converting cisco ios configurations to cisco ios xr configurations

54
Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 526-4100 Converting Cisco IOS Configurations to Cisco IOS XR Configurations Cisco IOS XR Software Release 3.3 Text Part Number: OL-8503-01

Upload: anuj-jaiswal

Post on 20-Nov-2015

502 views

Category:

Documents


58 download

DESCRIPTION

IOS to XOR convert

TRANSCRIPT

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsCisco IOS XR Software Release 3.3Corporate HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706 USAhttp://www.cisco.comTel: 408 526-4000

    800 553-NETS (6387)Fax: 408 526-4100

    Text Part Number: OL-8503-01

    http://www.cisco.com

  • THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.

    THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.

    The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.

    NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

    IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

    CCVP, the Cisco logo, and Welcome to the Human Network are trademarks of Cisco Systems, Inc.; Changing the Way We Work, Live, Play, and Learn is a service mark of Cisco Systems, Inc.; and Access Registrar, Aironet, BPX, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Enterprise/Solver, EtherChannel, EtherFast, EtherSwitch, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, IP/TV, iQ Expertise, the iQ logo, iQ Net Readiness Scorecard, iQuick Study, LightStream, Linksys, MeetingPlace, MGX, Networkers, Networking Academy, Network Registrar, PIX, ProConnect, ScriptShare, SMARTnet, StackWise, The Fastest Way to Increase Your Internet Quotient, and TransPath are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

    All other trademarks mentioned in this document or Website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0710R)

    Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.

    Converting Cisco IOS Configurations to Cisco IOS XR Configurations Copyright 2006 Cisco Systems, Inc. All rights reserved.

  • R3 .3 .0 FCS Dra ftCisco Conf ident i a l I n fo rmat ionContents

    Preface v

    Changes to This Document v

    Obtaining Documentation vCisco.com vDocumentation DVD viOrdering Documentation vi

    Documentation Feedback vi

    Cisco Product Security Overview viiReporting Security Problems in Cisco Products vii

    Obtaining Technical Assistance viiiCisco Technical Support & Documentation Website viiiSubmitting a Service Request viiiDefinitions of Service Request Severity ix

    Obtaining Additional Publications and Information ix

    Converting Cisco IOS Configurations to Cisco IOS XR Configurations 1

    Contents 1

    Conversion Procedure 2

    General Differences Between Cisco IOS and Cisco IOS XR Software 2

    Cisco IOS Configurations Absent From Cisco IOS XR Software 3

    Cisco IOS and Cisco IOS XR Configurations That Are the Same 5

    Cisco IOS Configurations That Are Similar in Cisco IOS XR 6

    Basic Interface Configuration 7

    IPv4 Unicast Routing and Forwarding 8General IP Routing 8Intermediate System-to-Intermediate System (IS-IS) 9Open Shortest Path First (OSPF) 11iiiConverting Cisco IOS Configurations to Cisco IOS XR Configurations

  • R3 .3 Be ta Dra ftCisco Conf ident i a l I n fo rmat ion

    ContentsBorder Gateway Protocol (BGP) 13Multicast 20

    Multiprotocol Label Switching (MPLS) 21Minor Differences and Adjustments 21 Label Distribution Protocol (LDP) 22Traffic Engineering (TE) 22

    Quality of Service (QoS) 24

    IPv6 26

    Other Cisco IOS XR Issues 27Access Lists 27Username Configuration and Permission Levels 28Network Time Protocol (NTP) 29Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP) 29Line Configurations 30

    Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language 31Introduction and Overview 31Original Route Map Configuration 32A Simple Translation 33Using Nested Conditionals to Reduce Repetitive Comparisons 34Using Inline Sets to Remove Small Indirect Set References 36Taking Advantage of Parameterization to Reuse Common Structures 37

    I N D E XivConverting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Preface

    This document describes how to convert Cisco IOS software configurations to Cisco IOS XR software configurations. This preface for Converting Cisco IOS Configurations to Cisco IOS XR Configurations contains the following sections:

    Changes to This Document, page v

    Obtaining Documentation, page v

    Documentation Feedback, page vi

    Cisco Product Security Overview, page vii

    Obtaining Technical Assistance, page viii

    Obtaining Additional Publications and Information, page ix

    Changes to This DocumentTable 1 Changes for This Document

    Revision Date Change Summary

    OL-8503-01 September 2007 Added Conversion Procedure, page 2

    OL-8503-01 April 2006 Initial release of this document.

