Cisco SM-X Layer 2/3 EtherSwitch Service Module Configuration Guide for Cisco 4451-X ISR
Prerequisites for the Cisco SM-X Layer 2/3 EtherSwitch Service Module
Information About the Cisco SM-X Layer 2/3 EtherSwitch Service Module
Licensing and Software Activation
Installing and Applying an RTU License on a Switch
Power over Ethernet (Plus) Features
Managing the Cisco SM-X Layer 2/3 ESM Using Cisco IOS Software
Using OIR to Manage the Cisco SM-X Layer 2/3 ESM
Managing MGF Ports for Layer 2 Features
Enabling Layer-3 Features under Ethernet-internal Interface
How to Configure the Cisco SM-X Layer 2/3 ESM on the Router
Configuration on SM-X Module Side
Accessing SM-X Module Side Through a Console Connection or Through Telnet
Understanding Interface Types on the Cisco SM-X Layer 2/3 ESMs
Using Interface Configuration Mode
Shutting Down and Reloading the Cisco SM-X Layer 2/3 ESM
Monitoring Real-Time Power Consumption (Power Sensing)
Upgrading the Cisco SM-X Layer 2/3 ESM Software
Copying Switch Image Directly to ESM Flash Through TFTP Server
Copying Switch Image to ESM Flash Through Host Router
Module-to-Module Communication
Troubleshooting the Cisco SM-X Layer 2/3 ESM Software
Recovering from a Corrupted Software Image Using Boot Loader
Recovering from a Lost or Forgotten Password
The Cisco SM-X Layer 2/3 EtherSwitch Service Module (Cisco SM-X Layer 2/3 ESM) integrates the Layer 2 and Layer 3 switching features and provides the Cisco 4451-X ISR the ability to use the Cisco SM-X Layer 2/3 ESM as an independent Layer 3 switch when running the Cisco IOS software.
The Cisco SM-X Layer 2/3 ESMs also provide a 1-Gbps connection to the multigigabit fabric (MGF) for intermodule communication without burdening your router’s CPU.
The Cisco SM-X Layer 2/3 ESMs are capable of providing up to 30 watts of power per port with the robust Power over Ethernet Plus (PoE+) feature, along with IEEE 802.3AE Media Access Control Security (MACSec) port-based, hop-to-hop, encryption, and Cisco TrustSec (CTS) which work on multiple router families.
The following is the feature history for the Cisco SM-X Layer 2/3 ESM:
Finding Support Information for Platforms and Cisco IOS Software Images
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
The Cisco IOS version on the Cisco SM-X Layer 2/3 EtherSwitch Service Modules must be compatible with the Cisco IOS software release and feature set on the router. See Table 1 .
This section describes the features and some important concepts about theCisco SM-X Layer 2/3 ESM:
Note For a list of Cisco IOS switch feature documentation with information on various supported features on your Cisco SM-X Layer 2/3 ESM, see the Related Documentation
Cisco SM-X Layer 2/3 ESM are modules to which you can connect devices such as Cisco IP phones, Cisco wireless access points, workstations, and other network devices such as servers, routers, and switches.
The Cisco SM-X Layer 2/3 EtherSwitch Service Module can be deployed as backbone switches, aggregating 10BASE-T, 100BASE-TX, and 1000BASE-T Ethernet traffic from other network devices.
The following Cisco enhanced EtherSwitch service modules are available:
For complete information about the Cisco SM-X Layer 2/3 ESMs hardware,
see the Connecting Cisco SM-X Layer 2/3 ESMs to the Network guide.
The following are the switching software features supported on the Cisco SM-X Layer 2/3 ESM:
The Cisco TrustSec security architecture builds secure networks by establishing clouds of trusted network devices. Each device in the cloud is authenticated by its neighbors. Communication on the links between devices in the cloud is secured with a combination of encryption, message integrity checks, and data-path replay protection mechanisms. Cisco TrustSec also uses the device and user identification information acquired during authentication for classifying, or coloring, the packets as they enter the network. This packet classification is maintained by tagging packets on ingress to the Cisco TrustSec network so that they can be properly identified for the purpose of applying security and other policy criteria along the data path. The tag, also called the security group tag (SGT), allows the network to enforce the access control policy by enabling the endpoint device to act upon the SGT to filter traffic. See Configuring Cisco TrustSec chapter in the Catalyst 3560 Switch Software Configuration Guide, Cisco IOS Release 15.0(2)SE and Later.
