Friday, November 3, 2023

Cisco Catalyst 8500L IOS-XE 17.6 Upgrade

The Cisco Catalyst 8500 edge platform is the replacement for the Cisco ASR1000 and ASR1001-X series routers.

The C8500L-8S4X platform has 8x 1GE ports and 4x 1/10GE ports in the front chassis.

It has 2x dual power supply unit in the rear chassis.

There's a console (blue) port and dedicated out-of-band RJ45 manageemnt port (LAN icon).

The pull out serial number tag found in the front chassis.


There's an RFID tag found on the right-hand side which can be removed.


 

Below is the initial boot up, show version and show run output.

 

Initializing Hardware ...

Checking for PCIe device presence...done
System integrity status: 0x610
Rom image verified correctly


System Bootstrap, Version 17.4(1r), RELEASE SOFTWARE
Copyright (c) 1994-2020  by cisco Systems, Inc.


Current image running: Boot ROM1

Last reset cause: PowerOn
C8500L-8S4X platform with 15728640 Kbytes of main memory


........
Located c8000aes-universalk9.17.05.01a.SPA.bin
#####################################################################

Package header rev 3 structure detected
IsoSize = 533463040
Performing Integrity Check ...
Performing Signature Verification ...
RSA Signed RELEASE Image Signature Verification Successful.
Image validated
Aug 29 07:44:04.497: %BOOT-5-OPMODE_LOG: R0/0: binos: System booted in AUTONOMOUS mode

              Restricted Rights Legend

Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

           Cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706


Cisco IOS Software [Bengaluru], c8000aes Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 17.5.1a, RELEASE SOFTWARE (fc3)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2021 by Cisco Systems, Inc.
Compiled Sun 11-Apr-21 17:14 by mcpre


This software version supports only Smart Licensing as the software licensing mechanism.


PLEASE READ THE FOLLOWING TERMS CAREFULLY. INSTALLING THE LICENSE OR
LICENSE KEY PROVIDED FOR ANY CISCO SOFTWARE PRODUCT, PRODUCT FEATURE,
AND/OR SUBSEQUENTLY PROVIDED SOFTWARE FEATURES (COLLECTIVELY, THE
"SOFTWARE"), AND/OR USING SUCH SOFTWARE CONSTITUTES YOUR FULL
ACCEPTANCE OF THE FOLLOWING TERMS. YOU MUST NOT PROCEED FURTHER IF YOU
ARE NOT WILLING TO BE BOUND BY ALL THE TERMS SET FORTH HEREIN.

Your use of the Software is subject to the Cisco End User License Agreement
(EULA) and any relevant supplemental terms (SEULA) found at
http://www.cisco.com/c/en/us/about/legal/cloud-and-software/software-terms.html.

You hereby acknowledge and agree that certain Software and/or features are
licensed for a particular term, that the license to such Software and/or
features is valid only for the applicable term and that such Software and/or
features may be shut down or otherwise terminated by Cisco after expiration
of the applicable license term (e.g., 90-day trial period). Cisco reserves
the right to terminate any such Software feature electronically or by any
other means available. While Cisco may provide alerts, it is your sole
responsibility to monitor your usage of any such term Software feature to
ensure that your systems and networks are prepared for a shutdown of the
Software feature.


% Failed to initialize nvram
% Failed to initialize backup nvram

All TCP AO KDF Tests Pass
cisco C8500L-8S4X (1RU) processor with 674359K/6147K bytes of memory.
Processor board ID FLX26041234
Router operating mode: Autonomous
8 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
15728640K bytes of physical memory.
15151103K bytes of eUSB flash at bootflash:.
15269887K bytes of USB hard disk at harddisk:.

No startup-config, starting autoinstall/pnp/ztp...

Autoinstall will terminate if any input is detected on console


         --- System Configuration Dialog ---

Would you like to enter the initial configuration dialog? [yes/no]: no

Would you like to terminate autoinstall? [yes]:
No startup-config, starting autoinstall/pnp/ztp...

Autoinstall will terminate if any input is detected on console


Press RETURN to get started!


