Port Configuration
98
Vlans
98
Hypervisors
99
Vlans and Management Ports
99
System Security
101
Protection of Passwords
101
Secure Password Encryption
101
Support for Non-Current Encryptions and Decryptions
102
Support for ICSR Configurations
102
Encrypted SNMP Community Strings
103
Lawful Intercept Restrictions
103
LI Server Addresses
103
Modifying Intercepts
104
Adding, Modifying and Removing Users
104
Notification of Users Being Added or Deleted
104
Notification of Changes in Privilege Levels
104
User Access to Operating System Shell
104
Test-Commands
105
Enabling Cli Test-Commands Mode
105
Enabling Password for Access to CLI-Test Commands
105
Exec Mode Cli Test-Commands
106
Configuration Mode Cli Test-Commands
106
Secure System Configuration File
107
Feature Summary and Revision History
107
Feature Description
108
How System Configuration Files Are Secured
108
Create a Digital Signature
108
Validate the Digital Signature
109
Configuring Signature Verification
109
Import RSA Public Key for Verification
109
Enable or Disable Signature Verification
110
Software Management Operations
111
Understanding the Local File System
111
File Types Used by the Local File System
111
Understanding the Boot.sys File
112
Maintaining the Local File System
112
File System Management Commands
112
Creating Directories
112
Renaming Files and Directories
113
Copying Files
113
Deleting Files
113
Removing Directories
113
Formatting Local Devices
114
Applying Pre-Existing CLI Configuration Files
114
Viewing Files on the Local File System
115
Viewing the Contents of a Local Device
115
Viewing CLI Configuration and Boot.sys Files
115
Validating an Operating System File
115
Configuring the Boot Stack
116
System Boot Methods
116
Viewing the Current Boot Stack
116
Adding a New Boot Stack Entry
118
Deleting a Boot Stack Entry
118
Upgrading the Operating System Software
118
Identifying os Release Version and Build Number
118
Verify Free Space on the /Flash Device
119
Download the Software Image from the Support Site
119
Transfer Staros Image to /Flash
120
Saving a Copy of the Current Configuration File
120
Downgrading from Release 15.0 to 14.0
120
Downgrading from Release 20.0
120
Off-Line Software Upgrade
121
Configure a Newcall Policy
121
Configure a Message of the Day Banner
122
Back up the Current CLI Configuration File
122
Create a New Boot Stack Entry
122
Synchronize File Systems
123
Save the Running Configuration
123
Reboot the System
123
Verify the Running Software Version
123
Restoring the Previous Software Image
124
Managing License Keys
124
New System License Keys
124
Session Use and Feature Use Licenses
124
Installing New License Keys
125
Cutting and Pasting the Key
125
Adding License Keys to Configuration Files
125
License Expiration Behavior
126
Requesting License Keys
126
Viewing License Information
126
Deleting a License Key
127
Managing Local-User Administrative Accounts
127
Configuring Local-User Password Properties
127
Configuring Local-User Account Management Properties
127
Local-User Account Lockouts
127
Local-User Account Suspensions
128
Changing Local-User Passwords
128
Smart Licensing
129
Feature Summary and Revision History
129
Smart Software Licensing
130
Cisco Smart Software Manager
131
Smart Accounts/Virtual Accounts
131
Request a Cisco Smart Account
131
Software Tags and Entitlement Tags
132
Configuring Smart Licensing
133
Monitoring and Troubleshooting Smart Licensing
134
Smart Licensing Bulk Statistics
134
C H a P T E
