Thursday, May 31, 2018

Cisco 3850 USB

Cisco 3850 will not work with USB DRIVE that are formatted NTFS. Will only work with FAT.

Thursday, April 12, 2018

Cisco RTMT can not connect to some subscribers with the following error.


Unified reported show the following
Restarted A Cisco DB service on all server in the cluster


utils service restart A Cisco DB



Friday, April 6, 2018

SIP TRUNK ISSUE

Experienced a very strange issue on SIP trunk the other day. when an external call come in via SIP trunk, user answer the call and then transfer the call to another internal user, if that other user doesn't pick up the phone the call forward no answer to Unity voicemail system and external caller hears nothing. spent hours troubleshooting with Cisco and they couldn't find the issue. Tried a lot of setting change on CUCM and CUBE and finally found a solution.

under voice service voip > sip I had to do "no session refresh" and that fixed the issue.

Tuesday, April 3, 2018

Cisco 3850 downgrade from 16.6 to 3.7.5E


TEST-3850#request platform software package install switch all file flash:cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.bin new
--- Starting install local lock acquisition on switch 1 ---
Finished install local lock acquisition on switch 1

Expanding image file: flash:cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.bin
[1]: Expanding file
[1]: Finished expanding all-in-one software package in switch 1
SUCCESS: Finished expanding all-in-one software package.
[1]: Performing install
  SUCCESS: install finished
[1]: install package(s) on switch 1
--- Starting list of software package changes ---
Old files list:
  Removed cat3k_caa-guestshell.16.06.02.SPA.pkg
  Removed cat3k_caa-rpbase.16.06.02.SPA.pkg
  Removed cat3k_caa-rpcore.16.06.02.SPA.pkg
  Removed cat3k_caa-srdriver.16.06.02.SPA.pkg
  Removed cat3k_caa-webui.16.06.02.SPA.pkg
New files list:
  Added cat3k_caa-base.SPA.03.07.05E.pkg
  Added cat3k_caa-drivers.SPA.03.07.05E.pkg
  Added cat3k_caa-infra.SPA.03.07.05E.pkg
  Added cat3k_caa-iosd-universalk9.SPA.152-3.E5.pkg
  Added cat3k_caa-platform.SPA.03.07.05E.pkg
  Added cat3k_caa-wcm.SPA.10.3.150.0.pkg
Finished list of software package changes
SUCCESS: Software provisioned.  New software will load on reboot.
[1]: Finished install successful on switch 1
Checking status of install on [1]
[1]: Finished install in switch 1
SUCCESS: Finished install: Success on [1]
TEST-3850#
TEST-3850#
TEST-3850#
TEST-3850#sh ver
Cisco IOS XE Software, Version 16.06.02
Cisco IOS Software [Everest], Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 16.6.2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Wed 01-Nov-17 04:27 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2017 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.  For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: IOS-XE ROMMON
BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 4.68, RELEASE SOFTWARE (P)

TEST-3850 uptime is 1 hour, 24 minutes
Uptime for this control processor is 1 hour, 28 minutes
System returned to ROM by Power Failure
System image file is "flash:packages.conf"
Last reload reason: Power Failure



This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


Technology Package License Information:

-----------------------------------------------------------------
Technology-package                   Technology-package
Current             Type             Next reboot
------------------------------------------------------------------
lanbasek9           Permanent        lanbasek9

cisco WS-C3850-48P (MIPS) processor (revision X0) with 853402K/6147K bytes of memory.
Processor board ID FCW1943D1AG
1 Virtual Ethernet interface
52 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of WebUI ODM Files at webui:.

Base Ethernet MAC Address          : 18:8b:45:4f:c8:00
Motherboard Assembly Number        : 73-15800-07
Motherboard Serial Number          : FOC19432LAD
Model Revision Number              : X0
Motherboard Revision Number        : B0
Model Number                       : WS-C3850-48P
System Serial Number               : FCW1943D1AG


Switch Ports Model              SW Version        SW Image              Mode
------ ----- -----              ----------        ----------            ----
*    1 56    WS-C3850-48P       16.6.2            CAT3K_CAA-UNIVERSALK9 INSTALL