*Aug 29 07:44:26.887: %IOSXE_RP_NV-3-NV_ACCESS_FAIL: Initial read of NVRAM contents failed
*Aug 29 07:44:28.359: %IOSXE_RP_NV-3-BACKUP_NV_ACCESS_FAIL: Initial read of backup NVRAM contents failed
*Aug 29 07:44:28.881: %SMART_LIC-6-AGENT_ENABLED: Smart Agent for Licensing is enabled
*Aug 29 07:44:28.916: %SMART_LIC-6-EXPORT_CONTROLLED: Usage of export controlled features is not allowed
*Aug 29 07:44:35.486: %CRYPTO_ENGINE-5-CSDL_COMPLIANCE_ENFORCED: Cisco PSB security compliance is being enforced
*Aug 29 07:44:35.584: %CRYPTO_SL_TP_LEVELS-6-ROMMON_VAL: Current rommon value: -1
*Aug 29 07:44:35.724: %CRYPTO_SL_TP_LEVELS-6-VAR_NEW_VALUE: Setting crypto bidir throughput to: 1000000 kbps
*Aug 29 07:44:35.747: %LINK-3-UPDOWN: Interface Lsmpi0, changed state to up
*Aug 29 07:44:35.771: %LINK-3-UPDOWN: Interface EOBC0, changed state to up
*Aug 29 07:44:35.771: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to down
*Aug 29 07:44:35.778: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL GigabitEthernet0 Physical Port Link Down
*Aug 29 07:44:35.783: %LINK-3-UPDOWN: Interface LIIN0, changed state to up
*Aug 29 07:44:35.865: %PNP-6-PNP_DISCOVERY_STARTED: PnP Discovery started
*Aug 29 07:44:35.865: %PNP-6-PNP_GOOD_UDI_UPDATE: Good UDI [PID:C8500L-8S4X,VID:,SN:FLX26041234] identified via (platform-registry)
*Aug 29 07:44:35.865: %PNP-6-PNP_CDP_UPDATE: Device UDI [PID:C8500L-8S4X,VID:,SN:FLX26041234] identified for CDP
*Aug 29 07:44:04.484: %BOOT-5-OPMODE_LOG: R0/0: binos: System booted in AUTONOMOUS mode
*Aug 29 07:44:09.999: %CMRP_PFU-6-FANASSY_INSERTED: R0/0: cmand: Fan Assembly is inserted.
*Aug 29 07:44:10.006: %CMRP_PFU-6-PEM_INSERTED: R0/0: cmand: PEM in slot 1 not operational.
*Aug 29 07:44:11.120: %IOSXE-0-PLATFORM: R0/0: tamd_proc: TAM UDI Authentication successful for PID C8500L-8S4X
*Aug 29 07:44:36.085: %SYS-5-CONFIG_P: Configured programmatically by process MGMT VRF Process from console as vty0
*Aug 29 07:44:37.011: %IOSXE_MGMTVRF-6-CREATE_SUCCESS_INFO: Management vrf Mgmt-intf created with ID 1, ipv4 table-id 0x1, ipv6 table-id 0x1E000001
*Aug 29 07:44:37.061: %LINEPROTO-5-UPDOWN: Line protocol on Interface Lsmpi0, changed state to up
*Aug 29 07:44:37.061: %LINEPROTO-5-UPDOWN: Line protocol on Interface EOBC0, changed state to up
*Aug 29 07:44:37.061: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to down
*Aug 29 07:44:37.061: %LINEPROTO-5-UPDOWN: Line protocol on Interface LIIN0, changed state to up
*Aug 29 07:44:37.063: %SYS-5-CONFIG_P: Configured programmatically by process MGMT VRF Process from console as vty0
*Aug 29 07:44:37.177: %IOSXE_RP_ALARM-2-PEM: ASSERT CRITICAL Power Supply Module 1 Power Supply Failure
*Aug 29 07:44:37.380: %ONEP_BASE-6-SS_ENABLED: ONEP: Service set Base was enabled by Default
*Aug 29 07:44:39.203: %SYS-7-NVRAM_INIT_WAIT_TIME: Waited 0 seconds for NVRAM to be available
*Aug 29 07:44:39.206: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/0, interfaces disabled
*Aug 29 07:44:39.207: %IOSXE_OIR-6-REMSPA: SPA removed from subslot 0/1, interfaces disabled
*Aug 29 07:44:39.210: %SPA_OIR-6-OFFLINECARD: SPA (8xSFP) offline in subslot 0/0
*Aug 29 07:44:39.211: %SPA_OIR-6-OFFLINECARD: SPA (4xSFP+) offline in subslot 0/1
*Aug 29 07:44:39.355: %IOSXE_OIR-6-INSCARD: Card (fp) inserted in slot F0
*Aug 29 07:44:39.355: %IOSXE_OIR-6-ONLINECARD: Card (fp) online in slot F0
*Aug 29 07:44:39.372: %IOSXE_OIR-6-INSCARD: Card (cc) inserted in slot 0
*Aug 29 07:44:39.372: %IOSXE_OIR-6-ONLINECARD: Card (cc) online in slot 0
*Aug 29 07:44:39.390: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/0
*Aug 29 07:44:39.391: %IOSXE_OIR-6-INSSPA: SPA inserted in subslot 0/1
*Aug 29 07:44:39.456: %IOXN_APP-6-PRE_INIT_DAY0_GS_INFO: Day0 Guestshell pre-initilization API is being invoked
*Aug 29 07:44:39.993: %UICFGEXP-6-SERVER_NOTIFIED_START: R0/0: psd: Server iox has been notified to start
*Aug 29 07:44:45.895: %PNP-6-PNP_BEST_UDI_UPDATE: Best UDI [PID:C8500L-8S4X,VID:V01,SN:FLX26041234] identified via (entity-mibs)
*Aug 29 07:44:46.185: %SPA_OIR-6-ONLINECARD: SPA (8xSFP) online in subslot 0/0
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/0 Transceiver Missing - Link Down
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/1 Transceiver Missing - Link Down
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/2 Transceiver Missing - Link Down
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/3 Transceiver Missing - Link Down
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/4 Transceiver Missing - Link Down
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/5 Transceiver Missing - Link Down
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/6 Transceiver Missing - Link Down
*Aug 29 07:44:46.187: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/0/7 Transceiver Missing - Link Down
*Aug 29 07:44:46.631: %SPA_OIR-6-ONLINECARD: SPA (4xSFP+) online in subslot 0/1
*Aug 29 07:44:46.632: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/1/0 Transceiver Missing - Link Down
*Aug 29 07:44:46.633: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/1/1 Transceiver Missing - Link Down
*Aug 29 07:44:46.633: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/1/2 Transceiver Missing - Link Down
*Aug 29 07:44:46.633: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL xcvr container 0/1/3 Transceiver Missing - Link Down
*Aug 29 07:44:48.409: %TRANSCEIVER-6-INSERTED: C0/0: iomd: transceiver module inserted in Gigabitethernet0/0/0
*Aug 29 07:44:48.624: %LINK-3-UPDOWN: Interface TenGigabitEthernet0/1/0, changed state to down
*Aug 29 07:44:48.449: %TRANSCEIVER-6-INSERTED: C0/0: iomd: transceiver module inserted in Gigabitethernet0/0/1
*Aug 29 07:44:48.489: %TRANSCEIVER-6-INSERTED: C0/0: iomd: transceiver module inserted in Gigabitethernet0/0/2
*Aug 29 07:44:48.529: %TRANSCEIVER-6-INSERTED: C0/0: iomd: transceiver module inserted in Gigabitethernet0/0/3
*Aug 29 07:44:48.638: %LINK-3-UPDOWN: Interface TenGigabitEthernet0/1/1, changed state to down
*Aug 29 07:44:48.639: %LINK-3-UPDOWN: Interface TenGigabitEthernet0/1/2, changed state to down
*Aug 29 07:44:48.640: %LINK-3-UPDOWN: Interface TenGigabitEthernet0/1/3, changed state to down
*Aug 29 07:44:53.625: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/0 Transceiver Missing - Link Down
*Aug 29 07:44:53.645: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL GigabitEthernet0/0/0 Physical Port Link Down
*Aug 29 07:44:53.669: %IOSXE-6-PLATFORM: R0/0: IOx:  App verification successful