    Obtaining DocumentationCisco documentation and additional literature are available on Cisco.com. Cisco also provides several ways to obtain technical assistance and other technical resources. These sections explain how to obtain technical information from Cisco Systems.

    Cisco.comYou can access the most current Cisco documentation at this URL:

    http://www.cisco.com/univercd/home/home.htm

    You can access the Cisco website at this URL:

    http://www.cisco.comvConverting Cisco IOS Configurations to Cisco IOS XR Configurations

    http://www.cisco.com/univercd/home/home.htmhttp://www.cisco.com

  • PrefaceDocumentation FeedbackYou can access international Cisco websites at this URL:

    http://www.cisco.com/public/countries_languages.shtml

    Documentation DVDCisco documentation and additional literature are available in a Documentation DVD package, which may have shipped with your product. The Documentation DVD is updated regularly and may be more current than printed documentation. The Documentation DVD package is available as a single unit.

    Registered Cisco.com users (Cisco direct customers) can order a Cisco Documentation DVD (product number DOC-DOCDVD=) from the Ordering tool or Cisco Marketplace.

    Cisco Ordering tool:

    http://www.cisco.com/en/US/partner/ordering/

    Cisco Marketplace:

    http://www.cisco.com/go/marketplace/

    Ordering DocumentationYou can find instructions for ordering documentation at this URL:

    http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htm

    You can order Cisco documentation in these ways:

    Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Ordering tool:

    http://www.cisco.com/en/US/partner/ordering/

    Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, USA) at 408 526-7208 or, elsewhere in North America, by calling 1 800 553-NETS (6387).

    Documentation FeedbackYou can rate and provide feedback about Cisco technical documents by completing the online feedback form that appears with the technical documents on Cisco.com.

    You can send comments about Cisco documentation to [email protected].

    You can submit comments by using the response card (if present) behind the front cover of your document or by writing to the following address:

    Cisco Systems Attn: Customer Document Ordering 170 West Tasman Drive San Jose, CA 95134-9883

    We appreciate your comments.viConverting Cisco IOS Configurations to Cisco IOS XR Configurations

    http://www.cisco.com/public/countries_languages.shtmlhttp://www.cisco.com/en/US/partner/ordering/http://www.cisco.com/go/marketplace/http://www.cisco.com/univercd/cc/td/doc/es_inpck/pdi.htmhttp://www.cisco.com/en/US/partner/ordering/

  • PrefaceCisco Product Security OverviewCisco Product Security OverviewCisco provides a free online Security Vulnerability Policy portal at this URL:

    http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

    From this site, you can perform these tasks:

    Report security vulnerabilities in Cisco products.

    Obtain assistance with security incidents that involve Cisco products.

    Register to receive security information from Cisco.

    A current list of security advisories and notices for Cisco products is available at this URL:

    http://www.cisco.com/go/psirt

    If you prefer to see advisories and notices as they are updated in real time, you can access a Product Security Incident Response Team Really Simple Syndication (PSIRT RSS) feed from this URL:

    http://www.cisco.com/en/US/products/products_psirt_rss_feed.html

    Reporting Security Problems in Cisco ProductsCisco is committed to delivering secure products. We test our products internally before we release them, and we strive to correct all vulnerabilities quickly. If you think that you might have identified a vulnerability in a Cisco product, contact PSIRT:

    Emergencies [email protected]

    An emergency is either a condition in which a system is under active attack or a condition for which a severe and urgent security vulnerability should be reported. All other conditions are considered nonemergencies.