The IEEE 802.1x standard defines a client/server-based access control and authentication protocol that prevents clients from connecting to a LAN through publicly accessible ports unless they are authenticated. The authentication server authenticates each client connected to a port before making available any services offered by the router or the LAN.
Until the client is authenticated, IEEE 802.1x access control allows only Extensible Authentication Protocol over LAN (EAPOL), Cisco Discovery Protocol (CDP), and Spanning Tree Protocol (STP) traffic through the port to which the client is connected. After authentication, normal traffic can pass through the port. See Configuring IEEE 802.1x Port-Based Authentication chapter in the Catalyst 3560 Switch Software Configuration Guide, Cisco IOS Release 15.0(2)SE and Later..
The Cisco SM-X Layer 2/3 ESM utilizes the Cisco licensing software activation mechanism for different levels of technology software packages. This mechanism is referred to as technology package licensing and leverages the universal technology package based licensing solution. A universal image containing all levels of a software package is loaded on your Cisco SM-X Layer 2/3 ESM. During startup, the Cisco SM-X Layer 2/3 ESM determines the license according to the license boot level or license priority and loads the corresponding software features.
The Cisco SM-X Layer 2/3 ESM has a right to use (RTU) license, also known as honor-based license.
The RTU license on Cisco SM-X Layer 2/3 ESM supports the following three feature sets:
To apply an RTU license on a switch, follow these steps:
Step 1 Upgrade from one license level to another by using the Cisco sales ordering tool to purchase the license. You will receive an e-mail or paper confirmation that grants you permission to install and activate the license on your switch.
Step 2 If you get a license file, use license install stored-location-url command to install the license. Accept the end-user license agreement when prompted and restart the device to enable the new feature set.
Step 3 Apply the license by entering the appropriate commands on your switch. If you are upgrading a license on a switch, use license right-to-use activate license-level command to activate the higher license. If you are moving a license from one switch to another, use the license right-to-use deactivate license-level command to deactivate the license on the first switch and the activation command on the second switch.
Step 4 Read and accept the End User License Agreement (EULA).
Step 5 Use show license command to check the license status.
Step 6 Configure the license boot level to the license you want to use by entering (config)#license boot level license-level command and then save the configuration using write memory command.
Step 7 Use show version command to check whether the next reload license is correctly configured.
Step 8 Reboot the switch to boot with the highest available license.
See Upgrading your License Using Right-To-Use Features for more information on licensing and software activation.
Media Access Control Security (MACsec) encryption is the IEEE 802.1AE standard for authenticating and encrypting packets between two MACsec-capable devices. MACsec encryption is defined in 802.1AE to provide MAC-layer encryption over wired networks by using out-of-band methods for encryption keying. The MACsec Key Agreement (MKA) protocol provides the required session keys and manages the required encryption keys. MKA and MACsec are implemented after successful authentication using the 802.1x Extensible Authentication Protocol (EAP) framework. Only host facing links (links between network access devices and endpoint devices such as a PC or IP phone) can be secured using MACsec.
The Cisco SM-X Layer 2/3 ESM supports 802.1AE encryption with MACsec Key Agreement (MKA) on downlink ports for encryption between the module and host devices. The module also supports MACsec link layer switch-to-switch security by using Cisco TrustSec Network Device Admission Control (NDAC) and the Security Association Protocol (SAP) key exchange. Link layer security can include both packet authentication between switches and MACsec encryption between switches (encryption is optional) See, “Configuring MACsec Encryption” chapter in the Catalyst 3560 Switch Software Configuration Guide, Cisco IOS Release 15.0(2)SE and Later for information on configuring this feature.
