Table Of Contents
Cisco IOS Broadband High Availability In Service Software Upgrade
Prerequisites for Cisco IOS Broadband High Availability In Service Software Upgrade
Restrictions for Cisco IOS Broadband High Availability In Service Software Upgrade
Information About Cisco IOS Broadband High Availability In Service Software Upgrade
Feature Design of Cisco IOS Broadband High Availability In Service Software Upgrade
Supported Broadband Aggregation Protocols
Benefits of Cisco IOS Broadband High Availability In Service Software Upgrade
How to Configure Cisco IOS Broadband High Availability In Service Software Upgrade
Verifying and Troubleshooting Subscriber Redundancy Policy for Broadband HA ISSU
Configuration Examples for Cisco IOS Broadband High Availability In Service Software Upgrade
PPPoX Terminated into an RA-MPLS Network with ISSU: Example
Feature Information for Cisco IOS Broadband High Availability In Service Software Upgrade
Cisco IOS Broadband High Availability In Service Software Upgrade
First Published: December 4, 2006Last Updated: October 21, 2009The Cisco IOS Broadband High Availability (HA) In Service Software Upgrade (ISSU) feature ensures continuous operations of broadband access protocols during software upgrades, downgrades, and service enhancements.
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the "Feature Information for Cisco IOS Broadband High Availability In Service Software Upgrade" section on page 42.
Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Contents
•Prerequisites for Cisco IOS Broadband High Availability In Service Software Upgrade
•Restrictions for Cisco IOS Broadband High Availability In Service Software Upgrade
•Information About Cisco IOS Broadband High Availability In Service Software Upgrade
•How to Configure Cisco IOS Broadband High Availability In Service Software Upgrade
•Configuration Examples for Cisco IOS Broadband High Availability In Service Software Upgrade
•Feature Information for Cisco IOS Broadband High Availability In Service Software Upgrade
Prerequisites for Cisco IOS Broadband High Availability In Service Software Upgrade
•The Cisco IOS stateful switchover (SSO) and nonstop forwarding (NSF) features must be enabled. For more information on SSO, see the document Stateful Switchover. For more information on NSF, see the document Cisco Nonstop Forwarding.
Cisco 10000 Series Platform
•The Cisco 10000 series router must be configured with redundant Performance Routing Engine (PRE) modules, that is, dual Route Processors.
•Cisco IOS Release 12.2(31)SB or a later release must be running.
Cisco 7600 Series Platform
•Cisco IOS Release 12.2(33)SRC or a later release must be running.
Restrictions for Cisco IOS Broadband High Availability In Service Software Upgrade
•You can perform an In Service Software Upgrade (ISSU) across a major Cisco IOS release.
•You can perform an ISSU from a Cisco IOS software version that supports ISSU capability.
Information About Cisco IOS Broadband High Availability In Service Software Upgrade
To configure the Cisco IOS Broadband High Availability In Service Software Upgrade feature, you should understand the following concepts:
•Feature Design of Cisco IOS Broadband High Availability In Service Software Upgrade
•Benefits of Cisco IOS Broadband High Availability In Service Software Upgrade
Feature Design of Cisco IOS Broadband High Availability In Service Software Upgrade
Prior to the implementation of the Cisco IOS Broadband High Availability In Service Software Upgrade feature, software upgrades typically required planned outages that took the router or network out of service. The Cisco IOS Broadband High Availability In Service Software Upgrade feature enables the service provider to maximize network availability and eliminate planned outages by allowing the Cisco IOS image to be upgraded without taking the router or network out of service. ISSU is a procedure, based on Cisco high availability (HA) architecture, whereby the Cisco IOS infrastructure accomplishes an upgrade while packet forwarding continues and broadband sessions are maintained. Cisco HA architecture is based on redundant Route Processors and the NSF and SSO features, such that ports stay active and calls do not drop, eliminating network disruption during upgrades.
The ISSU feature allows deployment of new features, hardware, services, and maintenance fixes in a procedure that is seamless to end users. A critical component of ISSU and Cisco HA technology is the cluster control manager (CCM) that manages session re-creation and synchronization on the standby processor. The Cisco IOS Broadband High Availability In Service Software Upgrade feature allows the configuration of subscriber redundancy policies that tune the synchronization process. For more information see the "Configuring Subscriber Redundancy Policy for Cisco IOS Broadband High Availability In Service Software Upgrade" section.