    Nonemergencies [email protected]

    In an emergency, you can also reach PSIRT by telephone:

    1 877 228-7302

    1 408 525-6532

    Tip We encourage you to use Pretty Good Privacy (PGP) or a compatible product to encrypt any sensitive information that you send to Cisco. PSIRT can work from encrypted information that is compatible with PGP versions 2.x through 8.x. Never use a revoked or an expired encryption key. The correct public key to use in your correspondence with PSIRT is the one linked in the Contact Summary section of the Security Vulnerability Policy page at this URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html The link on this page has the current PGP key ID in use.viiConverting Cisco IOS Configurations to Cisco IOS XR Configurations

    http://www.cisco.com/en/US/products/products_security_vulnerability_policy.htmlhttp://www.cisco.com/go/psirthttp://www.cisco.com/en/US/products/products_psirt_rss_feed.htmlmailto:[email protected]:[email protected]://www.cisco.com/en/US/products/products_security_vulnerability_policy.html

  • PrefaceObtaining Technical AssistanceObtaining Technical AssistanceFor all customers, partners, resellers, and distributors who hold valid Cisco service contracts, Cisco Technical Support provides 24-hour-a-day, award-winning technical assistance. The Cisco Technical Support Support and Documentation Website on Cisco.com features extensive online support resources. In addition, Cisco Technical Assistance Center (TAC) engineers provide telephone support. If you do not hold a valid Cisco service contract, contact your reseller.

    Cisco Technical Support & Documentation WebsiteThe Cisco Technical Support & Documentation website provides online documents and tools for troubleshooting and resolving technical issues with Cisco products and technologies. The website is available 24 hours a day, at this URL:

    http://www.cisco.com/techsupport

    Access to all tools on the Cisco Technical Support & Documentation website requires a Cisco.com user ID and password. If you have a valid service contract but do not have a user ID or password, you can register at this URL:

    http://tools.cisco.com/RPF/register/register.do

    Note Use the Cisco Product Identification (CPI) tool to locate your product serial number before submitting a web or phone request for service. You can access the CPI tool from the Cisco Technical Support & Documentation website by clicking the Tools & Resources link under Documentation & Tools. Choose Cisco Product Identification Tool from the Alphabetical Index drop-down list, or click the Cisco Product Identification Tool link under Alerts & RMAs. The CPI tool offers three search options: by product ID or model name; by tree view; or for certain products, by copying and pasting show command output. Search results show an illustration of your product with the serial number label location highlighted. Locate the serial number label on your product and record the information before placing a service call.

    Submitting a Service RequestUsing the online TAC Service Request Tool is the fastest way to open S3 and S4 service requests. (S3 and S4 service requests are those in which your network is minimally impaired or for which you require product information.) After you describe your situation, the TAC Service Request Tool provides recommended solutions. If your issue is not resolved using the recommended resources, your service request is assigned to a Cisco engineer. The TAC Service Request Tool is located at this URL:

    http://www.cisco.com/techsupport/servicerequest

    For S1 or S2 service requests or if you do not have Internet access, contact the Cisco TAC by telephone. (S1 or S2 service requests are those in which your production network is down or severely degraded.) Cisco engineers are assigned immediately to S1 and S2 service requests to help keep your business operations running smoothly.

    To open a service request by telephone, use one of the following numbers:

    Asia-Pacific: +61 2 8446 7411 (Australia: 1 800 805 227) EMEA: +32 2 704 55 55 USA: 1 800 553-2447viiiConverting Cisco IOS Configurations to Cisco IOS XR Configurations

    http://www.cisco.com/techsupporthttp://tools.cisco.com/RPF/register/register.dohttp://www.cisco.com/techsupport/servicerequest

  • PrefaceObtaining Additional Publications and InformationFor a complete list of Cisco TAC contacts, go to this URL:

    http://www.cisco.com/techsupport/contacts

    Definitions of Service Request SeverityTo ensure that all service requests are reported in a standard format, Cisco has established severity definitions.

    Severity 1 (S1)Your network is down, or there is a critical impact to your business operations. You and Cisco will commit all necessary resources around the clock to resolve the situation.

    Severity 2 (S2)Operation of an existing network is severely degraded, or significant aspects of your business operation are negatively affected by inadequate performance of Cisco products. You and Cisco will commit full-time resources during normal business hours to resolve the situation.

    Severity 3 (S3)Operational performance of your network is impaired, but most business operations remain functional. You and Cisco will commit resources during normal business hours to restore service to satisfactory levels.