The Cisco SM-X Layer 2/3 ESM is capable of providing power to connected Cisco pre-standard and IEEE 802.3af-compliant powered devices (PDs) from Power over Ethernet (PoE)-capable ports when the switch detects that there is no power on the circuit. The ESM supports IEEE 802.3at (PoE+), which increases the available power for PDs from 15.4 W to 30 W per port. For more information, see the Power over Ethernet Ports. The PoE plus feature supports the Cisco discovery protocol (CDP) with power consumption reporting and allows the PDs to notify the amount of power consumed. The PoE plus feature also supports the Link layer discovery protocol (LLDP).
Cisco Intelligent Power Management
The PDs and the switch negotiate power through CDP messages for an agreed power-consumption level. The negotiation allows high-power Cisco PDs to operate at their highest power mode.
The PoE plus feature enables automatic detection and power budgeting; the switch maintains a power budget, monitors, and tracks requests for power, and grants power only when it is available. See the Configuring the External PoE Service Module Power Supply Mode section in the Catalyst 3560 Switch Software Configuration Guide, Cisco IOS Release 15.0(2)SE and Later.
Power policing allows to monitor the real-time power consumption. On a per-PoE port basis, the switch senses the total power consumption, polices the power usage, and reports the power usage. For more information on this feature, see Monitoring Real-Time Power Consumption (Power Sensing).
This sections contains the following topics with information on managing the Cisco SM-X Layer 2/3 ESM on the Cisco 4451-X ISR using Cisco IOS software:
The online insertion and removal (OIR) feature allows you to insert or remove your Cisco SM-X Layer 2/3 ESM from a Cisco 4451-X ISR without powering down the module. This process is also referred to as a surprise or hard OIR. When performing a surprise OIR, you must save all your configuration on the ESM; any unsaved configuration will be lost during a surprise OIR. The Cisco 4451-X ISR also supports any-to-any OIR, which means that a service module (SM) in a slot can be replaced by another SM using the OIR feature.
When a module is inserted, power is available on the ESM, and it initializes itself to start functioning. The hot-swap functionality allows the system to determine when a change occurs in the unit’s physical configuration and to reallocate the unit's resources to allow all interfaces to function adequately. This feature allows interfaces on the ESM to be reconfigured while other interfaces on the router remain unchanged. The software performs the necessary tasks involved in handling the removal and insertion of the ESM.
You can choose to gracefully power down your Cisco SM-X Layer 2/3 ESM before removing it from router. This type of OIR is also known as managed OIR or soft OIR. The managed OIR feature allows you to stop the power supply to your module using the hw-module subslot [ stop ] command and remove the module from one of the subslots while other active modules remain installed on the router.
Note If you are not planning to immediately replace a module after performing OIR, ensure that you install a blank filter plate in the subslot.
The stop option allows you to gracefully deactivate a module; the module is rebooted when the start option of the command is executed. The reload option will stop or deactivate a specified module and restart it. See the Shutting Down and Reloading the Cisco SM-X Layer 2/3 ESM for more information.
Preventing ESM from Automatic Reloads
The Cisco 4451-X ISR monitors the module status and recovers the module by reloading it when there is a failure. After initiating a reload, router waits for 7 minutes for the module to be in an “OK” state. If the module does not come to an “OK” state within these 7 minutes, the router considers this as a failure and retries the recovery process. The maximum number of retry attempts that the router can make is 5. After 5 such attempts, if the module does not come back to an “OK” state, the router puts the module in an “Out of Service” state and terminates the error recovery process.
This behavior may create a problem in certain processes where booting a Cisco SM-X Layer 2/3 ESM may take more than 7 minutes. For example, when booting the Cisco SM-X Layer 2/3 ESM with a new IOS switch release, there can be microcode upgrade on the Cisco SM-X Layer 2/3 ESM by the new Cisco IOS image. In such situations, prevent the router from automatically reloading the module after 7 minutes by disabling error recovery on a particular subslot. You can prevent the router from reloading by enabling the maintenance mode. See the Enabling Maintenance Mode for more information.
Once the module is placed into maintenance mode, you can bring it back into the normal operational mode using the hw-module subslot x/0 reload command.