137
Monitoring the System
137
SNMP Notifications
137
Monitoring System Status and Performance
137
Clearing Statistics and Counters
139
C H a P T E
141
Bulk Statistics
141
Feature Summary and Revision History
141
Configuring Communication with the Collection Server
142
Configuring Standard Settings
142
Configuring Optional Settings
143
Configuring Bulk Statistic Schemas
143
Configuring a Separate Bulkstats Config File
144
Using Show Bulkstats Commands
144
Verifying Your Configuration
145
Saving Your Configuration
146
Viewing Collected Bulk Statistics Data
146
Collecting Bulk Statistics Samples in SSD
146
Manually Gathering and Transferring Bulk Statistics
146
Clearing Bulk Statistics Counters and Information
147
Bulkstats Schema Nomenclature
147
Statistic Types
147
Data Types
148
Key Variables
148
Bulk Statistics Event Log Messages
150
C H a P T E
151
Feature Summary and Revision History
151
System Logs
151
System Log Types
152
Configuring Event Logging Parameters
153
Configuring Event Log Filters
154
Exec Mode Filtering
154
Global Configuration Mode Filtering
156
Configuring Syslog Servers
157
Configuring Active Logs
157
Specifying Facilities
158
Configuring Monitor Logs
167
Enabling Monitor Logs
167
Disabling Monitor Logs
167
Configuring Trace Logging
167
Viewing Event Logs Using the CLI
168
Viewing Logging Configuration and Statistics
168
Configuring and Viewing Crash Logs
169
Crash Logging Architecture
169
Configuring Software Crash Log Destinations
170
Viewing Abridged Crash Log Information Using the CLI
171
Reducing Excessive Event Logging
172
Configuring Log Source Thresholds
173
Checkpointing Logs
173
Event ID Overview
174
Event Severities
183
Understanding Event ID Information in Logged Output
183
Saving Log Files
174
Chapter 1 5 Troubleshooting
185
Verifying Network Connectivity
185
Using the Ping or Ping6 Command
185
Syntax
186
Troubleshooting
186
Using the Traceroute or Traceroute6 Command
186
Traceroute - Ipv4
187
Traceroute6 - Ipv6
187
Viewing IP Routes
187
Viewing the Address Resolution Protocol Table
188
Using the System Diagnostic Utilities
188
Using the Monitor Utility
188
Using the Protocol Monitor
189
Using the Protocol Monitor for a Specific Subscriber
190
Generating an SSD
191
Configuring and Using the Support Data Collector
192
Chapter
192
Packet Capture (PCAP) Trace
193
Feature Information
193
Feature Description
194
Configuring PCAP Trace
194
Enabling Multiple Instances of CDRMOD
194
Configuring the Hexdump Module
195
Configuring the Hexdump File Parameters
197
Enabling or Disabling Hexdump
200
Enabling PCAP Trace for MME
200
Monitoring and Troubleshooting PCAP Trace
201
Show Command(S) And/Or Outputs
201
Show Cdr Statistics
201
Show { Hexdump-Module | Cdr } File-Space-Usage
202
Show Hexdump-Module Statistics
203
System Recovery
207
Prerequisites
207
Console Access
207
Boot Image
207
Accessing the Boot CLI
208
Initiate a Reboot
208
Chapter 1 8 Access Control Lists
209
Overview
209
Understanding Acls
210
Rule(S)
210
Actions
210
Criteria
210
Rule Order
212
Configuring Acls on the System
212
Creating Acls
212
Configuring Action and Criteria for Subscriber Traffic
213
Configuring an Undefined ACL
213
Verifying the ACL Configuration
214
Applying IP Acls
214
Applying the ACL to an Interface
216
Applying an ACL to an Individual Interface
216
Verifying the ACL Configuration on an Interface
217
Applying the ACL to a Context
217
Applying an ACL to All Traffic Within a Context
218