Configuration register is 0x102

TEST-3850#dir
Directory of flash:/

 7747  -rw-          2097152   Apr 3 2018 02:54:46 -07:00  nvram_config
 7748  -rw-             1096   Apr 3 2018 01:33:09 -07:00  vlan.dat
 7746  -rw-            35460  Dec 29 2015 09:51:12 -08:00  startup-config
 7749  -rw-              298  Mar 19 2018 03:29:03 -07:00  eem_script.py
 7751  drwx             4096   Apr 3 2018 01:29:10 -07:00  .installer
30983  -rw-         16181884  Jan 19 2018 03:04:22 -08:00  cat3k_caa-webui.16.06.02.SPA.pkg
54210  drwx             4096   Oct 4 2016 08:11:27 -07:00  vman_fdb
 7760  drwx             4096  Mar 19 2018 05:18:27 -07:00  onep
 7757  -rw-               76   Apr 3 2018 01:29:55 -07:00  boothelper.log
 7750  -rw-                0   Apr 3 2018 02:56:38 -07:00  .onreboot
 7772  -rw-         82000420   Apr 3 2018 02:55:04 -07:00  cat3k_caa-base.SPA.03.07.05E.pkg
 7770  -rw-             1236   Apr 3 2018 02:56:20 -07:00  packages.conf
 7765  -rw-          5663420   Apr 3 2018 02:55:01 -07:00  cat3k_caa-drivers.SPA.03.07.05E.pkg
30979  -rw-         19167872  Jan 19 2018 03:04:06 -08:00  cat3k_caa-guestshell.16.06.02.SPA.pkg
30980  -rw-         27906419  Jan 19 2018 03:04:06 -08:00  cat3k_caa-rpbase.16.06.02.SPA.pkg
30981  -rw-        331268728  Jan 19 2018 03:04:16 -08:00  cat3k_caa-rpcore.16.06.02.SPA.pkg
30982  -rw-         15323776  Jan 19 2018 03:04:22 -08:00  cat3k_caa-srdriver.16.06.02.SPA.pkg
 7752  -rw-              222   Apr 3 2018 01:29:35 -07:00  bootloader_evt_handle.log
 7753  drwx             4096  Jan 19 2018 03:18:26 -08:00  core
 7754  drwx             4096  Jan 19 2018 03:10:47 -08:00  .prst_sync
15493  drwx             4096  Jan 19 2018 03:10:50 -08:00  .rollback_timer
 7769  -rw-         36965384   Apr 3 2018 02:55:03 -07:00  cat3k_caa-infra.SPA.03.07.05E.pkg
 7767  -rw-         46449984   Apr 3 2018 02:55:03 -07:00  cat3k_caa-iosd-universalk9.SPA.152-3.E5.pkg
38723  drwx             4096   Oct 4 2016 08:11:27 -07:00  virtual-instance
61954  drwx             4096   Apr 3 2018 01:29:52 -07:00  dc_profile_dir
61956  drwx             4096   Oct 4 2016 08:12:56 -07:00  wnweb_store
15494  drwx             4096  Jan 19 2018 03:22:46 -08:00  gs_script
 7756  -rw-            98869   Apr 3 2018 01:30:13 -07:00  memleak.tcl
 7759  -rw-          2097152   Apr 3 2018 02:54:46 -07:00  nvram_config_bkup
 7768  -rw-         28959628   Apr 3 2018 02:55:03 -07:00  cat3k_caa-platform.SPA.03.07.05E.pkg
 7771  -rw-             1236   Apr 3 2018 02:55:51 -07:00  cat3k_caa-universalk9.SPA.03.07.05.E.152-3.E5.conf
 7766  -rw-        128574272   Apr 3 2018 02:55:02 -07:00  cat3k_caa-wcm.SPA.10.3.150.0.pkg
 7764  -rw-             4754   Apr 3 2018 02:56:20 -07:00  packages.conf.00-

1621966848 bytes total (718438400 bytes free)

TEST-3850#reload
          Chassis 1 reloading, reason - Reload command
                                                      Apr  3 02:58:04.867 FP0/0: %PMAN-5-EXITACTI                                  ON: Process manager is exiting: reload fp action requested
Apr  3 02:58:08.779 RP0/0: %PMAN-5-EXITACTION: Process manager is exiting: process exi
octeon_wdt: WDT device closed unexpectedly.  WDT will not stop!
reboot: Restarting system



Booting...
Interface GE 0 link down***ERROR: PHY link is down
The "IP_ADDR" environment variable is not set.