We recommend that you enable the maintenance mode on the switch module when booting the module with a new software image that requires bootloader upgrade and takes more than 7 minutes. Use the hw-module subslot X/0 maintenance enable command to enable the maintenance mode. Enabling the maintenance mode allows the switch module to take more than the default time limit of 7 minutes to boot. When you fail to configure maintenance mode, the OIR timeout requests the module to go again for reload. The switch module will be up and displayed as “out of service” in the show platform command output on the host router but it remains operational. You can disable the maintenance mode using the hw-module subslot X/0 maintenance disable command. Reload the module again to bring-up the connection between the host router and the module.
VLAN 2351 is an internal VLAN used for SM-X layer2/3 ESM and Cisco 4451-X ISR communication. VLAN 2351 configuration is temporarily added during the module boot up and will be removed after module boots up successfully. If this configuration is shown up under SM-X layer2/3 ESM uplink port, it means that the ESM module does not come up correctly and module is not in service. Make sure that all necessary steps are followed described in 'Upgrading the Cisco SM-X layer2/3 ESM Software' section and reboot the ESM module.
Figure 1 below displays the internal port mapping between the Cisco SM-X Layer 2/3 ESM and the Cisco 4451-X ISR. The variable “x” indicates the slot number where the Cisco SM-X-ES3-16-P, Cisco SM-X-ES3-24-P and Cisco SM-X-ES3D-48-P SKUs of the module are inserted on the Cisco 4451-X ISR router.
Figure 1 Port Mapping for Cisco SM-X Layer 2/3 ESM on Cisco 4451-X ISR
The Cisco SM-X Layer 2/3 ESM enables the backplane Ethernet interfaces using the interface Ethernet-internal slot /0/[0|1] command to ensure proper management of Layer 2 switching properties such as access, trunk, and dynamic mode of its two MGF ports, GE0 and GE1. The MGF port uses certain switchport commands to perform different functions for different modes. For example, access mode is used for end devices; trunk mode is used for lines between switches and other lines that send multiple VLANs over a single connection, and dynamic mode automatically detects what kind of device is connected and initiates its port accordingly.
The following examples show the Layer 3 feature configuration. In Figure 2, you should configure ip nat inside under the BDI10 instead of configuring it under interface Ethernet-internal1/0/0.
Figure 2 Layer 3 Feature Configuration
In Figure 3, you should configure PBR under BDI1 instead of configuring it under interface Ethernet-internal1/0/0.
Figure 3 Layer 3 Feature Configuration
The SM-X configuration includes SM-X module side configuration and host side configuration. The SM-X module’s configuration is the same as common C3560E switch. To configure layer 3 features (For example HSRP, PBR and Nat etc), you can configure it on host side BDI or SVI interfaces on host side. Layer 3 sub-interface is represented by different BDI/SVI interface on host side.
Before you can access the modules, you must connect to the host router through the router console or through Telnet. Once you are connected to the router, ope a session to your module using the hw-module session command in privileged EXEC mode.
You can use the following method to establish a connection to the module:
Connect to the router console using Telnet or Secure Shell (SSH) and open a session to the switch using the hw-module session slot/subslot command in privileged EXEC mode on the router.
You can use the following configuration examples to establish a connection:
Step 1 Open a session from the router using the following command:
Establishing session connect to subslot 1/0
send_cmd is : ascii_xfr -s -v -l10
Step 2 Exit the session from the switch, press Ctrl-a and Ctrl-q from your keyboard:
The Cisco SM-X Layer 2/3 ESM supports the following types of interfaces:
You can configure the individual Cisco SM-X Layer 2/3 ESM physical interfaces (ports) through interface configuration mode on the CLI.
You can identify physical interfaces by physically checking the interface location on the
Cisco SM-X Layer 2/3 ESM. You can also use the Cisco IOS show privileged EXEC commands to display information about a specific interface or all the interfaces on the Cisco switching
service module.
To specify Gigabit Ethernet port 4 on a standalone Cisco SM-X Layer 2/3 ESM, enter this command in global configuration mode:
If mls qos is configured, the QoS configuration must reserve resource for the internal traffic. The basic idea of the module QoS egress buffering scheme is that each port with its 4 egress queues (queue1 to queue 4) are initially allocated a certain number of buffers. Each queue has three drop thresholds. The module internal traffic makes use of queue 2 threshold 3.