*Aug 29 07:44:54.037: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/1 Transceiver Missing - Link Down
*Aug 29 07:44:54.067: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL GigabitEthernet0/0/1 Physical Port Link Down
*Aug 29 07:44:54.468: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/2 Transceiver Missing - Link Down
*Aug 29 07:44:54.499: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL GigabitEthernet0/0/2 Physical Port Link Down
*Aug 29 07:44:55.050: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/3 Transceiver Missing - Link Down
*Aug 29 07:44:55.079: %IOSXE_RP_ALARM-6-INFO: ASSERT CRITICAL GigabitEthernet0/0/3 Physical Port Link Down
*Aug 29 07:44:56.459: %SYS-5-CONFIG_P: Configured programmatically by process Setup from console as vty0
*Aug 29 07:44:56.459: %SYS-5-CONFIG_P: Configured programmatically by process Setup from console as vty0
*Aug 29 07:45:00.630: %SYS-5-USERLOG_NOTICE: Message from tty0(user id: ): Device in day0 workflow, some non user-configured options may be enabled by default
*Aug 29 07:45:00.631: %SYS-5-CONFIG_P: Configured programmatically by process Setup from console as vty0
*Aug 29 07:45:02.596: %LINK-5-CHANGED: Interface GigabitEthernet0/0/0, changed state to administratively down
*Aug 29 07:45:02.596: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL GigabitEthernet0/0/0 Physical Port Link Down
*Aug 29 07:45:02.596: %LINK-5-CHANGED: Interface GigabitEthernet0/0/1, changed state to administratively down
*Aug 29 07:45:02.597: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL GigabitEthernet0/0/1 Physical Port Link Down
*Aug 29 07:45:02.597: %LINK-5-CHANGED: Interface GigabitEthernet0/0/2, changed state to administratively down
*Aug 29 07:45:02.597: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL GigabitEthernet0/0/2 Physical Port Link Down
*Aug 29 07:45:02.597: %LINK-5-CHANGED: Interface GigabitEthernet0/0/3, changed state to administratively down
*Aug 29 07:45:02.598: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL GigabitEthernet0/0/3 Physical Port Link Down
*Aug 29 07:45:02.598: %LINK-5-CHANGED: Interface GigabitEthernet0/0/4, changed state to administratively down
*Aug 29 07:45:02.598: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/4 Transceiver Missing - Link Down
*Aug 29 07:45:02.599: %LINK-5-CHANGED: Interface GigabitEthernet0/0/5, changed state to administratively down
*Aug 29 07:45:02.599: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/5 Transceiver Missing - Link Down
*Aug 29 07:45:02.599: %LINK-5-CHANGED: Interface GigabitEthernet0/0/6, changed state to administratively down
*Aug 29 07:45:02.600: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/6 Transceiver Missing - Link Down
*Aug 29 07:45:02.600: %LINK-5-CHANGED: Interface GigabitEthernet0/0/7, changed state to administratively down
*Aug 29 07:45:02.600: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/0/7 Transceiver Missing - Link Down
*Aug 29 07:45:02.600: %LINK-5-CHANGED: Interface TenGigabitEthernet0/1/0, changed state to administratively down
*Aug 29 07:45:02.601: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/1/0 Transceiver Missing - Link Down
*Aug 29 07:45:02.601: %LINK-5-CHANGED: Interface TenGigabitEthernet0/1/1, changed state to administratively down
*Aug 29 07:45:02.601: %IOSXE_RP_ALARM-6-INFO: CLEAR CRITICAL xcvr container 0/1/1 Transceiver Missing - Link Down
*Aug 29 07:45:02.601: %LINK-5-CHANGED: Interface TenGigabitEthernet0/1/2, changed state to administratively down
*Aug 29 07:45:15.905: %PNP-6-PNP_SAVING_TECH_SUMMARY: Saving PnP tech summary (/pnp-tech/pnp-tech-discovery-summary)... Please wait. Do not interrupt.
*Aug 29 07:45:16.034: %SYS-5-CONFIG_P: Configured programmatically by process PnP Agent Discovery from console as vty0
*Aug 29 07:45:16.216: %SYS-5-CONFIG_P: Configured programmatically by process PnP Agent Discovery from console as vty0
*Aug 29 07:45:16.293: %SYS-5-CONFIG_P: Configured programmatically by process PnP Agent Discovery from console as vty0
*Aug 29 07:45:16.413: %SYS-5-CONFIG_P: Configured programmatically by process PnP Agent Discovery from console as vty0
*Aug 29 07:45:20.906: %IOXN_APP-6-PRE_INIT_DAY0_GS_INFO: Day0 Guestshell de-initilization API is being invoked
Failed to generate persistent self-signed certificate.
Secure server will use temporary self-signed certificate.
*Aug 29 07:45:28.739: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI created succesfully
*Aug 29 07:45:28.744: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named CISCO_IDEVID_SUDI has been generated or imported by pki-sudi
*Aug 29 07:45:28.753: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: CISCO_IDEVID_SUDI0 created succesfully
*Aug 29 07:45:28.755: %PKI-2-NON_AUTHORITATIVE_CLOCK: PKI functions can not be initialized until an authoritative time source, like NTP, can be obtained.
*Aug 29 07:45:28.756: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: TP-self-signed-3108410732 created succesfully
*Aug 29 07:45:28.775: %SYS-5-CONFIG_P: Configured programmatically by process PnP Agent Discovery from console as vty0
*Aug 29 07:45:28.882: %PNP-6-PNP_TECH_SUMMARY_SAVED_OK: PnP tech summary (/pnp-tech/pnp-tech-discovery-summary) saved successfully (elapsed time: 13 seconds).
*Aug 29 07:45:28.883: %PNP-6-PNP_DISCOVERY_STOPPED: PnP Discovery stopped (Config Wizard)
*Aug 29 07:45:29.205: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-3108410732 has been generated or imported by crypto-engine
*Aug 29 07:45:29.206: %SSH-5-ENABLED: SSH 1.99 has been enabled
*Aug 29 07:45:29.237: %PKI-4-NOCONFIGAUTOSAVE: Configuration was modified.  Issue "write memory" to save new IOS PKI configuration
*Aug 29 07:45:29.862: %CRYPTO_ENGINE-5-KEY_ADDITION: A key named TP-self-signed-3108410732.server has been generated or imported by crypto-engine
Router>
*Aug 29 07:45:38.490: %IM-6-IOX_ENABLEMENT: R0/0: ioxman: IOX is ready.
*Aug 29 07:45:39.471: %PKI-6-TRUSTPOINT_CREATE: Trustpoint: SLA-TrustPoint created succesfully
*Aug 29 07:45:39.472: %PKI-4-NOCONFIGAUTOSAVE: Configuration was modified.  Issue "write memory" to save new IOS PKI configuration
*Aug 29 07:45:39.479: %CALL_HOME-6-CALL_HOME_ENABLED: Call-home is enabled by Smart Agent for Licensing.Guestshell destroyed successfully
*Aug 29 07:45:40.632: %IOXN_APP-6-PRE_INIT_DAY0_GS_INFO: Day0 Guestshell destroyed
*Aug 29 07:45:41.146: %UICFGEXP-6-SERVER_NOTIFIED_STOP: R0/0: psd: Server iox has been notified to stop
*Aug 29 07:45:44.179: %IOXN_APP-6-IOX_START_STOP_REQ: Got IOX DOWN COMPLETE event, invoking registered callback(s)


