Professional Documents
Culture Documents
Content
1
2
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
3
3.1
3.2
3.3
3.4
3.5
3.6
3.7
4
4.1
4.2
4.3
4.4
4.5
4.6
4.7
4.8
86PCLI-D
2015 Coriant
2
3
4
5
6
7
8
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
24
25
25
86PCLI-D
2015 Coriant
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
86PCLI-D
. Coriant
. .
2015
. . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
2.1
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. 86PCLI-D
. .
. 2015
. Coriant
.
. . .
2.2
Privilege (#)
Various one-time commands e.g.
deleting or copying a file, or clearing
statistic counters
These commands are not used for
changing configuration
Configuration (config)
commands used to configure general
system characteristics.
Specific configuration modes for
configuring interfaces, protocols,
security, etc
The configuration changes are saved
immediately to FLASH
router>
router> enable
router# configure terminal
router(config)#
.
.
router(config)# exit
router# disable
router>
The CLI commands are divided into several command modes based on the
functionality of the router. Each command mode has its own set of commands
available for configuring and monitoring the router. The commands available to you at
any given time depend on the mode you are in. Entering a question mark (?) at the
router prompt allows you to obtain a list of commands available for each command
mode.
There are shortcuts which allow mode changing directly without going via common
parent. These commands are marked with -> at the beginning of the command for
not to confuse these with functionality offered by command mode.
The figure on next page presents the CLI command modes. It also shows the
commands entering and leaving the modes.
When you start a session on a router, you begin with the Read Only mode. For
security purposes, only monitoring commands are available. This level of access is
reserved for tasks that do not change the configuration or state of the router.
The next mode is the Privilege mode. In addition to the Read Only mode commands,
you can now also give various one-time commands e.g. deleting or copying a file, or
clearing statistic counters. These commands are not considered as configuration
changing commands.
From the Privilege mode, you can enter the Configuration mode. In this mode, you
can enter commands that configure general system characteristics. The subsequent
modes configure a certain functional area e.g. OSPF protocol (Router OSPF
Configuration mode).
The configuration changes are saved if the router reboots.
86PCLI-D
2015 Coriant
2.3
86PCLI-D
2015 Coriant
2.4
router# ?
aaa
arp
bandwidth-if
bgp
bmp-server
.
.
router# con?
configure
router# configure ?
terminal
Configure from the terminal
router# con <tabulator>
router# configure
router# conf term
Just typing a question mark ? at a prompt will show all commands available in this
mode with a short description.
Typing part of a command and ending it with a ? will show any command which has
the same letters preceding ?.
Typing a command followed with a space and then ? will show all the available
context sensitive command parameters which can be used to follow the initial
command.
If you type enough of a command to make it sufficiently unique for the system to
recognize it, you can press the tabulator key and the system will complete the
command for you on a new prompt line. This also means that you do not need to type
a full command for the system to recognize it. Type enough to make it unique and
then when you press return the system will execute the command. This also applies
to commands that are made up of word parameters.
86PCLI-D
2015 Coriant
2.5
Command History
Command History
Up arrow will automatically display previous commands in the
sequence they were used
Commands displayed are relative to the prompt they were used with.
Privileged mode, configuration mode, etc
2.6
Function
CTRL + Z
Use this command to return to the Privilege command mode from any
other advanced
command mode
CTRL + C
CTRL + A
CTRL + E
CTRL + B
CTRL + F
CTRL + D
CTRL + K
CTRL + N
Move cursor to the next line if the command line exceeds one line
CTRL + P
Move cursor to the previous line if the command line exceeds one line
86PCLI-D
2015 Coriant
2.7
86PCLI-D
2015 Coriant
2.8
Hostname
Hostname
Hostname should be given in the beginning to distinguish
multiple open router CLI sessions
Fig. 10 Hostname
Changing the router prompt to something which better identifies the current router
telnet session is a useful habit. With multiple terminal windows open to routers and all
having the same prompt, it can be difficult to remember which one you are working
on.
Hostname Lesson 1: Knowledge Check
10
86PCLI-D
2015 Coriant
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
86PCLI-D
. . .
2015 Coriant
. . .
. . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
11
3.1
User Management
The user management feature is used for managing the user account database
information in the 8600 system. It can contain information of up to 128 users.
Viewable information about each registered user has currently the following
parameters:
One console
Up to 8 telnet sessions
Up to 8 SSH sessions
User Authentication
When a new network element is taken into use, user authentication is disabled. This
means that anybody can login and change its configuration. It is essential that the
initial configuration of the network element includes creating a new superuser
account with the maximum privilege level and enabling user authentication. In
addition to the built-in user account database, it is possible to use a remote user
database using RADIUS. There must, however, always be a local superuser account
before the user authentication can be enabled.