The Cisco IOS Broadband High Availability In Service Software Upgrade feature handles upgrades and downgrades, and supports the following:
•Upgrades from one software feature release to another, as long as both versions support the ISSU feature, for example, from Cisco IOS Release 12.2(28)SB to Cisco IOS Release 12.2(31)SB2.
•Upgrades from one software maintenance release to another, for example from Cisco IOS Release 12.2(28)SB1 to Cisco IOS Release 12.2(28)SB2
Note Software upgrades and downgrades are supported only within the major Cisco IOS releases; crossing between S and T or Mainline Cisco IOS releases (for example, from Cisco IOS Release 12.4(11)T and Cisco IOS Release 12.2(31)SB) is not supported even if each release supports ISSU capability. For more information on Cisco IOS releases, see Cisco IOS Software.
The Cisco IOS Broadband High Availability In Service Software Upgrade feature works with other Cisco IOS HA features, NSF and SSO, to maintain broadband sessions.
For more information on performing an ISSU, see the document Cisco IOS In Service Software Upgrade Process.
Supported Broadband Aggregation Protocols
The Cisco IOS Broadband High Availability In Service Software Upgrade feature supports the following broadband aggregation protocols:
ISSU PPPoA
The Cisco IOS Broadband High Availability In Service Software Upgrade feature delivers ISSU capability for PPP over ATM sessions during supported software upgrades, downgrades, and enhancements.
ISSU PPPoE
The Cisco IOS Broadband High Availability In Service Software Upgradefeature delivers ISSU capability for PPP over Ethernet (PPPoE) subscriber access sessions, including PPPoE, PPPoEVLAN, and PPPoE802.1q-in-q sessions, during supported software upgrades, downgrades, and enhancements.
ISSU RA-MLPS VPN
The Cisco IOS Broadband High Availability In Service Software Upgrade feature delivers ISSU capability for PPPoA and PPPoE (PPPoX) sessions terminated into remote access (RA)-Multiprotocol Label Switching (MPLS) Virtual Private Networks (VPN) or PPPoX into MPLS VPN during supported software upgrades, downgrades, and enhancements.
Figure 1 shows a typical broadband aggregation HA deployment with ISSU functionality.
Figure 1 Broadband Aggregation High Availability Deployment
Benefits of Cisco IOS Broadband High Availability In Service Software Upgrade
•Eliminates network downtime for Cisco IOS software image upgrades.
•Eliminates resource scheduling challenges associated with planned outages and late night maintenance windows.
•Accelerates deployment of new services and applications and allows faster implementation of new features, hardware, and fixes.
•Reduces operating costs due to outages while delivering higher service levels.
•Provides additional options for adjusting maintenance windows.
•Minimizes the impact of upgrades to service and allows for faster upgrades, resulting in higher availability.
How to Configure Cisco IOS Broadband High Availability In Service Software Upgrade
This section contains the following procedures:
•Verifying and Troubleshooting Subscriber Redundancy Policy for Broadband HA ISSU
Configuring Subscriber Redundancy Policy for Cisco IOS Broadband High Availability In Service Software Upgrade
The Cisco IOS Broadband High Availability In Service Software Upgrade feature is enabled by default. This task configures subscriber redundancy policy for HA ISSU capability, allowing you to manage synchronization between HA active and standby processors.
Prerequisites
For more information on performing the ISSU process, see the document Cisco IOS In Service Software Upgrade Process.
SUMMARY STEPS
1. enable
2. configure terminal
3. subscriber redundancy [bulk limit cpu percentage delay seconds allow value] [dynamic limit cpu percentage delay seconds allow value] [delay time] [rate sessions time]
4. exit
DETAILED STEPSVerifying and Troubleshooting Subscriber Redundancy Policy for Broadband HA ISSU
To verify the subscriber redundancy policy configuration, use the show running-config command. Sample output is located in the "Configuration Examples for Cisco IOS Broadband High Availability In Service Software Upgrade" section.