Router>enable
Router#show version
Cisco IOS XE Software, Version 17.05.01a
Cisco IOS Software [Bengaluru], c8000aes Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 17.5.1a, RELEASE SOFTWARE (fc3)

Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2021 by Cisco Systems, Inc.
Compiled Sun 11-Apr-21 17:14 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2021 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.  For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: 17.4(1r)

Router uptime is 1 minute
Uptime for this control processor is 3 minutes
System returned to ROM by PowerOn
System image file is "bootflash:c8000aes-universalk9.17.05.01a.SPA.bin"
Last reload reason: PowerOn


This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

License Type: Perpetual
License Level:
Next reload license Level:
License Type: Subscription
License Level:
Next reload license Level:

The current crypto throughput level is 1000000 kbps

Smart Licensing Status: Registration Not Applicable/Not Applicable

cisco C8500L-8S4X (1RU) processor with 674359K/6147K bytes of memory.
Processor board ID FLX26041234
Router operating mode: Autonomous
8 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
15728640K bytes of physical memory.
15151103K bytes of eUSB flash at bootflash:.
15269887K bytes of USB hard disk at harddisk:.

Configuration register is 0x2102


Router#show run
Building configuration...

Current configuration : 6567 bytes
!
! Last configuration change at 07:45:28 UTC Mon Aug 29 2022
!
version 17.5
service timestamps debug datetime msec
service timestamps log datetime msec
! Call-home is enabled by Smart-Licensing.
service call-home
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-intf
 !
 address-family ipv4
 exit-address-family
 !        
 address-family ipv6
 exit-address-family
!
!
no aaa new-model
!
!
!
!
!
!
!
!
!
!
login on-success log
!
!
!
!
!
!
!         
subscriber templating
multilink bundle-name authenticated
!
crypto pki trustpoint TP-self-signed-3108410732
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-3108410732
 revocation-check none
 rsakeypair TP-self-signed-3108410732
!
crypto pki trustpoint SLA-TrustPoint
 enrollment pkcs12
 revocation-check crl
!
!
crypto pki certificate chain TP-self-signed-3108410732
 certificate self-signed 01
  30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
 

 <OUTPUT TRUNCATED>


  A168612D E89E4A5E 99D69A1C 4BD11204 D1FB33CC 302F1079 05EF016D 1B4475D0
  04BF52A1 469B490C C2AA2797 E3FE54F0 E6CF36E5
        quit
crypto pki certificate chain SLA-TrustPoint
 certificate ca 01
  30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
  32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
 

  <OUTPUT TRUNCATED>


  418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
  D697DF7F 28
        quit
!
!
license udi pid C8500L-8S4X sn FLX26041234
memory free low-watermark processor 67422
!
diagnostic bootup level minimal
!
!
redundancy
 mode none
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0/0
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/1
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/2
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/3
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/4
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/5
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/6
 no ip address
 shutdown
 negotiation auto
!
interface GigabitEthernet0/0/7
 no ip address
 shutdown
 negotiation auto
!
interface TenGigabitEthernet0/1/0
 no ip address
 shutdown
!
interface TenGigabitEthernet0/1/1
 no ip address
 shutdown
!
interface TenGigabitEthernet0/1/2
 no ip address
 shutdown
!
interface TenGigabitEthernet0/1/3
 no ip address
 shutdown
!
interface GigabitEthernet0
 vrf forwarding Mgmt-intf
 no ip address
 shutdown
 negotiation auto
!
ip http server
ip http authentication local
ip http secure-server
ip forward-protocol nd
!
ip tftp source-interface GigabitEthernet0
!
!         
!
!
!
control-plane
!
!
line con 0
 stopbits 1
line aux 0
line vty 0 4
 login
 transport input ssh
!
call-home
 ! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
 ! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
 contact-email-addr sch-smart-licensing@cisco.com
 profile "CiscoTAC-1"
  active
  destination transport-method http
!         
!
!
!
!
!
end


I performed an IOS-XE upgrade from 17.5.1 to 17.6.3. Note to download the correct C8500 software code. There's C8500 with and without the "L". You can't also downgrade the ROMMON firmware. The current firmware version 17.4(1r) is compatible with 17.6.3.


Router#show platform
Chassis type: C8500L-8S4X

Slot      Type                State                 Insert time (ago)
--------- ------------------- --------------------- -----------------
0         C8500L-8S4X         ok                    5d23h         
 0/0      8xSFP               ok                    5d23h         
 0/1      4xSFP+              ok                    5d23h         
R0        C8500L-8S4X         ok, active            5d23h         
F0        C8500L-8S4X         ok, active            5d23h         
P0        PWR-CH1-400WAC      ok                    5d23h         
P1        PWR-CH1-400WAC      fail, badinput        5d23h         
P2        C8500L-FAN-1R       ok                    5d23h         

Slot      CPLD Version        Firmware Version                        
--------- ------------------- ---------------------------------------
0         20090320            17.4(1r)                            
R0        20090320            17.4(1r)                            
F0        20090320            17.4(1r)    

You can use the C8500L without registering in Smart License server (CSSM) since the Smart licenses are perpetual from factory. Just configure the license boot level network-advantage addon dna-advantage comand and issue a write memory

 
Router#show license summary
License Usage:
  License                 Entitlement Tag               Count Status
  -----------------------------------------------------------------------------
  Router US Export Lic... (DNA_HSEC)                        0 NOT IN USE


Router#show license status
Utility:
  Status: DISABLED

Smart Licensing Using Policy:
  Status: ENABLED

Data Privacy:
  Sending Hostname: yes
    Callhome hostname privacy: DISABLED
    Smart Licensing hostname privacy: DISABLED
  Version privacy: DISABLED