Getting rest of image
Reading full image into memory...Check base package header ...: done = 16384
Getting rest of image
Reading full image into memory....done
Reading full base package into memory...: done = 82000420
Bundle Image
--------------------------------------
Kernel Address    : 0x5377734c
Kernel Size       : 0x3fb255/4174421
Initramfs Address : 0x53b725a4
Initramfs Size    : 0xd47c7e/13925502
Compression Format: .mzip

Bootable image at @ ram:0x5377734c
Bootable image segment 0 address range [0x81100000, 0x820b0000] is in range [0x80180000, 0x90000000].
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system: 623
Loading Linux kernel with entry point 0x816734a0 ...
Bootloader: Done loading app on core_mask: 0xf

### Launching Linux Kernel (flags = 0x5)

All packages are Digitally Signed
Starting System Services
devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=4,mode=600,ptmxmode=000 0 0


FIPS(NGWC): Flash Key Check : Begin
FIPS(NGWC): Flash Key Check : End, Not Found, FIPS Mode Not Enabled


Front-end Microcode IMG MGR: found 4 microcode images for 1 device.
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_0
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_1
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_2
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_3

Front-end Microcode IMG MGR: Preparing to program device microcode...
Front-end Microcode IMG MGR: Preparing to program device[0]...594412 bytes.
Front-end Microcode IMG MGR: Programming device 0...rwRrrrrrrw..0%...............................................................................................................10%..............................................................................................................20%..............................................................................................................30%..............................................................................................................40%..............................................................................................................50%...............................................................................................................60%..............................................................................................................70%..............................................................................................................80%..............................................................................................................90%..............................................................................................................100%
Front-end Microcode IMG MGR: Preparing to program device[0]...393110 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%.........................................................................10%........................................................................20%..........................................................................30%........................................................................40%........................................................................50%..........................................................................60%.........................................................................70%..........................................................................80%........................................................................90%........................................................................100%
Front-end Microcode IMG MGR: Preparing to program device[0]...25166 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%....10%....20%......30%...40%......50%....60%......70%...80%......90%....100%w

Front-end M▒


Booting...
Interface GE 0 link down***ERROR: PHY link is down
The "IP_ADDR" environment variable is not set.

Getting rest of image
Reading full image into memory...Check base package header ...: done = 16384
Getting rest of image
Reading full image into memory....done
Reading full base package into memory...: done = 82000420
Bundle Image
--------------------------------------
Kernel Address    : 0x5377734c
Kernel Size       : 0x3fb255/4174421
Initramfs Address : 0x53b725a4
Initramfs Size    : 0xd47c7e/13925502
Compression Format: .mzip

Bootable image at @ ram:0x5377734c
Bootable image segment 0 address range [0x81100000, 0x820b0000] is in range [0x80180000, 0x90000000].
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@boot_system: 623
Loading Linux kernel with entry point 0x816734a0 ...
Bootloader: Done loading app on core_mask: 0xf

### Launching Linux Kernel (flags = 0x5)

All packages are Digitally Signed
Starting System Services
devpts /dev/pts devpts rw,nosuid,noexec,relatime,gid=4,mode=600,ptmxmode=000 0 0


FIPS(NGWC): Flash Key Check : Begin
FIPS(NGWC): Flash Key Check : End, Not Found, FIPS Mode Not Enabled


              Restricted Rights Legend

Use, duplication, or disclosure by the Government is
subject to restrictions as set forth in subparagraph
(c) of the Commercial Computer Software - Restricted
Rights clause at FAR sec. 52.227-19 and subparagraph
(c) (1) (ii) of the Rights in Technical Data and Computer
Software clause at DFARS sec. 252.227-7013.

           cisco Systems, Inc.
           170 West Tasman Drive
           San Jose, California 95134-1706



Cisco IOS Software, IOS-XE Software, Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 03.07.05E RELEASE SOFTWARE (fc1)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Fri 10-Feb-17 07:59 by prod_rel_team

Cisco IOS-XE software, Copyright (c) 2005-2015 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.
(http://www.gnu.org/licenses/gpl-2.0.html) For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.





FIPS: Flash Key Check : Begin
FIPS: Flash Key Check : End, Not Found, FIPS Mode Not Enabled

This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.

cisco WS-C3850-48P (MIPS) processor with 4194304K bytes of physical memory.
Processor board ID FCW1943D1AG
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
0K bytes of Dummy USB Flash at usbflash0:.
0K bytes of  at webui:.

Base Ethernet MAC Address          : 18:8b:45:4f:c8:00
Motherboard Assembly Number        : 73-15800-07
Motherboard Serial Number          : FOC19432LAD
Model Revision Number              : X0
Motherboard Revision Number        : B0
Model Number                       : WS-C3850-48P
System Serial Number               : FCW1943D1AG


no platform punt-keepalive disable-kernel-core
     ^
% Invalid input detected at '^' marker.

hw-switch switch 1 logging onboard message
^
% Invalid input detected at '^' marker.

iox
 ^
% Invalid input detected at '^' marker.

control-plane
^
% Invalid input detected at '^' marker.

 service-policy input system-cpp-policy
 ^
% Invalid input detected at '^' marker.



Press RETURN to get started!