Step 1 and Step 2 are useful for troubleshooting the CCM synchronization component. Steps 3, 4, and 5 are useful for reviewing PPPoX session statistics. Step 6 through Step 8 are typically used by Cisco engineers for internal debugging purposes; you may be asked to provide command output to a Technical Assistance Center (TAC) engineer for assistance in troubleshooting.
SUMMARY STEPS
1. show ccm clients
2. show ccm sessions
3. show ppp subscriber statistics
4. show pppatm statistics
5. show pppoe statistics
6. show ccm queues
7. debug pppatm redundancy
8. debug pppoe redundancy
DETAILED STEPS
Step 1 show ccm clients
This command shows information on the CCM, the HA component that manages the capability to synchronize session launch on the standby processor of a redundant processor, HA system. Use the show ccm clients command to display information on CCM clients. The following is sample output fromthe show ccm clients command from a Cisco 10000 series router active RP:
Router# show ccm clientsCCM bundles sent since peer up:Sync Session 0Update Session 0Active Bulk Sync 0Session Down 0ISSU client msgs 0Unknown msgs 0Client events sent since peer up:PPP 0PPPoE 0PPPoA 0AAA 0PPP SIP 0LTERM 0AC 0Virtual Template 0The following is sample output from the show ccm clients command from a Cisco 10000 series router standby RP:
Router# show ccm clientsCCM bundles rcvd since last boot:Sync Session 8Update Session 0Active Bulk Sync 1Session Down 8ISSU client msgs 59Unknown msgs 0Client events extracted since last boot:PPP 72PPPoE 50PPPoA 0AAA 32PPP SIP 0LTERM 8AC 0The following is sample output from the show ccm clients command on a Cisco 7600 series router active processor:
Router# show ccm clientsCCM bundles sent since peer up:Sync Session 28059Update Session 0Active Bulk Sync End 1Session Down 8057ISSU client msgs 160Dynamic Session Sync 0Unknown msgs 0Client events sent since peer up:PPP 252351PPPoE 168236AAA 112236PPP SIP 0LTERM 28059AC 0SSS FM 28040IP SIP 60IP IF 0DPM 80COA 0Auto SVC 0The following is sample output from the show ccm clients command on a Cisco 7600 series router standby processor:
CCM bundles rcvd since last boot:Sync Session 28059Update Session 0Active Bulk Sync End 1Session Down 8057ISSU client msgs 160Dynamic Session Sync 0Unknown msgs 0Client events extracted since last boot:PPP 252351PPPoE 168236AAA 112174PPP SIP 0LTERM 28045AC 0SSS FM 28040IP SIP 18IP IF 0DPM 24COA 0
Auto Svc 0Step 2 show ccm sessions
This command shows information on sessions managed by the CCM. The following is sample output from the show ccm sessions command on the active RP:
Router# show ccm sessionsGlobal CCM state: CCM HA Active - Dynamic SyncGlobal ISSU state: Compatible, Clients Cap 0x0> Number of sessions in state Down: 0> Number of sessions in state Not Ready: 0> Number of sessions in state Ready: 0> Number of sessions in state Dyn Sync: 0>> Timeout: Timer Type Delay Remaining Starts CPU Limit CPU Last> ------------ -------- --------- --------- --------- --------> Rate 00:00:01 - 2 - -> Dynamic CPU 00:00:10 - 0 90 0The following is sample output from the show ccm sessions command on the standby RP:
Router# show ccm sessionsGlobal CCM state: CCM HA Standby - CollectingGlobal ISSU state: Compatible, Clients Cap 0xFFECurrent Bulk Sent Bulk Rcvd----------- ----------- -----------Number of sessions in state Down: 0 0 0Number of sessions in state Not Ready: 0 0 0Number of sessions in state Ready: 0 0 0Number of sessions in state Dyn Sync: 0 0 0Timeout: Timer Type Delay Remaining Starts CPU Limit CPU Last------------ -------- --------- ----------- --------- --------Rate 00:00:01 - 0 - -Dynamic CPU 00:00:10 - 0 90 0Bulk Time Li 00:08:00 - 0 - -RF Notif Ext 00:00:20 - 0 - -Step 3 show ppp subscriber statistics
This command is useful for obtaining events and statistics for PPP subscribers. Use the show ppp subscriber statistics command to display a cumulative count of PPP subscriber events and statistics, and to display an incremental count since the clear ppp subscriber statistics command was last issued.