Transport:
  Type: cslu
  Cslu address: <empty>
  Proxy:
    Not Configured

Policy:
  Policy in use: Merged from multiple sources.
  Reporting ACK required: yes (CISCO default)
  Unenforced/Non-Export Perpetual Attributes:
    First report requirement (days): 365 (CISCO default)
    Reporting frequency (days): 0 (CISCO default)
    Report on change (days): 90 (CISCO default)
  Unenforced/Non-Export Subscription Attributes:
    First report requirement (days): 90 (CISCO default)
    Reporting frequency (days): 90 (CISCO default)
    Report on change (days): 90 (CISCO default)
  Enforced (Perpetual/Subscription) License Attributes:
    First report requirement (days): 0 (CISCO default)
    Reporting frequency (days): 0 (CISCO default)
    Report on change (days): 0 (CISCO default)
  Export (Perpetual/Subscription) License Attributes:
    First report requirement (days): 0 (CISCO default)
    Reporting frequency (days): 0 (CISCO default)
    Report on change (days): 0 (CISCO default)

Miscellaneous:
  Custom Id: <empty>

Usage Reporting:
  Last ACK received: <none>
  Next ACK deadline: <none>
  Reporting push interval: 0 (no reporting)
  Next ACK push check: <none>
  Next report push: <none>
  Last report push: <none>
  Last report file write: <none>

Trust Code Installed: <none>


Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#license ?
  accept     Accept all further License Agreements
  agent      Configure LIC_AGENT
  boot       license boot config commands
  call-home  license call-home config commands
  smart      Smart licensing
  udi        license udi

Router(config)#license boot ?
  level  Change dna license boot level

Router(config)#license boot level ?
  network-advantage  License Level Network-Advantage
  network-premier    License Level Network-Premier

Router(config)#license boot level network-advantage ?
  addon  select add-on to include DNA License
  <cr>   <cr>

Router(config)#license boot level network-advantage addon ?
  dna-advantage  Add-on option DNA-Advantage

Router(config)#license boot level network-advantage addon dna-advantage ?       
  <cr>  <cr>

Router(config)#license boot level network-advantage addon dna-advantage
% use 'write' command to make license boot config take effect on next boot

Router(config)#end
Router#write memory
Building configuration...

*Sep  4 07:53:59.669: %SYS-5-CONFIG_I: Configured from console by console[OK]
Router#
*Sep  4 07:54:05.133: %SYS-6-PRIVCFG_ENCRYPT_SUCCESS: Successfully encrypted private config file



I tried to transfer the new IOS-XE using the USB slot (beside the console port) but it wasn't detected and it due to a USB 2.0 bug. So I performed a TFTP file transfer instead.


Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#
*Sep  4 07:58:50.573: %LINK-3-UPDOWN: Interface GigabitEthernet0, changed state to up
*Sep  4 07:58:51.574: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0, changed state to up
Router(config)#interface GigabitEthernet0
Router(config-if)#ip address 192.168.1.1 255.255.255.0
Router(config-if)#end
*Sep  4 07:59:04.350: %SYS-5-CONFIG_I: Configured from console by console
                
Router#ping vrf Mgmt-intf 192.168.1.2
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.1.2, timeout is 2 seconds:
!!!!!
Success rate is 100 percent (5/5), round-trip min/avg/max = 1/1/1 ms


Router#copy tftp://192.168.1.2/c8000aes-universalk9.17.06.03a.SPA.bin bootflash:
Destination filename [c8000aes-universalk9.17.06.03a.SPA.bin]?
Accessing tftp://192.168.1.2/c8000aes-universalk9.17.06.03a.SPA.bin...
Loading c8000aes-universalk9.17.06.03a.SPA.bin from 192.168.1.2 (via GigabitEthernet0): !!!!!!!!

!!!!!!!!!!!!!!
[OK - 602955853 bytes]

602955853 bytes copied in 384.666 secs (1567479 bytes/sec)

Always verify the MD5 hash and compare it to the hash published in Cisco software download website.


Router#verify /md5 bootflash:/c8000aes-universalk9.17.06.03a.SPA.bin
.............................................................................

.................................................................................................................................Done!
verify /md5 (bootflash:/c8000aes-universalk9.17.06.03a.SPA.bin) = ca26d93cd9adb6d9c2a63f6b30d6290a

Configure the Primary and Secondary IOS-XE boot sequence, save config and issue a reload command for the new code to take effect.


Router#configure terminal
Enter configuration commands, one per line.  End with CNTL/Z.
Router(config)#no boot system
Router(config)#boot system flash bootflash:c8000aes-universalk9.17.06.03a.SPA.bin    
Router(config)#boot system flash bootflash:c8000aes-universalk9.17.05.01a.SPA.bin
Router(config)#end
Router#write memory
Building configuration...
[OK]
                                                   

Router#show run | include boot
boot-start-marker
boot system flash bootflash:c8000aes-universalk9.17.06.03a.SPA.bin
boot system flash bootflash:c8000aes-universalk9.17.05.01a.SPA.bin

boot-end-marker
license boot level network-advantage addon dna-advantage
diagnostic bootup level minimal

Router#reload
Proceed with reload? [confirm]

*Sep  4 09:56:03.325: %SYS-5-RELOAD: Reload requested by console. Reload Reason: Reload Command.

<OUTPUT TRUNCATED>


Router#show version
Cisco IOS XE Software, Version 17.06.03a
Cisco IOS Software [Bengaluru], c8000aes Software (X86_64_LINUX_IOSD-UNIVERSALK9-M), Version 17.6.3a, RELEASE SOFTWARE (fc1)

Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2022 by Cisco Systems, Inc.
Compiled Fri 08-Apr-22 04:50 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2022 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.  For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: 17.4(1r)

Router uptime is 2 minutes
Uptime for this control processor is 3 minutes
System returned to ROM by Reload Command
System image file is "bootflash:c8000aes-universalk9.17.06.03a.SPA.bin"
Last reload reason: Reload Command


This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

License Type: Perpetual
License Level: network-advantage
Next reload license Level: network-advantage
License Type: Subscription
License Level: dna-advantage
Next reload license Level: dna-advantage

The current crypto throughput level is 1000000 kbps

Smart Licensing Status: Registration Not Applicable/Not Applicable

cisco C8500L-8S4X (1RU) processor with 670322K/6147K bytes of memory.
Processor board ID FLX26041234
Router operating mode: Autonomous
8 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
32768K bytes of non-volatile configuration memory.
15728640K bytes of physical memory.
15151103K bytes of eUSB flash at bootflash:.
15269887K bytes of USB hard disk at harddisk:.

Configuration register is 0x2102

Friday, October 6, 2023

Cisco NCS 540 IOS-XR Software Upgrade

The NCS 540 IOS-XR software (.tar) is usually around 2 GB so leave the file transfer running for several minutes. I usually perform this during night time to avoid bandwidth congestion or disruption.