Cisco 8865 calls out to SIP trunk will be disconnected when put on hold on firmware sip8845_65.12-0-1-11 but not on firware sip8845_65.11-5-1-18. After working with Cisco it was determined that video was the cause of the issue with call disconnect.


Reason: Q.850;cause=47
Server: Cisco-SIPGateway/IOS-15.5.3.S4b
Session-Expires:  1800;refresher=uac
Require: timer
Supported: timer
Content-Type: application/sdp
Content-Length: 266

v=0
o=BroadWorks 623081374 2 IN IP4 67.14.90.83
s=-
c=IN IP4 65.156.9.178
t=0 0
m=audio 18748 RTP/AVP 18 0 101
a=rtpmap:18 G729/8000
a=rtpmap:0 PCMU/8000
a=rtpmap:101 telephone-event/8000
a=fmtp:101 0-15
a=sendrecv
a=bsoft: 1 image udptl t38
a=ptime:20


the workaround is to not send video capabilities over SIP trunk

voice class sip-profiles 100
request INVITE sdp-header Video-Attribute remove
request INVITE sdp-header Video-Media modify "m=video(.*)" ""
request INVITE sdp-header Video-Bandwidth-Info remove

Tuesday, March 27, 2018

SETTING UP IOS ROUTER AS DNS SERVER FOR CUCM AND CUC


ip dns server
ip dns primary test.com soa corp.test.com test@test.com
!
ip host CUCM1.corp.test.com 10.x.x.x
ip host CUC1.corp.test.com 10.x.x.x



Thursday, March 22, 2018

SIP SERVER GROUP FOR DIAL-PEERS


voice class server-group 1
 ipv4 10.5.6.12 preference 1
 ipv4 10.20.6.14 preference 2
 ipv4 10.5.6.11 preference 3
!
voice class server-group 2
 ipv4 10.20.6.14 preference 1
 ipv4 10.5.6.12 preference 2
 ipv4 10.5.6.11 preference 3
!
voice class sip-options-keepalive 1


dial-peer voice xxxxxx voip
 translation-profile outgoing CTL-OC2-TEST-DID
 destination-pattern xxxxxxx.
 session protocol sipv2
 session transport udp
 session server-group 1
 voice-class codec 2911
 voice-class sip options-keepalive profile 1
 dtmf-relay rtp-nte sip-kpml
 no vad

*******WHEN THE SERVER GROUP IS CHANGED IT WON'T CHANGE OPTIONS PROFILE'S SERVER ORDER, NEED TO REMOVE THE OPTIONS COMMAND FIRST AND THEN REENTER IT AGAIN********

CAOC2C01R02#sh voice class server-group
Voice class server-group: 1
 AdminStatus: Up                 OperStatus: Up
 Hunt-Scheme: preference         Last returned server:
 Description:
 Total server entries: 3

 Pref   Type   IP Address                               IP Port
 ----   ----   ----------                               -------
 1      ipv4   10.5.6.12
 2      ipv4   10.20.6.14
 3      ipv4   10.5.6.11

-------------------------------------
Voice class server-group: 2
 AdminStatus: Up                 OperStatus: Up
 Hunt-Scheme: preference         Last returned server:
 Description:
 Total server entries: 3

 Pref   Type   IP Address                               IP Port
 ----   ----   ----------                               -------
 1      ipv4   10.20.6.14
 2      ipv4   10.5.6.12
 3      ipv4   10.5.6.11

-------------------------------------

CAOC2C01R02#sh voice class sip
CAOC2C01R02#sh voice class sip-options-keepalive
Voice class sip-options-keepalive: 1             AdminStat: Up
 Description: MONITOR SERVER-GROUP 1
 Transport: system               Sip Profiles: 0
 Interval(seconds) Up: 60                Down: 30
 Retry: 5

  Peer Tag      Server Group    OOD SessID      OOD Stat        IfIndex
  --------      ------------    ----------      --------        -------
  949344        1                               Active          18

  Server Group: 1                OOD Stat: Active
   OOD SessID   OOD Stat
   ----------   --------
   23           Active
   24           Active
   25           Active

 OOD SessID: 23                  OOD Stat: Active
  Target: ipv4:10.5.6.12
  Transport: system              Sip Profiles: 0

 OOD SessID: 24                  OOD Stat: Active
  Target: ipv4:10.20.6.14
  Transport: system              Sip Profiles: 0

 OOD SessID: 25                  OOD Stat: Active
  Target: ipv4:10.5.6.11
  Transport: system              Sip Profiles: 0