12
86PCLI-D
2015 Coriant
3.2
Creating Users
Creating Users
*
*
*
*
*
*
*
*
*
*
******************************************************************
user name:superuser
password:********
Enter configuration commands, one per line. End with ^Z
HUB1>
After logging in with a username and password, the level of access to the different
commands and configuration modes is determined by the privilege level assigned to
your user. Typically a superuser should have privilege level 31 to ensure full access
to the node.
In order to ensure the node requests a username and password, the userauthentication command must be enabled.
To remove the authentication login and remove a user from the database, the
commands used to create the user and enable authentication must be done in
reverse.
1. HUB1(config)# no user-authentication
2. HUB1(config)# no username superuser
Creating Users
86PCLI-D
2015 Coriant
13
3.3
After logging in with a username and password, the level of access to the different
commands and configuration modes is determined by the privilege level assigned to
your user. Typically a superuser should have privilege level 31 to ensure full access
to the node.
In order to ensure the node requests a username and password, the userauthentication command must be enabled.
To remove the authentication login and remove a user from the database, the
commands used to create the user and enable authentication must be done in
reverse.
1. HUB1(config)# no user-authentication
2. HUB1(config)# no username superuser
If a user fails to login three times in a row, the account is locked out. It will become
active again after 5mins (300sec). If the login attempts were made remotely the
console port will still be available to connect to.
A security violation critical fault will be generated and shown on screen and can be
seen in the active fault list.
14
86PCLI-D
2015 Coriant
3.4
Forgotten Password
Forgotten Password
Forgotten password feature is needed when none of the
username/password combinations are known for the node
******************************************************************
*
*
*
*
*
*
*
*
*
*
******************************************************************
user name:lostpassword
password:************
This operation will reset the device and create hw inventory
from the scratch. All user account information and
configurations will be lost.
Are you sure you want to continue (y/n)?
If all user passwords are forgotten and there is no other way to access the network
element, the forgotten password feature can be helpful. It allows the user to login via
the console connection by using the username lostpassword and password
lostpassword. After login the user will be informed:
This operation will reset the device and create hw inventory from the scratch. All user
account information and configurations will be lost.
Are you sure you want to continue (y/n)?
If the letter n is pressed, the operation will be cancelled and the console connection
is disconnected.
If the letter y is pressed, a fault will be sent to the network management system and
after a delay of 30 seconds the device will boot up and create the HW inventory from
the scratch. All existing entries are removed from the user account database and
authentication is disabled after the operation.
All CLI commands are disabled when logging in using the lostpassword user name.
86PCLI-D
2015 Coriant
15
3.5
Privilege
31
15
LoginTime
2009-08-11 11:05:57:466
2009-08-11 11:11:04:556
Description
IdleTime
IpAddr
0days 00:01:27 0.0.0.0
0days 00:01:40 192.168.200.254
16
86PCLI-D
2015 Coriant
3.6
Account Activity
Account Activity
HUB1# show user-account-activity
11:11:04 UTC Tue Aug 11 2009
from 192.168.200.254 VTY1
Login username operator1 (connection 0)
11:05:57 UTC Tue Aug 11 2009
from CONSOLE
Login username superuser (connection 0)
11:05:49 UTC Tue Aug 11 2009
from CONSOLE
Logout username <unknown9> (connection 0)
11:05:47 UTC Tue Aug 11 2009
from CONSOLE <unknown9>
User authentication enabled
11:04:03 UTC Tue Aug 11 2009
from CONSOLE <unknown8>
Added username operator1, privilege level 15
11:03:22 UTC Tue Aug 11 2009
from CONSOLE <unknown8>
Added username superuser, privilege level 31
00:44:29 UTC Mon Mar 31 2008
from nodeStartInfo
User authentication disabled
HUB1#
86PCLI-D
2015 Coriant
17
3.7
18
86PCLI-D
2015 Coriant
Hardware Inventory
Creating HW Inventory
Modifying the HW Inventory
Outband Management Configuration
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
. . .
86PCLI-D
. . .
2015
. Coriant
. .
. . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
19
4.1
Hardware Inventory
Hardware Inventory
The main function of the inventory is to monitor the hardware
configuration in a network element
In case of a new 8660/8630/8611/8609 router the inventory creation
is always the first step
Each IFC, IFM and LM is identified by a HW type, HW version and
serial number
Inventory contains the expected configuration of the IFC with
IFMs in a specific slot
If the existing IFC matches the expected IFC in inventory, the card is
allowed to operate
In 8609, if the existing LM matches the expected LM in inventory, the line
module is allowed to operate
In 8611, if the existing LMs and HMs match the expected inventory,
modules are allowed to operate
The CDC card maintains configuration backups for all the cards
that belong to the inventory
Fig. 23 Hardware Inventory
The main function of the hardware inventory in the 8600 routers is to monitor the
hardware configuration in a network element. Each card and module is identified by a
HW type, HW version, and serial number. Each NE has a configuration of the
expected hardware: cards belonging to the NE and modules belonging to a card. This
configuration is kept on the non-volatile memory of the Control and DC Power Card
(CDC) in the 8660/8630, of the Switching and Control Module (SCM) in the 8611, and
on the non-volatile memory of the 8609 baseboard. The "expected HW configuration"
is later referred to as hw-inventory configuration.