Transfer the new IOS-XR using FTP, TFTP or SCP. You can view the .tar file using dir harddisk: command.

RP/0/RP0/CPU0:NCS540#copy ftp://ftp:ftp123@172.16.5.3 harddisk: vrf Mgmt-intf

Wed Sep 27 14:44:03.768 UTC

Source filename [/ftp:]?NCS540-iosxr-7.4.2.tar

Destination filename [/harddisk:/NCS540-iosxr-7.4.2.tar]?  <PRESS ENTER>

Accessing ftp://ftpuser:*@172.16.5.3;Mgmt-intf/NCS540-iosxr-7.4.2.tar

CCCCCCCCCCCCCCC

 

<OUTPUT TRUNCATED>


CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC

1770946560 bytes copied in  21784 sec (    81295)bytes/sec

 

Copy operation success


RP/0/RP0/CPU0:NCS540#dir harddisk:

Fri Sep 29 08:33:50.778 UTC

 

Directory of harddisk:

 522241 drwxr-xr-x. 2       4096 Sep 29 05:49 .sppdc

1305602 drw-rw-r--. 2       4096 Jul 12 18:02 rdsfs_log

     14 -rw-r--r--. 1       7714 Sep 27 05:51 bcm_console_log_output.txt

 261121 drwxr-xr-x. 2       4096 Jul 12 17:38 nvram

1175041 drwxr-xr-x. 3       4096 Jul 12 17:40 ztp

     11 drwx------. 2      16384 Jul 12 17:31 lost+found

 391681 drwxr-xr-x. 3       4096 Jul 12 17:40 mirror

1044481 drwxr-xr-x. 2       4096 Jul 12 17:40 ipodwdm_log

     13 -rw-r--r--. 1          0 Jul 12 17:38 zl30363_trace_file.log

 913923 drwxr-xr-x. 5       4096 Sep 27 06:50 cisco_support

     12 -rw-r--r--. 1      65770 Jul 12 18:02 nvgen_bkup.log

     15 -rw-r--r--. 1        182 Sep 29 07:55 feature_list

 783361 drwxr-xr-x. 2       4096 Jul 12 17:38 shutdown

1305601 drwxr-xr-x. 2       4096 Jul 12 17:38 tftpboot

 522242 drwxr-xr-x. 3       4096 Jul 12 17:42 pam

1044482 drwxr-xr-x. 2       4096 Jul 12 17:42 showtech

 913921 drwxr-xr-x. 2       4096 Jul 12 17:40 .sppdc_new

 130561 drwxr-xr-x. 6       4096 Jul 12 17:40 xr

     16 -rwxr--r--. 1 1770946560 Sep 27 20:47 NCS540-iosxr-7.4.2.tar

 261122 drwxr-xr-x. 2       4096 Jul 12 17:42 dumper

 783362 drwx------. 3       4096 Sep 27 05:50 ima

 

23893884 kbytes total (20877188 kbytes free)


Use the install add source /harddisk:/ <.tar> privilege exec command to extract and install the RPM packages. Note there's a space before .tar file and the operation id is usually 4.

RP/0/RP0/CPU0::NCS540#install add source /harddisk:/ NCS540-iosxr-7.4.2.tar

Sat Sep 30 03:09:13.249 UTC

Sep 30 03:09:15 Install operation 4 started by root:

 install add source /harddisk:/ NCS540-iosxr-7.4.2.tar nooptim

Sep 30 03:09:21 Install operation will continue in the background

 

 

You can view the installation progress using the show install request command.


RP/0/RP0/CPU0::NCS540#show install request

Sat Sep 30 03:09:55.073 UTC

User root, Op Id 4

install add 

NCS540-iosxr-7.4.2.tar

 

The install add operation 4 is 60% complete

Add validate request sent to sysadmin

 

 

RP/0/RP0/CPU0:NCS540#Sep 30 03:12:19 Install operation 4 finished successfully

 

 

It took around 2 mins for the RPM package installation to finish. It's recommended to monitor the upgrade process via the console access.

 

 

RP/0/RP0/CPU0::NCS540#show install request                                

Sat Sep 30 03:12:34.287 UTC

No install operation in progress

 

 

Use the install activate id <ID> privilege exec command to activate the RPM packages. Type yes to proceed.

 

RP/0/RP0/CPU0::NCS540#install activate ?

  WORD             package

  id               The id of the install add operation containing package(s) to activate(cisco-support)

  issu             ISSU operation(cisco-support)

  nooptim          Execute install operation in traditional mode(cisco-support)

  noprompt         do not prompt user.continue assuming default yes(cisco-support)

  process-restart  process-restart(cisco-support)

  reload           reload(cisco-support)

  synchronous      Execute install operation in synchronous mode(cisco-support)

  <cr>            

RP/0/RP0/CPU0::NCS540#install activate id ?

  <1-4294967295>  Activate the package(s) specified in this install id

RP/0/RP0/CPU0::NCS540#install activate id 4

Sat Sep 30 03:13:48.124 UTC

Sep 30 03:13:50 Install operation 5 started by root:

  install activate id 4

Sep 30 03:13:50 Package list:

Sep 30 03:13:50     ncs540-isis-1.0.0.0-r742.x86_64

Sep 30 03:13:50     ncs540-mpls-te-rsvp-1.0.0.0-r742.x86_64

Sep 30 03:13:50     ncs540-mpls-1.0.0.0-r742.x86_64

Sep 30 03:13:50     ncs540-ospf-2.0.0.0-r742.x86_64

Sep 30 03:13:50     ncs540-mini-x-7.4.2

Sep 30 03:13:50     ncs540-mcast-1.0.0.0-r742.x86_64

Sep 30 03:13:50     ncs540-eigrp-1.0.0.0-r742.x86_64

Sep 30 03:13:50     ncs540-mgbl-1.0.0.0-r742.x86_64

Sep 30 03:13:50     ncs540-li-1.0.0.0-r742.x86_64

 

 

This install operation will reload the system, continue?