Configure shutdown command notes
If you configure the shutdown command on the module to module interface (Gi0/17 for SM-X-ES3-16-P, Gi0/25 for SM-X-ES3-24-P, Gi0/51 for SM-X-ES3D-48-P), after the module reloads, the interface configuration resets to no shutdown. This example shows the interface configuration:
After save configuration and reload module, the configuration is reset to
The BDI interface on router side that is used for module and router traffic is Layer 3. To prevent loops from occurring when more than one module is configured with same bridge domain interface, you must configure the same bridge domain with split-horizon to stop the traffic flow between the two modules as shown below:
You can also configure the layer-3 features in BDI interface.
2. interface Ethernet-Internal 1/0/0
3. service instance 1 ethernet
5. rewrite ingress tag pop 1 symmetric
6. bridge-domain 1 split-horizon group 0
7. interface Ethernet-Internal 2/0/0
8. service instance 1 ethernet
10. rewrite ingress tag pop 1 symmetric
Starting from Cisco IOS XE Release 3.15S, Cisco ISR4000 routers support SVI (Switch Virtual Interface). SVI configuration and association to Ethernet-internal x/0/0 interface on router side is needed. Enabling or disabling SVI configuration under switch-internal interface needs a module OIR or router reload after configuration was saved.
BDI requires support of APPXk9 license on ISR 4000 routers for pre 15.5(3)S releases.
You can shut down or deactivate your module using the OIR feature, by executing the hw-module subslot shutdown command in global configuration mode. When using the hw-module subslot shutdown command, you can choose to put your module in unpowered state. Unpowered state shuts down the module and removes power from the module. Use this option when you plan to remove the module from the chassis.
If you choose to deactivate your module and its interfaces by executing the hw-module subslot shutdown command in global configuration mode, you are able to change the configuration in such a way that no matter how many times the router is rebooted, the module does not boot. This command is useful when you need to shut down a module located in a remote location and ensure that it does not boot automatically when the router is rebooted.To begin using the interface again, you must manually re-enable the module using the no hw-module subslot shutdown command.
Note If you choose to use the hw-module subslot stop command in EXEC mode, you cause the module to gracefully shut down. However, the module is rebooted when the hw-module subslot start command is executed.
1. hw-module subslot slot-number/subslot-number shutdown unpowered
2. hw-module subslot slot-number/subslot-number [stop | start| reload]
This section provides the following examples:
Sample Output for the hw-module subslot 1/0 shutdown unpowered Command
The following example shows what appears when you enter the hw-module subslot slot-number/subslot-number shutdown command:
You can verify the status of the Cisco SM-X Layer 2/3 ESM by issuing the following show command:
Sample Output for the hw-module subslot slot / subslot reload Command
The following example shows what appears when you enter the hw-module subslot slot-number/subslot-number reload command:
Cisco SM-X Layer 2/3 ESMs’ hardware allows the ESM to accurately monitor the real-time power consumption on each port by measuring the port current as well as the voltage while the powered devices such as IP phones and wireless access points are powered up.
If a powered device is misbehaving by consuming more power than the actual configured value, you can take an appropriate ‘action’ by enabling the power policing or sensing feature on a port using the power inline command. The ‘action’ is either “logging a warning message” (also knows as lax policing) or shutting down a misbehaving port (strict policing). The ESM constantly monitors the power drawn by the powered devices and takes appropriate action on misbehaving ports. You can monitor the power drawn by the powered devices through power inline command.
When power policing is enabled on a port, you can pick a cutoff power value of “x” watts per port and choose an ‘action’ to be taken on the misbehaving ports. Power policing is disabled by default on all ports.
Note You must take the cable loss into consideration when configuring the power monitoring or power policing value for a given port of the switch. There might be some cable loss while configuring power cutoff value at the PSE. The switch can only police the power drawn at the PSE RJ45 port and not the actual power consumed by the powered device.