The following is sample output from the show ppp subscriber statistics command:
Router# show ppp subscriber statisticsPPP Subscriber Events TOTAL SINCE CLEAREDEncap 32011 32011DeEncap 16002 16002CstateUp 173 173CstateDown 36 36FastStart 0 0LocalTerm 7 7LocalTermVP 0 0MoreKeys 173 173Forwarding 0 0Forwarded 0 0SSSDisc 0 0SSMDisc 0 0PPPDisc 167 167PPPBindResp 173 173PPPReneg 3 3RestartTimeout 169 169>PPP Subscriber Statistics TOTAL SINCE CLEAREDIDB CSTATE UP 16008 16008IDB CSTATE DOWN 40 40APS UP 0 0APS UP IGNORE 0 0APS DOWN 0 0READY FOR SYNC 10 10Step 4 show pppatm statistics
This command is useful for obtaining statistics for PPPoA sessions. Use the show pppatm statistics command to display a total count of PPPoA events since the clear pppatm statistics command was last issued.
The following is sample output from the show pppatm statistics command:
Router# show pppatm statistics4000 : Context Allocated events3999 : SSS Request events7998 : SSS Msg events3999 : PPP Msg events3998 : Up Pending events3998 : Up Dequeued events3998 : Processing Up events3999 : Vaccess Up events3999 : AAA unique id allocated events3999 : No AAA method list set events3999 : AAA gets nas port details events3999 : AAA gets retrived attrs events68202 : AAA gets dynamic attrs events3999 : Access IE allocated eventsStep 5 show pppoe statistics
This command is useful for obtaining statistics and events for PPPoE sessions. Use the show pppoe statistics command to display a cumulative count of PPPoE events and statistics, and to display an incremental count since the last time the clear pppoe statistics command was issued.
The following is sample output from the show pppoe statistics command:
Router# show pppoe statisticsPPPoE Events TOTAL SINCE CLEARED------------------------------ ------------- -------------INVALID 0 0PRE-SERVICE FOUND 0 0PRE-SERVICE NONE 0 0SSS CONNECT LOCAL 16002 16002SSS FORWARDING 0 0SSS FORWARDED 0 0SSS MORE KEYS 16002 16002SSS DISCONNECT 0 0CONFIG UPDATE 0 0STATIC BIND RESPONSE 16002 16002PPP FORWARDING 0 0PPP FORWARDED 0 0PPP DISCONNECT 0 0PPP RENEGOTIATION 0 0SSM PROVISIONED 16002 16002SSM UPDATED 16002 16002SSM DISCONNECT 0 0>PPPoE Statistics TOTAL SINCE CLEARED------------------------------ ------------- -------------SSS Request 16002 16002SSS Response Stale 0 0SSS Disconnect 0 0PPPoE Handles Allocated 16002 16002PPPoE Handles Freed 0 0Dynamic Bind Request 16002 16002Static Bind Request 16002 16002Step 6 show ccm queues
Use the show ccm queues command to display queue statistics for CCM sessions on active and standby processors. This command is primarily used only by Cisco engineers for internal debugging of CCM processes.