Verifying the ACL Configuration in a Context
218
Applying an ACL to a RADIUS-Based Subscriber
219
Applying an ACL to an Individual Subscriber
220
Verifying the ACL Configuration to an Individual Subscriber
220
Applying an ACL to the Subscriber Named Default
221
Verifying the ACL Configuration to the Subscriber Named Default
222
Applying an ACL to Service-Specified Default Subscriber
222
Applying an ACL to Service-Specified Default Subscriber
223
Verifying the ACL Configuration to Service-Specified Default Subscriber
223
Applying a Single ACL to Multiple Subscribers
224
Applying an ACL to Multiple Subscriber Via Apns
225
Verifying the ACL Configuration to Apns
226
Congestion Control
227
Overview
227
Configuring Congestion Control
228
Configuring the Congestion Control Threshold
228
Configuring Service Congestion Policies
229
Configuring Overload Reporting on the MME
229
Enabling Congestion Control Redirect Overload Policy
230
Verify the Service Overload Policies
230
Verify the Congestion Control Configuration
230
Verify MME Congestion Action Profiles
230
Disconnecting Subscribers Based on Call or Inactivity Time
230
Chapter 2 0 Routing
233
Routing Policies
233
Creating IP Prefix Lists
234
Creating Route Access Lists
234
Creating as Path Access Lists
234
Creating Route Maps
235
Sample Configuration
235
Static Routing
235
Adding Static Routes to a Context
236
Deleting Static Routes from a Context
236
OSPF Routing
236
OSPF Version 2 Overview
237
Basic Ospfv2 Configuration
238
Enabling OSPF Routing for a Specific Context
238
Enabling OSPF over a Specific Interface
238
Redistributing Routes into OSPF (Optional)
238
Confirming OSPF Configuration Parameters
239
Ospfv3 Routing
239
Ospfv3 Overview
239
Basic Ospfv3 Configuration
239
Enabling Ospfv3 Routing for a Specific Context
239
Enabling Ospfv6 over a Specific Interface
240
Redistributing Routes into Ospfv3 (Optional)
240
Confirming Ospfv3 Configuration Parameters
240
Equal Cost Multiple Path (ECMP)
240
BGP-4 Routing
241
Overview of BGP Support
241
Configuring BGP
242
Redistributing Routes into BGP (Optional)
242
BGP Communities and Extended Communities
243
BGP Communities
243
Configuring a BGP Community
243
Setting the Community Attribute
244
Filtering Via a BGP Community
244
BGP Extended Communities
244
Configuring a BGP Extended Community (Route Target)
244
Setting the Extended Community Attribute
245
Filtering Via a BGP Extended Community
245
BGP Local Preference
245
ICSR and SRP Groups
245
Advertising BGP Routes from a Standby ICSR Chassis
245
Configurable BGP Route Advertisement Interval for ICSR
246
BGP CLI Configuration Commands
246
Confirming BGP Configuration Parameters
248
Bidirectional Forwarding Detection
248
Overview of BFD Support
249
Configuring BFD
249
Configuring a BFD Context
250
Configuring Ipv4 BFD for Static Routes
250
Configuring Ipv6 BFD for Static Routes
250
Configuring BFD for Single Hop
251
Configuring Multihop BFD
251
Scaling of BFD
252
Associating BGP Neighbors with the Context
252
Associating OSPF Neighbors with the Context
252
Associating BFD Neighbor Groups with the BFD Protocol
252
Enabling BFD on OSPF Interfaces
253
All OSPF Interfaces
253
Specific OSPF Interface
253
Monitoring BFD Connection for ICSR
253
Saving the Configuration
253
Chassis-To-Chassis BFD Monitoring for ICSR
253
Enable Primary Chassis BFD Monitoring
254
Set BFD to Ignore ICSR Dead Interval
254
Configure ICSR Switchover Guard Timer
254
Enable BFD Multihop Fall-Over
255
Ip Route Command
255