2. interface gigabitethernet 0/x
3. power inline max max-wattage
Enter interface configuration mode and places you at the GigabitEthernet 0/24 interface. |
||
Enables the ESM to generate a syslog message while still providing power to the device. |
||
The following example displays the maximum power configured:
Available:500.0(w) Used:24.0(w) Remaining:476.0(w)
Interface Admin Oper Power Device Class Max
--------- ------ ---------- ------- ------------------- ----- ----
Et1/0/0 auto off 24.0 n/a n/a 750.0
Et2/0/0 auto off 0.0 n/a n/a 750.0
The following example shows power consumed by various devices connected to your module:
Available:500.0(w) Used:24.0(w) Remaining:476.0(w)
Interface Admin Oper Power Device Class Max
--------- ------ ---------- ------- ------------------- ----- ----
Gi0/1 auto off 0.0 n/a n/a 30.0
Gi0/2 auto on 12.0 IP Phone 7975 3 30.0
Gi0/3 auto on 12.0 IP Phone 9951 4 30.0
Gi0/4 auto off 0.0 n/a n/a 30.0
Gi0/5 auto off 0.0 n/a n/a 30.0
Switch# show power inline police
Available:623(w) Used:6(w) Remaining:617(w)
Interface Admin Oper Admin Oper Cutoff Oper
State State Police Police Power Power
--------- ------ ---------- ---------- ---------- ------ -----
Gi0/1 auto off none n/a n/a 0.0
Gi0/2 auto on none n/a n/a 16.7
Gi0/3 auto off errdisable n/a 0.0 0.0
Gi0/4 auto on errdisable ok 16.6 11.4
Gi0/5 auto on log ok 16.6 11.2
Gi0/6 auto on errdisable overdrawn 0.0 0.0
The following table lists the interface and the status.The following example shows the power usage when PDs (powered devices) are connected to your module:
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone,
D - Remote, C - CVTA, M - Two-port Mac Relay
Device ID Local Intrfce Holdtme Capability Platform Port ID
ISR 4451-X Gig 0/26 150 R ISR4451-X BDI1
ISR 4451-X Gig 0/26 172 R ISR4451-X Eth 1/0/0
SEPE80462EB2EA7 Gig 0/2 155 H P M IP Phone Port 1
This section describes how to upgrade the Cisco SM-X Layer 2/3 ESM software by using TFTP.
You can copy the switch image to the ESM flash by following one of the two methods listed below:
This section describes how to copy a switch image directly to the ESM flash through the TFTP server.
3. interface gigabitethernet 0/x
5. ip address ip address/subnet mask
8. show run interface gigabitethernet 0/x
This section provides the following examples:
Sample Output for the show run interface gigabitethernet Command
The following example shows what appears when you enter the show run interface gigabitethernet command:
Sample Output for the ping ip address Command
The following example shows what appears when you enter the ping ip address command:
Sample Output for the show flash: Command
The following example shows what appears when you enter the dir flash: command:
Sample Output for the copy tftp: flash: Command
The following example shows what appears when you enter the copy tftp: flash: command:
This section describes how to copy the switch image to the ESM flash through the host router.
Note Both BDI and SVI can be used on the router side. For more information, see: Configuration on Host Side.
Step 1 Prepare switch-image on host side
a. Copy ESM image to router bootflash.
b. Configure host router as TFTP server.
c. Configure terminal and tftp-server bootflash:switch-image
Step 2 Login ESM module side and copy image
The following example shows hoe to copy the siwtch image to the ESM flash through the host router:
Step 1 Enable maintenance on host side before upgrade. Run the hw-module subslot x/0 maintenance enable command.
Step 2 Copy the image to SM-X module. Run boot system flash:xxx command on SM-X module.
Step 3 Make sure that there is no "front_end_ucode_cache" directory on SM-X module. Delete the file if any such file exists.
Step 4 Reload the module. Type hw-module subslot x/0 reload command on host side. The upgrade procedure starts after the module bootup. This step is very time consuming. Do not interrupt it.
Step 5 After the module comes up, disable the maintenance on host side using the hw-module subslot x/0 maintenance disable command.
Step 6 Reload the SM-X module from the host side again. Note that, Step 4 reload is not enough. Use the hw-module subslot x/0 reload force command to reload the module.