In the 8605 smart router, the inventory exists, and it is very simple: there is only one
slot, and also there are always two fixed modules, the Ethernet module 0 and the
E1/T1 MS module 1, which are always expected.
Also in the 8602 the inventory exists, there is only one slot, and there are six fixed
modules for the GE interfaces.
20
86PCLI-D
2015 Coriant
4.2
Basically, the hw-inventory contains an expected card type for each card slot in the
NE and an expected module type for each module slot in a card. If the type of an
existing card in a slot matches with the expected type in the hw-inventory, the card is
allowed to operate. If a module type in a module slot of this card matches with the
expected type in the hw-inventory, the module will be allowed to operate.
The NE also maintains configuration backups for all cards belonging to the hwinventory configuration. When a card is replaced by another card of the same type
with the same type of modules, the new card (replacement card) will get the
configuration of the old card and will start operating as part of the NE without any
need to manually configure it.
If a card that does not belong to the hw-inventory configuration is inserted into the
NE, it will not be allowed to operate as part of the NE until it is added to the hwinventory configuration. In addition, it will not get configuration backups from the NE.
Likewise, if a card has a module that is not part of the hw-inventory, it will not become
operational.
86PCLI-D
2015 Coriant
21
4.3
router> enable
router# hw-inventory add-all-units clean-start
The clean-start command will return the node to factory default settings. This
includes clearing and rebuilding the hardware inventory as well as erasing the node
configuration.
Example
router#hw-inventory add-all-units clean-start ?
etsi STM-1, E1, etc. interfaces
ansi Sonet, T1, etc. interfaces
<cr> Accept command
If no input is given, the system uses ETSI mode for TDM interfaces as default.
N05#hw-inventory add-all-units clean-start
Requested command may seriously harm data traffic or network element running
configuration: do you want to proceed? [y(es)/n(o)]:
22
86PCLI-D
2015 Coriant
4.4
router#
router# hw-inventory slot 3 add unit clean-start
router# hw-inventory slot 3 add module 0 type 2*1000BASE-x
router#
In order to reduce the number of times units need to be rebooted, when a module on
a unit is changed to different hardware type, it is recommended to first change the
module (or 8609/8611 LM) type in the inventory before swapping the module (or
8609/8611 LM) hardware. This means the unit (or the 8609/8611 node) only needs to
be rebooted once after the hardware has been changed.
86PCLI-D
2015 Coriant
23
4.5
Hardware Inventory OK
Hardware Inventory OK
router#show hw-inventory
This is node 0 of type 8630 and subrack address 0.
Control unit 14 is active.
unit in slot 6 is part of inventory and UP AND RUNNING
unit 6 of width 1 has serial number 40100003687
HW type lba2024-IFC1-A(2024) v1.0.1 SW type 1 v2.3.8
infomodel version 0.23.0; internal SW version "2.3.8"
module IF UPPER of type 2*1000BASE-X(2019) v1.0.1
serial number 40100004787
sfp connector 0 has type 7
sfp connector 1 is not present
module IF LOWER of type 4*STM-1/ATM(2210) v1.0.0
serial number 40100008368
sfp connector 0 is not present
sfp connector 1 is not present
sfp connector 2 is not present
sfp connector 3 is not present
interface module 0 has
expected type 2*1000BASE-X
Expected type = Existing type
active
type 2*1000BASE-X
existing type 2*1000BASE-X
Module is allowed to operate
interface module 1 has
expected type 4*STM-1/ATM
active
type 4*STM-1/ATM
existing type 4*STM-1/ATM
4.6
24
86PCLI-D
2015 Coriant
4.7
router>enable
router# configure terminal
router(config)# hostname N-PE18
N-PE18(config)# router-id 10.123.100.18
N-PE18(config)# interface mfe 14/0
N-PE18(cfg-if[mfe14/0])# ip address 192.168.0.18/24
N-PE18(cfg-if[mfe14/0])# no shutdown
N-PE18(cfg-if[mfe14/0])# description Management Interface
N-PE18(cfg-if[mfe14/0])# exit
N-PE18(config)# ip route 172.19.137.0/24 192.168.0.254
N-PE18(config)# cli-server telnet enable
N-PE18(config)# exit
N-PE18# ping 172.19.137.1
Hostname to the NE
Set node-level router-id
Management Ethernet IF
Outband management IP address
Interface is taken in to use
.254
172.19.137.0/24
.18
.1
Router
192.168.0.0/24
4.8
86PCLI-D
2015 Coriant
25
26
86PCLI-D
2015 Coriant