------------------------------------------------------

Monday, March 19, 2018

IOS-XE GUESTSHELL PYTHON SAMPLE


TEST-3850#sh run | s event
event manager applet interface_shutdown authorization bypass
 event syslog pattern "Interface Loopback55, changed state to administratively down"
 action 0.0 cli command "en"
 action 1.0 cli command "guestshell run python /flash/eem_script.py loopback55"
TEST-3850#more eem_script.py
import os
import sys,getopt
from datetime import datetime
import time
from cli import cli,clip

intf = sys.argv[1:]
intf = ''.join(intf[0])

if intf == 'loopback55':
    cmd = "conf t; int loop55; no shut "
    cli(cmd)

else:
    cmd = "conf t; int %s; no shut " %intf
    cli(cmd)


========================

TEST-3850#conf t
Enter configuration commands, one per line.  End with CNTL/Z.
TEST-3850(config)#int loo 55
TEST-3850(config-if)#shut
TEST-3850(config-if)#end
TEST-3850#sh int loo 55
Loopback55 is administratively down, line protocol is down
  Hardware is Loopback
  Internet address is 169.254.1.2/32
  MTU 1514 bytes, BW 8000000 Kbit/sec, DLY 5000 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation LOOPBACK, loopback not set
  Keepalive set (10 sec)
  Last input never, output never, output hang never
  Last clearing of "show interface" counters never
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
  Queueing strategy: fifo
  Output queue: 0/0 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     0 packets input, 0 bytes, 0 no buffer
     Received 0 broadcasts (0 IP multicasts)
     0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     0 packets output, 0 bytes, 0 underruns
     0 output errors, 0 collisions, 0 interface resets
     0 unknown protocol drops
     0 output buffer failures, 0 output buffers swapped out
TEST-3850#sh int loo 55
Loopback55 is administratively down, line protocol is down
  Hardware is Loopback
  Internet address is 169.254.1.2/32
  MTU 1514 bytes, BW 8000000 Kbit/sec, DLY 5000 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation LOOPBACK, loopback not set
  Keepalive set (10 sec)
  Last input never, output never, output hang never
  Last clearing of "show interface" counters never
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
  Queueing strategy: fifo
  Output queue: 0/0 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     0 packets input, 0 bytes, 0 no buffer
     Received 0 broadcasts (0 IP multicasts)
     0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     0 packets output, 0 bytes, 0 underruns
     0 output errors, 0 collisions, 0 interface resets
     0 unknown protocol drops
     0 output buffer failures, 0 output buffers swapped out
TEST-3850#sh int loo 55
Loopback55 is up, line protocol is up
  Hardware is Loopback
  Internet address is 169.254.1.2/32
  MTU 1514 bytes, BW 8000000 Kbit/sec, DLY 5000 usec,
     reliability 255/255, txload 1/255, rxload 1/255
  Encapsulation LOOPBACK, loopback not set
  Keepalive set (10 sec)
  Last input never, output never, output hang never
  Last clearing of "show interface" counters never
  Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
  Queueing strategy: fifo
  Output queue: 0/0 (size/max)
  5 minute input rate 0 bits/sec, 0 packets/sec
  5 minute output rate 0 bits/sec, 0 packets/sec
     0 packets input, 0 bytes, 0 no buffer
     Received 0 broadcasts (0 IP multicasts)
     0 runts, 0 giants, 0 throttles
     0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored, 0 abort
     0 packets output, 0 bytes, 0 underruns
     0 output errors, 0 collisions, 0 interface resets
     0 unknown protocol drops
     0 output buffer failures, 0 output buffers swapped out
TEST-3850#sh log
Syslog logging: enabled (0 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled, filtering disabled)

No Active Message Discriminator.



No Inactive Message Discriminator.


    Console logging: disabled
    Monitor logging: level debugging, 0 messages logged, xml disabled,
                     filtering disabled
    Buffer logging:  level debugging, 105 messages logged, xml disabled,
                    filtering disabled
    Exception Logging: size (4096 bytes)
    Count and timestamp logging messages: disabled
    File logging: disabled
    Persistent logging: disabled

No active filter modules.