The following is sample output from the show ccm queues command:
Router# show ccm queues9 Event Queuessize max kicks starts false suspends ticks(ms)4 CCM 0 2 13 13 0 0 20Event NamesEvents Queued MaxQueued Suspends usec/evt max/evt1 4 Sync Session 0 0 0 0 0 02 4 Sync Client 0 0 0 0 0 03 4 Update 0 0 0 0 0 04 4 Session Down 0 0 0 0 0 05 4 Bulk Sync Begi 0 0 0 0 0 06 4 Bulk Sync Cont 0 0 0 0 0 07 4 Bulk Sync End 1 0 1 0 53 538 4 Going Active 0 0 0 0 0 09 4 Going Standby 1 0 1 0 10 1010 4 Standby Presen 0 0 0 0 0 011 4 Standby Gone 0 0 0 0 0 013 4 CP Message 18 0 2 0 156 57314 4 Recr Session 0 0 0 0 0 015 4 Recr Update 0 0 0 0 0 016 4 Recr Sess Down 0 0 0 0 0 017 4 ISSU Session N 1 0 1 0 283 28318 4 ISSU Peer Comm 0 0 0 0 0 0Step 7 debug pppatm redundancy
Use the debug pppatm redundancy command to display CCM events and messages for PPPoA sessions on HA systems. This command is generally used only by Cisco engineers for internal debugging of CCM processes. The following is sample output from the debug pppatm redundancy command from a Cisco 10000 series router standby RP:
Router# debug pppatm redundancy*Dec 3 02:58:40.784: PPPATM HA: [14000001]: Received the first SHDB*Dec 3 02:58:40.784: PPPATM HA: [14000001]: Base hwidb not created > yet, queuing SHDB *Dec 3 02:58:40.784: PPPATM HA: [14000001]:Requesting base vaccess creationStep 8 debug pppoe redundancy
Use the debug pppoe redundancy command to display CCM events and messages for PPPoE sessions on HA systems. This command is generally used only by Cisco engineers for internal debugging of CCM processes. The following is sample output from the debug pppoe redundancy command from a Cisco 10000 series router active RP:
Router# debug pppoe redundancyNov 22 17:21:11.327: PPPoE HA[0xBE000008] 9: Session ready to sync dataNov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = PADR, length = 58Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = SESSION ID, length = 2Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = SWITCH HDL, length = 4Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = SEGMENT HDL, length = 4Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = PHY SWIDB DESC, length = 20Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = VACCESS DESC, length = 28Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: Sync collection for ready eventsNov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = PADR, length = 58Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = SESSION ID, length = 2Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = SWITCH HDL, length = 4Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = SEGMENT HDL, length = 4Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = PHY SWIDB DESC, length = 20Nov 22 17:21:11.351: PPPoE HA[0xBE000008] 9: code = VACCESS DESC, length = 28The following is sample output from the debug pppoe redundancy command from a Cisco 10000 series router standby RP:
Router# debug pppoe redundancyThe following is sample output from the debug pppoe redundancy command from a Cisco 10000 series router standby RP:
Nov 22 17:21:11.448: PPPoE HA[0x82000008]: Recreating session: retrieving dataNov 22 17:21:11.464: PPPoE HA[0x82000008] 9: Session ready to sync dataThe following is sample output from the debug pppoe redundancy command from a Cisco 7600 series router active processor.
Router# debug pppoe redundancyDec 17 15:14:37.060: PPPoE HA[0x131B01B1] 28039: Session ready to sync dataDec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = PADR, length = 48Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = SESSION ID, length = 2Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = SWITCH HDL, length = 4Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = SEGMENT HDL, length = 4Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = PHY SWIDB DESC, length = 20Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = VACCESS DESC, length = 28Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: Sync collection for ready eventsDec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = PADR, length = 48Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = SESSION ID, length = 2Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = SWITCH HDL, length = 4Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = SEGMENT HDL, length = 4Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = PHY SWIDB DESC, length = 20Dec 17 15:14:37.076: PPPoE HA[0x131B01B1] 28039: code = VACCESS DESC, length = 28The following is sample output from the debug pppoe redundancy command from a Cisco 7600 series router standby processor:
Router# debug pppoe redundancyDec 17 15:14:37.180: STDBY: PPPoE HA[0xE41B019B]: Recreating session: retrieving dataDec 17 15:14:37.204: STDBY: PPPoE HA[0xE41B019B] 28039: Session ready to sync data
Configuration Examples for Cisco IOS Broadband High Availability In Service Software Upgrade
This section provides the following configuration example:
•PPPoX Terminated into an RA-MPLS Network with ISSU: Example
PPPoX Terminated into an RA-MPLS Network with ISSU: Example
The following example shows how to configure PPPoX session subscriber redundancy policy for the Cisco IOS Broadband High Availability In Service Software Upgrade feature in an RA-MPLS network:
Router# show running-confighostname Router!boot-start-markerboot system bootflash:c10k2-p11-mz.sur3_1003 boot-end-marker !enable password cisco!aaa new-model!!aaa authentication ppp default local!!!aaa session-id commonppp hold-queue 80000facility-alarm intake-temperature major 54 facility-alarm intake-temperature minor 45 facility-alarm intake-temperature critical 72 facility-alarm core-temperature major 58 facility-alarm core-temperature minor 50 facility-alarm core-temperature critical 85 !!card 1/0 4oc3atm-1card 2/0 4oc3atm-1card 3/0 4oc3atm-1card 4/0 4oc3atm-1card 5/0 8fastethernet-1card 6/0 4oc3atm-1card 7/0 4oc3atm-1card 8/0 1gigethernet-hh-1card 8/1 1gigethernet-hh-1ip subnet-zerono ip gratuitous-arpsno ip domain lookupip vrf vrf1rd 1:1route-target export 1:1route-target import 1:1!no ip dhcp use vrf connected!!!!no subscriber policy recording rulesThe following lines show subscriber redundancy policy configuration:
subscriber redundancy dynamic limit cpu 90 delay 10 subscriber redundancy bulk limit cpu 90 delay 10 subscriber redundancy rate 4000 1 subscriber redundancy delay 10 no mpls traffic-eng auto-bw timers frequency 0 mpls ldp graceful-restart mpls ldp router-id Loopback100 no virtual-template snmp issu config-sync policy bulk prc issu config-sync policy bulk bem !redundancymode ssousername cisco password 0 cisco!buffers small permanent 15000buffers middle permanent 12000buffers large permanent 1000bba-group pppoe grp1virtual-template 1!bba-group pppoe grp2virtual-template 2!bba-group pppoe grp3virtual-template 3!bba-group pppoe grp4virtual-template 4!bba-group pppoe grp5virtual-template 5!bba-group pppoe grp7virtual-template 7!bba-group pppoe grp8virtual-template 8!bba-group pppoe grp6virtual-template 6!!interface Loopback0ip vrf forwarding vrf1ip address 172.16.1.1 255.255.255.255!interface Loopback100ip address 172.31.0.1 255.255.255.255!interface FastEthernet0/0/0ip address 192.168.2.26 255.255.255.0speed 100full-duplex!interface ATM1/0/0no ip addressload-interval 30!interface ATM1/0/0.1 multipointrange pvc 1/32 1/4031encapsulation aal5snapprotocol pppoe group grp1!!interface ATM1/0/0.2 multipointrange pvc 2/32 2/4031encapsulation aal5snapprotocol pppoe group grp2!!interface ATM1/0/1no ip address!interface ATM1/0/1.1 multipointrange pvc 3/32 3/4031encapsulation aal5snapprotocol pppoe group grp3!!interface ATM1/0/1.2 multipointrange pvc 4/32 4/4031encapsulation aal5snapprotocol pppoe group grp4!!interface ATM1/0/2no ip address!interface ATM1/0/2.1 multipointrange pvc 5/32 5/4031encapsulation aal5snapprotocol pppoe group grp5!!interface ATM1/0/2.2 multipointrange pvc 6/32 6/4031encapsulation aal5snapprotocol pppoe group grp6!!interface ATM1/0/3no ip address!interface ATM1/0/3.1 multipointrange pvc 7/32 7/4031encapsulation aal5snapprotocol pppoe group grp7!!interface ATM1/0/3.2 multipointrange pvc 8/32 8/4031encapsulation aal5snapprotocol pppoe group grp8!!!!interface ATM7/0/3no ip address!interface GigabitEthernet8/0/0mac-address 0011.0022.0033ip vrf forwarding vrf1ip address 10.1.1.2 255.255.255.0negotiation auto!interface GigabitEthernet8/1/0ip address 10.1.1.1 255.255.255.0negotiation autompls ip!interface Virtual-Template1ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool1no snmp trap link-statuskeepalive 30ppp authentication pap!interface Virtual-Template2ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool2no snmp trap link-statuskeepalive 30ppp authentication pap!interface Virtual-Template3ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool3no snmp trap link-statuskeepalive 30ppp authentication pap!interface Virtual-Template4ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool4no snmp trap link-statuskeepalive 30ppp authentication pap!interface Virtual-Template5ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool5no