Ip Routev6 Command
256
Adjust BFD Interval
256
Enable Advertising BGP Routes from Standby ICSR Chassis
256
Saving the Configuration
256
BFD Support for Link Aggregation Member Links
256
Overview
257
Configuring Support for BFD Linkagg Member-Links
257
Saving the Configuration
258
Viewing Routing Information
258
Vlans
261
Overview
261
Overlapping IP Address Pool Support - GGSN
261
RADIUS VLAN Support - Enhanced Charging Services
262
APN Support - PDN Gateway (P-GW)
262
Creating VLAN Tags
262
Verifying the Port Configuration
263
Configuring Subscriber VLAN Associations
264
RADIUS Attributes Used
264
Configuring Local Subscriber Profiles
264
Verify the Subscriber Profile Configuration
264
VLAN-Related CLI Commands
265
BGP MPLS Vpns
267
Introduction
267
MPLS-CE Connected to PE
268
As a PE
268
Overview
268
Sample Configuration
269
Ipv6 Support for BGP MPLS Vpns
270
Overview
270
Sample Configuration
270
VPN-Related CLI Commands
272
Content Service Steering
279
Overview
279
Configuring Internal Content Service Steering
280
Defining IP Access Lists for Internal CSS
280
Applying an ACL to an Individual Subscriber (Optional)
281
Applying an ACL to Multiple Subscribers (Optional)
281
Applying an ACL to the Subscriber Named Default (Optional)
281
Applying an ACL to Service-Specified Default Subscribers (Optional)
281
Applying an ACL to Multiple Subscribers Via Apns (Optional)
281
Session Recovery
283
How Session Recovery Works
283
Configuring the System to Support Session Recovery
285
Enabling Session Recovery
285
Enabling Session Recovery on an Out-Of-Service System
286
Enabling Session Recovery on an In-Service System
286
Disabling the Session Recovery Feature
287
Viewing Session Recovery Status
287
Viewing Recovered Session Information
288
Recovery Control Task Statistics
289
Show Rct Stats Command
289
Sample Output for Show Rct Stats Verbose
290
Interchassis Session Recovery
293
Overview
293
Interchassis Communication
293
Checkpoint Messages
294
SRP CLI Commands
294
Exec Mode CLI Commands
294
Show Commands
295
AAA Monitor
295
BGP Interaction
296
Requirements
296
ICSR Operation
297
Chassis Initialization
297
Chassis Operation
297
Chassis Communication
297
Chassis Switchover
297
Configuring ICSR
297
Configuring the Service Redundancy Protocol (SRP) Context
298
Creating and Binding the SRP Context
299
Configuring SRP Context Parameters
299
Basic Parameters
299
SRP Redundancy, AAA and Diameter Guard Timers
300
DSCP Marking of SRP Messages
301
Optimizing Switchover Transitions
301
Allow Non-Volte Traffic During ICSR Switchover
302
Allow All Data Traffic
304
Allow Early Active Transition
304
Graceful Cleanup of ICSR after Audit of Failed Calls
304
Optimization of Switchover Control Outage Time
305
Configuring the SRP Context Interface Parameters
305
Configuring NACK Generation for SRP Checkpoint Messaging Failures
306
Enabling NACK Messaging from the Standby Chassis
306
Selective Disabling of NACK Messaging
307
Configuring LZ4 Compression Algorithm
307
Reducing Sync-Up Time with Standby ICSR Chassis
307
Verifying SRP Configuration
308
Modifying the Source Context for ICSR
308
Configuring BGP Router and Gateway Address
309
Configuring the SRP Context for BGP
309
Verifying BGP Configuration
309
Modifying the Destination Context for ICSR
310
Configuring BGP Router and Gateway Address in Destination Context
310
Configuring SRP Context for BGP for Destination Context
310
Setting Subscriber to Default Mode
310
Verifying BGP Configuration in Destination Context