    Trap logging: level informational, 107 message lines logged
        Logging Source-Interface:       VRF Name:

Log Buffer (99999 bytes):

*Mar 19 03:36:29.910: %SYS-5-CONFIG_I: Configured from console by console
*Mar 19 03:36:31.285: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback55, changed state to down
*Mar 19 03:36:31.286: %LINK-5-CHANGED: Interface Loopback55, changed state to administratively down
*Mar 19 03:36:39.795: %LINEPROTO-5-UPDOWN: Line protocol on Interface Loopback55, changed state to up
*Mar 19 03:36:39.796: %LINK-3-UPDOWN: Interface Loopback55, changed state to up
TEST-3850#

Friday, January 26, 2018

ANSIBLE CONFIG ACL AND SAVE CONFIG






Tuesday, January 23, 2018

INSTALL PYTHON PACKAGE FROM TAR


You may use pip for that without using the network. See in the docs (search for "Install a particular source archive file"). Any of those should work:
pip install relative_path_to_seaborn.tar.gz    
pip install absolute_path_to_seaborn.tar.gz    
pip install file:///absolute_path_to_seaborn.tar.gz    
Or you may uncompress the archive and use setup.py directly with either pip or python:
cd directory_containing_setup.py
pip install .
python setup.py install
Of course, you should also download required packages and install them the same way before you proceed.
GIT CLONE DENIED DUE TO CERTIFICATE



ANSIBLE PLAYBOOK

Using lines instead of commands. Can run over and over again without error. With command it will generate error


---
- hosts: TEST253
  gather_facts: true
  connection: local

  tasks:
    - name: config acl
      ios_config:
        lines:
          - permit udp any any
          - permit tcp any any eq www
        host:  "{{ ansible_host }}"
        username: cisco
        password: cisco123
        parents: ip access-list exten TEST253
        match: exact
      register: config

   
mtadmin@ubuntu:/etc/ansible/playbook$ ansible-playbook config_acl_2.yaml

PLAY [TEST253] *****************************************************************

TASK [setup] *******************************************************************
ok: [TEST253]

TASK [config acl] **************************************************************
changed: [TEST253]

PLAY RECAP *********************************************************************
TEST253                    : ok=2    changed=1    unreachable=0    failed=0  

mtadmin@ubuntu:/etc/ansible/playbook$ ansible-playbook config_acl_2.yaml

PLAY [TEST253] *****************************************************************

TASK [setup] *******************************************************************
ok: [TEST253]

TASK [config acl] **************************************************************
changed: [TEST253]

PLAY RECAP *********************************************************************
TEST253                    : ok=2    changed=1    unreachable=0    failed=0  



Error with comand

mtadmin@ubuntu:/etc/ansible/playbook$ ansible-playbook config_acl.yaml

PLAY [TEST252] *****************************************************************

TASK [setup] *******************************************************************
ok: [TEST252]

TASK [config acl] **************************************************************
fatal: [TEST252]: FAILED! => {"changed": false, "failed": true, "msg": "matched error in response: permit tcp any any eq www\r\n                     ^\r\n% Invalid input detected at '^' marker.\r\n\r\nTEST-3850(config)#"}
                to retry, use: --limit @/etc/ansible/playbook/config_acl.retry

PLAY RECAP *********************************************************************

TEST252                    : ok=1    changed=0    unreachable=0    failed=1   
ANSIBLE PLAYBOOK FOR CISCO IOS

ios_config using commands

[TEST_3850_by_name]
TEST253 ansible_host=10.22.41.253
TEST252 ansible_host=10.22.41.252

===========================================

---
- hosts: TEST_3850_by_name
  gather_facts: true
  connection: local

  tasks:
    - name: config acl
      ios_config:
        commands:
          - ip access-list extended TEST252
          - permit tcp any any eq www
        host:  "{{ ansible_host }}"
        username: cisco
        password: cisco123
      register: config

               


mtadmin@ubuntu:/etc/ansible/playbook$ ansible-playbook config_acl.yaml --limit TEST253

PLAY [TEST_3850_by_name] *******************************************************

TASK [setup] *******************************************************************
ok: [TEST253]

TASK [config acl] **************************************************************
changed: [TEST253]

PLAY RECAP *********************************************************************
TEST253                    : ok=2    changed=1    unreachable=0    failed=0  

mtadmin@ubuntu:/etc/ansible/playbook$



========================================================================

---
- hosts: TEST253
  gather_facts: true
  connection: local

  tasks:
    - name: config acl
      ios_config:
        commands:
          - ip access-list extended TEST252
          - permit tcp any any eq www
        host:  "{{ ansible_host }}"
        username: cisco
        password: cisco123
      register: config

                 
mtadmin@ubuntu:/etc/ansible/playbook$ ansible-playbook config_acl_2.yaml

PLAY [TEST253] *****************************************************************

TASK [setup] *******************************************************************
ok: [TEST253]

TASK [config acl] **************************************************************
changed: [TEST253]

PLAY RECAP *********************************************************************
TEST253                    : ok=2    changed=1    unreachable=0    failed=0  