 [yes/no]:[yes] yes

Sep 30 03:15:03 Install operation will continue in the background

 

 

RP/0/RP0/CPU0:NCS540#show install request

Sat Sep 30 03:15:29.157 UTC

User root, Op Id 5

install activate 

ncs540-isis-1.0.0.0-r742.x86_64

ncs540-mpls-te-rsvp-1.0.0.0-r742.x86_64

ncs540-mpls-1.0.0.0-r742.x86_64

ncs540-ospf-2.0.0.0-r742.x86_64

ncs540-mini-x-7.4.2

ncs540-mcast-1.0.0.0-r742.x86_64

ncs540-eigrp-1.0.0.0-r742.x86_64

ncs540-mgbl-1.0.0.0-r742.x86_64

ncs540-li-1.0.0.0-r742.x86_64

 

The install prepare operation 5 is 40% complete

Processing the ISO

 

 

RP/0/RP0/CPU0::NCS540#show install request

Sat Sep 30 03:18:16.789 UTC

User root, Op Id 5

install activate 

ncs540-isis-1.0.0.0-r742.x86_64

ncs540-mpls-te-rsvp-1.0.0.0-r742.x86_64

ncs540-mpls-1.0.0.0-r742.x86_64

ncs540-ospf-2.0.0.0-r742.x86_64

ncs540-mini-x-7.4.2

ncs540-mcast-1.0.0.0-r742.x86_64

ncs540-eigrp-1.0.0.0-r742.x86_64

ncs540-mgbl-1.0.0.0-r742.x86_64

ncs540-li-1.0.0.0-r742.x86_64

 

The install prepare operation 5 is 40% complete

 

 install prepare operation 5 is in progress

Host preparation is in progress

 

Node(s)                 State                   %Completed              Action

--------------------------------------------------------------------------------

Node 0/RP0      :       In Progress                30%                  Host prepare in progress

 

 

RP/0/RP0/CPU0::NCS540#RP/0/RP0/CPU0:Sep 30 03:29:06.098 UTC: fpd-serv[302]: %PKT_INFRA-FM-3-FAULT_MAJOR : ALARM_MAJOR :FPD-NEED-UPGRADE :DECLARE :0/RP0: 

 

 

RP/0/RP0/CPU0::NCS540#show install request

Sat Sep 30 03:29:26.665 UTC

User root, Op Id 5

install activate 

ncs540-isis-1.0.0.0-r742.x86_64

ncs540-mpls-te-rsvp-1.0.0.0-r742.x86_64

ncs540-mpls-1.0.0.0-r742.x86_64

ncs540-ospf-2.0.0.0-r742.x86_64

ncs540-mini-x-7.4.2

ncs540-mcast-1.0.0.0-r742.x86_64

ncs540-eigrp-1.0.0.0-r742.x86_64

ncs540-mgbl-1.0.0.0-r742.x86_64

ncs540-li-1.0.0.0-r742.x86_64

 

The install activate operation 5 is 5% complete

 

 install activate operation 5 is in progress

Host preparation is complete

Sysadmin preparation is complete

XR preparation is complete

Host activation is complete

Sysadmin activation is in progress

 

 

Node(s)                 State                   %Completed              Action

--------------------------------------------------------------------------------

Node 0/RP0      :       Completed                  100%                 Sysadmin activation is complete

 

 

RP/0/RP0/CPU0::NCS540#show install request

Sat Sep 30 03:30:45.730 UTC

User root, Op Id 5

install activate 

ncs540-isis-1.0.0.0-r742.x86_64

ncs540-mpls-te-rsvp-1.0.0.0-r742.x86_64

ncs540-mpls-1.0.0.0-r742.x86_64

ncs540-ospf-2.0.0.0-r742.x86_64

ncs540-mini-x-7.4.2

ncs540-mcast-1.0.0.0-r742.x86_64

ncs540-eigrp-1.0.0.0-r742.x86_64

ncs540-mgbl-1.0.0.0-r742.x86_64

ncs540-li-1.0.0.0-r742.x86_64

 

The install activate operation 5 is 20% complete

Updating XR master software profile

 

 

RP/0/RP0/CPU0::NCS540#RP/0/RP0/CPU0:Sep 30 03:31:05.728 UTC: sdr_instmgr[1293]: %INSTALL-INSTMGR-2-OPERATION_SUCCESS : Install operation 5 finished successfully

RP/0/RP0/CPU0:Sep 30 03:31:06.125 UTC: sdr_instmgr[1293]: %INSTALL-INSTMGR-2-SYSTEM_RELOAD_INFO : The whole system will be reloaded to complete install operation 5

 


It took around 20 mins for the RPM install packages to finish. The NCS 540 router will automatically reload afterwards.

 

RP/0/RP0/CPU0:NCS540#LC/0/0/CPU0:Sep 30 03:31:58.195 UTC: ifmgr[332]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet0/0/0/0, changed state to Down

LC/0/0/CPU0:Sep 30 03:31:58.196 UTC: ifmgr[332]: %PKT_INFRA-LINK-3-UPDOWN : Interface GigabitEthernet0/0/0/21, changed state to Down

LC/0/0/CPU0:Sep 30 03:31:58.199 UTC: fia_driver[243]: %PLATFORM-DPA-2-RX_FAULT : Interface GigabitEthernet0/0/0/0, Detected Local Fault

LC/0/0/CPU0:Sep 30 03:31:58.203 UTC: fia_driver[243]: %PLATFORM-DPA-2-RX_FAULT : Interface GigabitEthernet0/0/0/21, Detected Local Fault

0/RP0/ADMIN0:Sep 30 03:32:04.663 UTC: shelf_mgr[2604]: %INFRA-SHELF_MGR-4-CARD_RELOAD : Reloading card 0/RP0 

0/RP0/ADMIN0:Sep 30 03:32:10.520 UTC: vm_manager[2637]: %INFRA-VM_MANAGER-4-INFO : Info: vm_manager brought down VM default-sdr--2 

 

Preparing system for backup. This may take a few minutes especially for large configurations.

        Status report: node0_RP0_CPU0: BACKUP INPROGRESS

        Status report: node0_RP0_CPU0: BACKUP HAS COMPLETED SUCCESSFULLY

[Done]

Stoping cgroup-init

Stopping OpenBSD Secure Shell server: sshdinitctl: Unknown instance:

Stopping system message bus: dbus.

Stopping random number generator daemon.

Stopping system log daemon...0

Stopping kernel log daemon...0

Stopping internet superserver: xinetd.

Stopping crond: OK

Stopping rpcbind daemon...

done.

Stopping S.M.A.R.T. daemon: smartd.

Stopping Lighttpd Web Server: stopped /usr/sbin/lighttpd (pid 3963)

lighttpd.

Stopping libvirtd daemon: [  OK  ]

Deconfiguring network interfaces... done.

Sending all processes the KILL signal...

Unmounting remote filesystems...

Deactivating swap...