snmp trap link-statuskeepalive 30ppp authentication pap!interface Virtual-Template6ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool6no snmp trap link-statuskeepalive 30ppp authentication pap!interface Virtual-Template7ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool7no snmp trap link-statuskeepalive 30ppp authentication pap!interface Virtual-Template8ip vrf forwarding vrf1ip unnumbered Loopback0no logging event link-statuspeer default ip address pool pool8no snmp trap link-statuskeepalive 30ppp authentication pap!router ospf 1log-adjacency-changesnsfnetwork 10.1.1.0 0.0.0.255 area 0network 10.0.0.0 0.0.0.255 area 0!router bgp 1no synchronizationbgp log-neighbor-changesbgp graceful-restart restart-time 120bgp graceful-restart stalepath-time 360bgp graceful-restartneighbor 10.0.0.3 remote-as 1neighbor 10.0.0.3 update-source Loopback100no auto-summary!address-family vpnv4neighbor 10.0.0.3 activateneighbor 10.0.0.3 send-community extendedexit-address-family!address-family ipv4 vrf vrf1redistribute connectedredistribute staticno auto-summaryno synchronizationexit-address-family!ip local pool pool2 10.1.1.1 10.1.16.160ip local pool pool3 10.1.1.1 10.1.16.160ip local pool pool4 10.1.1.1 10.1.16.160ip local pool pool5 10.1.1.1 10.1.16.160ip local pool pool6 10.1.1.1 10.1.16.160ip local pool pool7 10.1.1.1 10.1.16.160ip local pool pool8 10.1.1.1 10.1.16.160ip classless !!no ip http server!!arp 10.1.1.1 0020.0001.0001 ARPAarp vrf vrf1 10.1.1.1 0020.0001.0001 ARPA !!!!!line con 0line aux 0line vty 0 4password cisco!exception crashinfo file bootflash:crash.log !endAdditional References
The following sections provide references related to the Cisco IOS Broadband High Availability In Service Software Upgrade feature.
Related Documents
Related Topic Document TitleInformation about Cisco 10000 series routers and broadband aggregation
Cisco 10000 Series Router Broadband Aggregation, Leased-Line, and MPLS Configuration Guide
Performing an ISSU
Information about the broadband SSO feature
Information about SSO
Information about NSF
Information on Cisco IOS releases
Standards
Standard TitleNo new or modified standards are supported by this feature, and support for existing standards has not been modified by this feature.
—
MIBs
RFCs
RFC TitleNo new or modified RFCs are supported by this feature, and support for existing RFCs has not been modified by this feature.
—
Technical Assistance
Feature Information for Cisco IOS Broadband High Availability In Service Software Upgrade
Table 1 lists the release history for this feature.
Not all commands may be available in your Cisco IOS software release. For release information about a specific command, see the command reference documentation.
Use Cisco Feature Navigator to find information about platform support and software image support. Cisco Feature Navigator enables you to determine which Cisco IOS and Catalyst OS software images support a specific software release, feature set, or platform. To access Cisco Feature Navigator, go to http://www.cisco.com/go/cfn. An account on Cisco.com is not required.
Note Table 1 lists only the Cisco IOS software release that introduced support for a given feature in a given Cisco IOS software release train. Unless noted otherwise, subsequent releases of that Cisco IOS software release train also support that feature.
CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco IronPort, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco Nurse Connect, Cisco Pulse, Cisco StackPower, Cisco StadiumVision, Cisco TelePresence, Cisco Unified Computing System, Cisco WebEx, DCE, Flip Channels, Flip for Good, Flip Mino, Flipshare (Design), Flip Ultra, Flip Video, Flip Video (Design), Instant Broadband, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn, Cisco Capital, Cisco Capital (Design), Cisco:Financed (Stylized), Cisco Store, and Flip Gift Card are service marks; and Access Registrar, Aironet, AllTouch, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, Continuum, EtherFast, EtherSwitch, Event Center, Explorer, Fast Step, Follow Me Browsing, FormShare, GainMaker, GigaDrive, HomeLink, iLYNX, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, Laser Link, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerKEY, PowerPanels, PowerTV, PowerTV (Design), PowerVu, Prisma, ProConnect, ROSA, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0908R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2008 - 2009 Cisco Systems, Inc. All rights reserved