========================================================================


---
- hosts: TEST_3850_by_name
  gather_facts: true
  connection: local

  tasks:
    - name: config acl
      ios_config:
        commands:
          - ip access-list extended TEST252
          - permit tcp any any eq www
        host:  TEST252
        username: cisco
        password: cisco123
      register: config

   
mtadmin@ubuntu:/etc/ansible/playbook$ ansible-playbook config_acl.yaml

PLAY [TEST_3850_by_name] *******************************************************

TASK [setup] *******************************************************************
ok: [TEST252]
ok: [TEST253]

TASK [config acl] **************************************************************
fatal: [TEST253]: FAILED! => {"changed": false, "failed": true, "msg": "failed to connect to TEST252:22"}
fatal: [TEST252]: FAILED! => {"changed": false, "failed": true, "msg": "failed to connect to TEST252:22"}
                to retry, use: --limit @/etc/ansible/playbook/config_acl.retry

PLAY RECAP *********************************************************************
TEST252                    : ok=1    changed=0    unreachable=0    failed=1  
TEST253                    : ok=1    changed=0    unreachable=0    failed=1  

=========================================================================================



---
- hosts: TEST252
  gather_facts: true
  connection: local

  tasks:
    - name: config acl
      ios_config:
        commands:
          - ip access-list extended TEST252
          - permit tcp any any eq www
        host:  "{{ ansible_host }}"
        username: cisco
        password: cisco123
      register: config

- hosts: TEST253
  gather_facts: true
  connection: local

  tasks:
    - name: config acl
      ios_config:
        commands:
          - ip access-list extended TEST253
          - permit tcp any any eq www
        host:  "{{ ansible_host }}"
        username: cisco
        password: cisco123

      register: config

Friday, January 19, 2018

CISCO 3850-48P-L UPGRADE TO 16.6 FAILED

Tried to upgrade a Cisco 3850 to version 16.06.02 and it failed with following error messages.

TEST-3850#software install file usbflash0:cat3k_caa-universalk9.16.06.02.SPA.bin
Preparing install operation ...
[1]: Starting install operation
[1]: Expanding bundle usbflash0:cat3k_caa-universalk9.16.06.02.SPA.bin
[1]: Copying package files
[1]: Package files copied
[1]: Finished expanding bundle usbflash0:cat3k_caa-universalk9.16.06.02.SPA.bin
[1]: Verifying and copying expanded package files to flash:
[1]: Verified and copied expanded package files to flash:
[1]: Starting compatibility checks
[1]: % Candidate package compatibility checks failed because the following
       package dependencies were not satisfied. Operation aborted.



[1]: % An internal error was encountered. Operation aborted.



TRIED IT WITH THE  new AT THE END OF THE SOFTWARE INSTALL AND IT WORKED

TEST-3850#software install file usbflash0:cat3k_caa-universalk9.16.06.02.SPA.bin new
Preparing install operation ...
[1]: Starting install operation
[1]: Expanding bundle usbflash0:cat3k_caa-universalk9.16.06.02.SPA.bin
[1]: Copying package files
[1]: Package files copied
[1]: Finished expanding bundle usbflash0:cat3k_caa-universalk9.16.06.02.SPA.bin
[1]: Verifying and copying expanded package files to flash:
[1]: Verified and copied expanded package files to flash:
[1]: Starting compatibility checks
[1]: Finished compatibility checks
[1]: Starting application pre-installation processing
[1]: Finished application pre-installation processing
[1]: Old files list:
    Removed cat3k_caa-base.SPA.03.07.04E.pkg
    Removed cat3k_caa-drivers.SPA.03.07.04E.pkg
    Removed cat3k_caa-infra.SPA.03.07.04E.pkg
    Removed cat3k_caa-iosd-universalk9.SPA.152-3.E4.pkg
    Removed cat3k_caa-platform.SPA.03.07.04E.pkg
    Removed cat3k_caa-wcm.SPA.10.3.141.0.pkg
[1]: New files list:
    Added cat3k_caa-guestshell.16.06.02.SPA.pkg
    Added cat3k_caa-rpbase.16.06.02.SPA.pkg
    Added cat3k_caa-rpcore.16.06.02.SPA.pkg
    Added cat3k_caa-srdriver.16.06.02.SPA.pkg
    Added cat3k_caa-webui.16.06.02.SPA.pkg
[1]: Creating pending provisioning file
[1]: Finished installing software.  New software will load on reboot.
[1]: Committing provisioning file

[1]: Do you want to proceed with reload? [yes/no]:



%IOSXEBOOT-loader-boot: (rp/0): upgrade successful 4
MM [1] MCU version 111 sw ver 96
MM [2] MCU version 111 sw ver 96


Front-end Microcode IMG MGR: found 4 microcode images for 1 device.
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_0 mismatch: 0
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_1 mismatch: 1
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_2 mismatch: 1
Image for front-end 0: /tmp/microcode_update/front_end/fe_type_6_3 mismatch: 0