Unmounting local filesystems...

mount: can't find /mnt/ram in /etc/fstab

Rebooting... [251250.066254] obfl_rb_notify_cb: reboot notifier called

[251250.072019]  writing reset reason 1, (null)

[251250.856170]  Requesting IOFPGA for system wide cold reset operation

[251251.606113] Succesfully wrote mtdoops at 163840 size 32768

[251251.612640] pstore: Successfully logged oops info. Size 32740

 

<OUTPUT TRUNCATED>

 

 

Connecting to 'default-sdr--1' console

ÿûÿûÿûÿýbootlogd: ioctl(/dev/pts/2, TIOCCONS): Device or resource busy

Running postinst /etc/rpm-postinsts/100-dnsmasq...

Running postinst /etc/rpm-postinsts/101-nfs-utils-client...

Running postinst /etc/rpm-postinsts/102-nfs-utils...

update-rc.d: /etc/init.d/run-postinsts exists during rc.d purge (continuing)

 Removing any system startup links for run-postinsts ...

  /etc/rcS.d/S99run-postinsts

Configuring network interfaces... done.

Starting system message bus: dbus.

Starting OpenBSD Secure Shell server: sshd

  generating ssh RSA key...

  generating ssh ECDSA key...

  generating ssh DSA key...

  generating ssh ED25519 key...

sshd start/running, process 2380

Starting rpcbind daemon...done.

Starting random number generator daemon.

Starting system log daemon...0

Starting kernel log daemon...0

tftpd-hpa disabled in /etc/default/tftpd-hpa

Starting internet superserver: xinetd.

Libvirt not initialized for container instance

Starting crond: OK

SIOCADDRT: File exists

osSignalTask: started

 

 

ios con0/RP0/CPU0 is now available

 

 

Press RETURN to get started.

 

RP/0/RP0/CPU0:Sep 30 03:36:02.641 UTC: fpd-serv[305]: %PKT_INFRA-FM-3-FAULT_MAJOR : ALARM_MAJOR :FPD-NEED-UPGRADE :DECLARE :0/RP0: 

0/RP0/ADMIN0:Sep 30 03:36:17.167 UTC: vm_manager[3160]: %INFRA-VM_MANAGER-4-INFO : Info: vm_manager started VM default-sdr--2 

 

 

This product contains cryptographic features and is subject to United

States and local country laws governing import, export, transfer and

use. Delivery of Cisco cryptographic products does not imply third-party

authority to import, export, distribute or use encryption. Importers,

exporters, distributors and users are responsible for compliance with

U.S. and local country laws. By using this product you agree to comply

with applicable laws and regulations. If you are unable to comply with

U.S. and local laws, return this product immediately.

 

A summary of U.S. laws governing Cisco cryptographic products may be

found at:

http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

 

If you require further assistance please contact us by sending email to

export@cisco.com.

 

 

RP/0/RP0/CPU0:Sep 30 03:37:14.957 UTC: ifmgr[139]: %PKT_INFRA-LINK-3-UPDOWN : Interface MgmtEth0/RP0/CPU0/0, changed state to Down

RP/0/RP0/CPU0:Sep 30 03:37:14.976 UTC: ifmgr[139]: %PKT_INFRA-LINK-3-UPDOWN : Interface MgmtEth0/RP0/CPU0/0, changed state to Up

RP/0/RP0/CPU0:Sep 30 03:37:15.037 UTC: ifmgr[139]: %PKT_INFRA-LINK-3-UPDOWN : Interface MgmtEth0/RP0/CPU0/0, changed state to Down

RP/0/RP0/CPU0:Sep 30 03:37:18.644 UTC: ifmgr[139]: %PKT_INFRA-LINK-3-UPDOWN : Interface MgmtEth0/RP0/CPU0/0, changed state to Up

 

 

It took around 6 mins for the NCS 540 to boot up using the new IOS-XR code.

 

 

RP/0/RP0/CPU0::NCS540#show version

Sat Sep 30 03:38:35.240 UTC

Cisco IOS XR Software, Version 7.4.2

Copyright (c) 2013-2022 by Cisco Systems, Inc.

 

Build Information:

 Built By     : ingunawa

 Built On     : Wed Feb 16 05:24:50 PST 2022

 Built Host   : iox-lnx-025

 Workspace    : /auto/srcarchive15/prod/7.4.2/ncs540/ws

 Version      : 7.4.2

 Location     : /opt/cisco/XR/packages/

 Label        : 7.4.2

 

cisco NCS-540 () processor

System uptime is 3 minutes

 

 

RP/0/RP0/CPU0::NCS540#show install active

Sat Sep 30 03:39:03.701 UTC

Label : 7.4.2

 

Node 0/RP0/CPU0 [RP]

  Boot Partition: xr_lv7

  Active Packages: 9

        ncs540-xr-7.4.2 version=7.4.2 [Boot image]

        ncs540-eigrp-1.0.0.0-r742

        ncs540-isis-1.0.0.0-r742

        ncs540-li-1.0.0.0-r742

        ncs540-mgbl-1.0.0.0-r742

        ncs540-mpls-1.0.0.0-r742

        ncs540-mpls-te-rsvp-1.0.0.0-r742

        ncs540-ospf-2.0.0.0-r742

        ncs540-mcast-1.0.0.0-r742

 

Node 0/0/CPU0 [LC]

  Boot Partition: xr_lcp_lv8

  Active Packages: 9

        ncs540-xr-7.4.2 version=7.4.2 [Boot image]

        ncs540-eigrp-1.0.0.0-r742

        ncs540-isis-1.0.0.0-r742

        ncs540-li-1.0.0.0-r742

        ncs540-mgbl-1.0.0.0-r742

        ncs540-mpls-1.0.0.0-r742

        ncs540-mpls-te-rsvp-1.0.0.0-r742

        ncs540-ospf-2.0.0.0-r742

        ncs540-mcast-1.0.0.0-r742

 

 

The final step is to issue an install commit command.

 

RP/0/RP0/CPU0::NCS540#install commit

Sat Sep 30 03:39:31.523 UTC

2023-09-30 03:39:33 Install operation 6 started by root:

  install commit

2023-09-30 03:39:34 Install operation will continue in the background

RP/0/RP0/CPU0:NCS540#2023-09-30 03:39:46 Install operation 6 finished successfully

RP/0/RP0/CPU0:Sep 30 03:39:46.897 UTC: sdr_instmgr[1296]: %INSTALL-INSTMGR-2-OPERATION_SUCCESS : Install operation 6 finished successfully