311
Disabling Bulk Statistics Collection on a Standby System
311
Verifying the Primary and Backup Configuration
311
Configuring Subscriber State Management Audit Process
312
Troubleshooting ICSR Operation
312
Updating the Operating System
313
Both ICSR Systems
318
Standby ICSR System
318
Performing Health Checks
319
Performing SRP Checks
319
Performing BGP Checks
319
Updating the Boot Record
320
Synchronizing File Systems
320
Reboot Staros
320
Updating the Configuration File
320
Verifying the Software Version
321
Saving the Configuration File
321
Completing the Update Process
321
Waiting for Session Synchronization
321
Primary System
321
Initiating an SRP Switchover
322
Checking AAA Monitor Status on the Newly Active System
322
Completing the Software Update
322
Initiating an SRP Switchover
323
Making Test Calls
323
Fallback Procedure
323
Support Data Collector
325
Overview
325
Configuring SDR Collection
326
Displaying the SDR Collection Configuration
326
Collecting and Storing the SDR Information
327
Managing Record Collection
327
Using Sdrs to Diagnose Problems
329
SDR CLI Commands
329
Configuration Commands (Global Configuration Mode)
330
Support Record
330
Support Collection
330
Exec Mode Commands
331
Show Support Record
331
Delete Support Record
331
Show Support Collection
331
Appendix A Engineering Rules
333
CLI Session Rules
333
Context Rules
333
Subscriber Rules
336
Service Rules
336
Access Control List (ACL) Engineering Rules
337
ECMP Groups
337
Appendix B Staros Tasks
339
Overview
339
Primary Task Subsystems
340
Controllers and Managers
341
Subsystem Tasks
342
System Initiation Subsystem
342
High Availability Subsystem
343
Resource Manager Subsystem
344
Virtual Private Networking Subsystem
344
Network Processing Unit Subsystem
346
Session Subsystem
348
Platform Processes
357
Management Processes
360
Appendix C
363
Feature Summary and Revision History
363
Overview
364
Configuring Confd
366
SSH Key Requirement
366
NETCONF Protocol Configuration Mode
367
Bulkstats
367
Confd-User
367
Netconf Notifications Events
368
Netconf Notifications Snmp
368
Netconf Port
368
Rest Auth-Policy
369
Rest Certificate
369
Rest Hostname
370
Rest Port
370
Sample Configuration
370
Verifying the Configuration
371
Show Confdmgr Command
371
Clear Confdmgr Confd Cdb
378
Clear Confdmgr Statistics
378
YANG Models
379
Show Support Details (SSD)
379
Confd Examples
380
Server Confd
380
Bulkstats
381
Exec CLI Model
383
CLI Based YANG Model for ECS Commands
384
Seeding and Synchronizing the CDB
385
Show Configuration Confd Command
385
CDB Maintenance
386
Clear Confdmgr Confd Cdb
386
Configure Confd <Url
386
Save Configuration <Url> Confd
387
Supported Staros ECS Configuration Commands
387
NETCONF and Confd
363
Appendix D
389
Overview of Checkpointing
389
Macro-Checkpoints
389
Ggsn_Apn ID Mapping
390
Instance Level Checkpoint
390
Service_Id Mapping
390
Micro-Checkpoints
391
Vpnmgr_Id Mapping
391
Uncategorized
392
Sess_Uchkpt_Cmd_Invalidate_Crr
392
Sess_Uckkpt_Cmd_Update_Clpstats
392
Sess_Uchkpt_Cmd_Update_Idlesecs
392
DCCA Category
393
Sess_Uchkpt_Cmd_Dcca_Sess_Info
393
ECS Category
393
Sess_Uchkpt_Cmd_Acs_Call_Info
393
Sess_Uchkpt_Cmd_Acs_Gx_Li_Info
394
Sess_Uchkpt_Cmd_Acs_Sess_Info
394
Sess_Uchkpt_Cmd_Del_Acs_Call_Info
394
Sess_Uchkpt_Cmd_Del_Acs_Sess_Info
395
Sess_Uchkpt_Cmd_Dynamic_Chrg_Ca_Info
395
Sess_Uchkpt_Cmd_Dynamic_Chrg_Del_Ca_Info
395
Sess_Uchkpt_Cmd_Dynamic_Chrg_Del_Qg_Info
396
Sess_Uchkpt_Cmd_Dynamic_Chrg_Qg_Info