The following examples shows the detailed upgrade procedure:
Cisco SM-X Layer 2/3 ESM can directly communicate with any module connected to the backplane switch of the router bypassing the router host CPU, thus, increasing the CPU performance and reducing the CPU processing. The additional GE connection with the router backplane switch designated as Ethernet-Internal X/0/1 port where X is the slot number. This port can be access port or a trunk port.
Following is an example of the configuration assuming a 16 port module is configured in slot 1 and a 24 port module in slot 2:-
interface Ethernet-Internal 1/0/1
interface Ethernet-Internal 2/0/1
Configuration on the 16 port SM-X module in slot 1:
interface gigabitethernet 0/17
Configuration on the 24 port SM-X module in slot 2:
interface gigabitethernet 0/25
You can apply the trunk port configurations if the port needs to be a trunk port.
This section describes how to troubleshoot the Cisco enhanced EtherSwitch service module:
The Cisco SM-X Layer 2/3 EtherSwitch Service Module software can get corrupted when downloading a wrong file during the software upgrade process and when the image is invalid or even when there is no image available.
The load_recovery command allows you to recover from a corrupted software image, an invalid image or no image on the flash of the module.
The load_ recovery command boots the ESM with an IOS image (recovery image). Once the module is booted, desired Cisco.com switch image can be copied to the module flash through TFTP from the router’s flash or through the ESM front panel switch ports.
Copying a Cisco.com switch image to the ESM flash through module’s front panel switch ports only works when there is a connectivity established to the TFTP servers from the front panel ports of your ESM.
Note The router should have the ESM image in the router flash memory or the ESM should have network connectivity to TFTP server through its front panel ports.
Note We recommend that you continue all network operations using the new image and not the recovery image.
To start the load recovery process, issue the load_recovery command in bootloader prompt. After you issue the load_recovery command, the following message appears:
Now you can upgrade to a new switch image, see the Upgrading the Cisco SM-X Layer 2/3 ESM Software.
This section shows how to recover from a lost or forgotten password.
The default configuration for the Cisco SM-X Layer 2/3 ESM allows you to recover from a lost password by entering a new password.
During auto boot loader operation, you are not presented with the boot loader command-line prompt. You gain access to the boot loader command line if the switch is set to manually boot or, if an error occurs, the operating system (a corrupted Cisco IOS image) is loaded. You can also access the boot loader if you have lost or forgotten the switch password.
Note The default configuration for Cisco SM-X Layer 2/3 ESM allows you to recover from a lost password. The password recovery disable feature allows the system administrator to protect access to the switch password by disabling part of this functionality and allowing the user to interrupt the boot process only by agreeing to set the system back to the default configuration. With password recovery disabled, you can still interrupt the boot process and change the password, but the configuration file (config.text) and the VLAN database file (vlan.dat) are deleted.
1. hw-module subslot slot/bay error-recovery password_reset
3. rename flash:vlan.dat.renamed flash:vlan.dat
4. delete flash:config.text.renamed
5. delete flash:private-config.text.renamed
6. delete flash:express_setup.debug
7. rename flash:config.text flash:config.text.old
8. hw-module subslot slot/bay reload force
Sample Output for Recovering from a Lost or Forgotten Password
Router# hw-module subslot 1/0 error-recovery password_reset
The password-recovery mechanism is enabled.
The system has been interrupted prior to initializing the flash filesystem. The following commands will initialize the flash filesystem, and finish loading the operating system software:
Connecting Cisco SM-X Layer 2/3 EtherSwitch Service Module to the Network |
|
General information about configuration and command reference. |
Software Configuration Guide for the Cisco 4451-X Integrated Services Router |
Regulatory Compliance and Safety Information for the Cisco 4451-X Integrated Services Router |
|
Software Activation on Cisco Integrated Services Routers and Cisco Integrated Service Routers G2 |
Software Activation on Cisco Integrated Services Routers and Cisco Integrated Service Routers G2 |
Catalyst 3750-X and 3560-X Switch Software Configuration Guide |
Catalyst 3750-X and 3560-X Switch Software Configuration Guide, Release 12.2(55)SE |