Front-end Microcode IMG MGR: Preparing to program device microcode...
Front-end Microcode IMG MGR: Preparing to program device[0], index=0 ...594412 bytes.... Skipped[0].
Front-end Microcode IMG MGR: Preparing to program device[0], index=1 ...393734 bytes.
Front-end Microcode IMG MGR: Programming device 0...rwRrrrrrrw..0%.........................................................................10%........................................................................20%..........................................................................30%........................................................................40%..........................................................................50%........................................................................60%..........................................................................70%.........................................................................80%..........................................................................90%........................................................................100%
Front-end Microcode IMG MGR: Preparing to program device[0], index=2 ...25186 bytes.
Front-end Microcode IMG MGR: Programming device 0...rrrrrrw..0%....10%....20%......30%...40%......50%....60%......70%...80%......90%....100%wRr!
Front-end Microcode IMG MGR: Microcode programming complete for device 0.
Front-end Microcode IMG MGR: Preparing to program device[0], index=3 ...86370 bytes.... Skipped[3].
Front-end Microcode IMG MGR: Microcode programming complete in 247 seconds

Both links down, not waiting for other switches
Switch number is 1

              Restricted Rights Legend



TEST-3850#sh ver
Cisco IOS XE Software, Version 16.06.02
Cisco IOS Software [Everest], Catalyst L3 Switch Software (CAT3K_CAA-UNIVERSALK9-M), Version 16.6.2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2017 by Cisco Systems, Inc.
Compiled Wed 01-Nov-17 04:27 by mcpre


Cisco IOS-XE software, Copyright (c) 2005-2017 by cisco Systems, Inc.
All rights reserved.  Certain components of Cisco IOS-XE software are
licensed under the GNU General Public License ("GPL") Version 2.0.  The
software code licensed under GPL Version 2.0 is free software that comes
with ABSOLUTELY NO WARRANTY.  You can redistribute and/or modify such
GPL code under the terms of GPL Version 2.0.  For more details, see the
documentation or "License Notice" file accompanying the IOS-XE software,
or the applicable URL provided on the flyer accompanying the IOS-XE
software.


ROM: IOS-XE ROMMON
BOOTLDR: CAT3K_CAA Boot Loader (CAT3K_CAA-HBOOT-M) Version 1.18, RELEASE SOFTWARE (P)

TEST-3850 uptime is 1 minute
Uptime for this control processor is 9 minutes
System returned to ROM by Power Failure
System image file is "flash:packages.conf"
Last reload reason: Power Failure



This product contains cryptographic features and is subject to United
States and local country laws governing import, export, transfer and
use. Delivery of Cisco cryptographic products does not imply
third-party authority to import, export, distribute or use encryption.
Importers, exporters, distributors and users are responsible for
compliance with U.S. and local country laws. By using this product you
agree to comply with applicable laws and regulations. If you are unable
to comply with U.S. and local laws, return this product immediately.

A summary of U.S. laws governing Cisco cryptographic products may be found at:
http://www.cisco.com/wwl/export/crypto/tool/stqrg.html

If you require further assistance please contact us by sending email to
export@cisco.com.


Technology Package License Information:

-----------------------------------------------------------------
Technology-package                   Technology-package
Current             Type             Next reboot
------------------------------------------------------------------
lanbasek9           Permanent        lanbasek9

cisco WS-C3850-48P (MIPS) processor (revision X0) with 853402K/6147K bytes of memory.
Processor board ID FCW1943D1AG
1 Virtual Ethernet interface
52 Gigabit Ethernet interfaces
4 Ten Gigabit Ethernet interfaces
2048K bytes of non-volatile configuration memory.
4194304K bytes of physical memory.
250456K bytes of Crash Files at crashinfo:.
1609272K bytes of Flash at flash:.
983024K bytes of USB Flash at usbflash0:.
0K bytes of WebUI ODM Files at webui:.

Base Ethernet MAC Address          : 18:8b:45:4f:c8:00
Motherboard Assembly Number        : 73-15800-07
Motherboard Serial Number          : FOC19432LAD
Model Revision Number              : X0
Motherboard Revision Number        : B0
Model Number                       : WS-C3850-48P
System Serial Number               : FCW1943D1AG


Switch Ports Model              SW Version        SW Image              Mode
------ ----- -----              ----------        ----------            ----
*    1 56    WS-C3850-48P       16.6.2            CAT3K_CAA-UNIVERSALK9 INSTALL


Configuration register is 0x102



*****NOTE******

ON IOS-XE 16 what used to be "software" command are now "request platform software"