396
Sess_Uchkpt_Cmd_Dynamic_Rule_Del_Info
396
Sess_Uchkpt_Cmd_Dynamic_Rule_Info
397
Epdg Category
397
Sess_Uchkpt_Cmd_Delete_Epdg_Bearer
397
Sess_Uchkpt_Cmd_Update_Epdg_Bearer
397
Sess_Uchkpt_Cmd_Update_Epdg_Peer_Addr
398
Sess_Uchkpt_Cmd_Update_Epdg_Rekey
398
Sess_Uchkpt_Cmd_Update_Epdg_Stats
398
Firewall/Ecs Category
399
Sess_Uchkpt_Cmd_Sfw_Del_Rule_Info
399
Sess_Uchkpt_Cmd_Sfw_Rule_Info
399
GGSN Category
400
Sess_Uchkpt_Cmd_Ggsn_Delete_Sub_Sess
400
Sess_Uchkpt_Cmd_Ggsn_Update_Rpr
400
Sess_Uchkpt_Cmd_Ggsn_Update_Session
400
Sess_Uchkpt_Cmd_Ggsn_Update_Stats
401
Sess_Uchkpt_Cmd_Update_Coa_Params
401
Gx Interface Category
402
Sess_Uchkpt_Cmd_Acs_Volume_Usage
402
Sess_Uchkpt_Cmd_Update_Sgx_Info
402
NAT Category
402
Sess_Uchkpt_Cmd_Gr_Update_Nat_Realm_Port_Info1
402
Sess_Uchkpt_Cmd_Gr_Update_Nat_Realms
403
Sess_Uchkpt_Cmd_Nat_Sip_Alg_Call_Info
403
Sess_Uchkpt_Cmd_Nat_Sip_Alg_Contact_Ph_Info
404
Sess_Uchkpt_Cmd_Update_Dsk_Flow_Chkpt_Info
404
Sess_Uchkpt_Cmd_Update_Nat_Bypass_Flow_Info
404
P-GW Category
405
Sess_Uchkpt_Cmd_Pgw_Delete_Sub_Sess
405
Sess_Uchkpt_Cmd_Pgw_Ovrchrg_Prtctn_Info
405
Sess_Uchkpt_Cmd_Pgw_Sgwrestoration_Info
405
Sess_Uchkpt_Cmd_Pgw_Ubr_Mbr_Info
406
Sess_Uchkpt_Cmd_Pgw_Update_Apn_Ambr
406
Sess_Uchkpt_Cmd_Pgw_Update_Info
406
Sess_Uchkpt_Cmd_Pgw_Update_Li_Param
406
Sess_Uchkpt_Cmd_Pgw_Update_Pdn_Common_Param
407
Sess_Uchkpt_Cmd_Pgw_Update_Qos
407
Sess_Uchkpt_Cmd_Pgw_Update_Sgw_Change
407
Sess_Uchkpt_Cmd_Pgw_Update_Stats
407
Rf Interface Category
407
Sess_Uchkpt_Cmd_Acs_Accounting_Type_Qci_Rf
407
Sess_Uchkpt_Cmd_Acs_Accounting_Type_Qci_Rf_With_Fc
408
Sess_Uchkpt_Cmd_Acs_Accounting_Type_Rating_Group_Rf
408
Sess_Uchkpt_Cmd_Acs_Accounting_Type_Rating_Group_Rf_With_Fc
408
S6B Interface Category
409
Sess_Uchkpt_Cmd_S6B_Info
409
Samog Category
409
Sess_Uchkpt_Cmd_Cgw_Delete_Bearer
409
Sess_Uchkpt_Cmd_Cgw_Delete_Pdn
409
Sess_Uchkpt_Cmd_Cgw_Update_Bearer_Qos
410
Sess_Uchkpt_Cmd_Cgw_Update_Pdn
410
Sess_Uchkpt_Cmd_Cgw_Update_Stats
410
Sess_Uchkpt_Cmd_Cgw_Update_Ue_Param
410
Sess_Uchkpt_Cmd_Samog_Acct_Interim_Info
410
Sess_Uchkpt_Cmd_Samog_Acct_Start_Info
411
Sess_Uchkpt_Cmd_Samog_Eogre_Tunnel_Info
411
Sess_Uchkpt_Cmd_Samog_Gtpv1_Update_Pdn_Info
412
Sess_Uchkpt_Cmd_Samog_Handoff_Authen_Info
412
Sess_Uchkpt_Cmd_Samog_Handoff_Init_Info
412
Sess_Uchkpt_Cmd_Samog_Li_Prov_Info
413
Sess_Uchkpt_Cmd_Samog_Mipv6_Timer_Info
413
Sess_Uchkpt_Cmd_Samog_Multi_Round_Authen_Info
413
Sess_Uchkpt_Cmd_Samog_Reauthen_Info
414
Sess_Uchkpt_Cmd_Samog_Reauthor_Info
414
ICSR Checkpointing
389
ASR 5500 SDR CLI Command Strings
415
APPENDIX E Appendix F Cisco Secure Boot
429
Fundamental Concepts
429
Secure Boot Overview
430
MIO2 Support for Secure Boot
430
Image Naming Conventions
430
Verifying Authenticity
430
Other manuals for Cisco ASR 5500
Administration Guide
508 pages
Installation Guide
192 pages
Installation Procedure Overview
6 pages
5
Based on 1 rating
Ask a question
Give review
Questions and Answers:
Need help?
Do you have a question about the Cisco ASR 5500 and is the answer not in the manual?
Ask a question
Cisco ASR 5500 Specifications
General
Brand
Cisco
Model
ASR 5500
Category
Network Router
Language
English
Related product manuals
Cisco ASR 5000 Series
992 pages
Cisco ASR 901
218 pages
Cisco ASR 903
28 pages
Cisco ASR 1001
72 pages
Cisco ASR 9010
44 pages
Cisco ASR 9000
188 pages
Cisco ASR 1002
72 pages
Cisco ASR 1004
72 pages
Cisco ASR 9901
44 pages
Cisco ASR 9001
44 pages
Cisco ASR 1000
10 pages
Cisco ASR 1006
42 pages