    Severity 4 (S4)You require information or assistance with Cisco product capabilities, installation, or configuration. There is little or no effect on your business operations.

    Obtaining Additional Publications and InformationInformation about Cisco products, technologies, and network solutions is available from various online and printed sources.

    Cisco Marketplace provides a variety of Cisco books, reference guides, documentation, and logo merchandise. Visit Cisco Marketplace, the company store, at this URL:

    http://www.cisco.com/go/marketplace/

    Cisco Press publishes a wide range of general networking, training and certification titles. Both new and experienced users will benefit from these publications. For current Cisco Press titles and other information, go to Cisco Press at this URL:

    http://www.ciscopress.com

    Packet magazine is the Cisco Systems technical user magazine for maximizing Internet and networking investments. Each quarter, Packet delivers coverage of the latest industry trends, technology breakthroughs, and Cisco products and solutions, as well as network deployment and troubleshooting tips, configuration examples, customer case studies, certification and training information, and links to scores of in-depth online resources. You can access Packet magazine at this URL:

    http://www.cisco.com/packet

    iQ Magazine is the quarterly publication from Cisco Systems designed to help growing companies learn how they can use technology to increase revenue, streamline their business, and expand services. The publication identifies the challenges facing these companies and the technologies to help solve them, using real-world case studies and business strategies to help readers make sound technology investment decisions. You can access iQ Magazine at this URL:

    http://www.cisco.com/go/iqmagazine

    or view the digital edition at this URL:

    http://ciscoiq.texterity.com/ciscoiq/sample/ixConverting Cisco IOS Configurations to Cisco IOS XR Configurations

    http://www.cisco.com/techsupport/contactshttp://www.cisco.com/go/marketplace/http://www.ciscopress.comhttp://www.cisco.com/packethttp://www.cisco.com/go/iqmagazinehttp://ciscoiq.texterity.com/ciscoiq/sample/

  • PrefaceObtaining Additional Publications and Information Internet Protocol Journal is a quarterly journal published by Cisco Systems for engineering professionals involved in designing, developing, and operating public and private internets and intranets. You can access the Internet Protocol Journal at this URL:

    http://www.cisco.com/ipj

    Networking products offered by Cisco Systems, as well as customer support services, can be obtained at this URL:

    http://www.cisco.com/en/US/products/index.html

    Networking Professionals Connection is an interactive website for networking professionals to share questions, suggestions, and information about networking products and technologies with Cisco experts and other networking professionals. Join a discussion at this URL:

    http://www.cisco.com/discuss/networking

    World-class networking training is available from Cisco. You can view current offerings at this URL:

    http://www.cisco.com/en/US/learning/index.htmlxConverting Cisco IOS Configurations to Cisco IOS XR Configurations

    http://www.cisco.com/ipjhttp://www.cisco.com/en/US/products/index.htmlhttp://www.cisco.com/discuss/networkinghttp://www.cisco.com/en/US/learning/index.html

  • Converting Cisco IOS Configurations to Cisco IOS XR Configurations

    This module describes the conversion of a Cisco IOS configuration to a Cisco IOS XR configuration. It is not a complete guide to converting every command or configuration from Cisco IOS to Cisco IOS XR software, but it covers only the most commonly used features. There may be features in Cisco IOS that you are interested in that do not appear in this document.

    The configurations presented here use Cisco IOS XR Software Release 3.3.0 as a reference.

    This document is not an introduction to Cisco IOS XR software, nor is it an introduction to any of the features you can configure in Cisco IOS XR software. It assumes that you are familiar with the differences in operating infrastructure between Cisco IOS and Cisco IOS XR software and that you know how the protocols work.

    Contents Conversion Procedure, page 2

    General Differences Between Cisco IOS and Cisco IOS XR Software, page 2

    Cisco IOS Configurations Absent From Cisco IOS XR Software, page 3

    Cisco IOS and Cisco IOS XR Configurations That Are the Same, page 5

    Cisco IOS Configurations That Are Similar in Cisco IOS XR, page 6

    Basic Interface Configuration, page 7

    IPv4 Unicast Routing and Forwarding, page 8

    Multiprotocol Label Switching (MPLS), page 21

    Quality of Service (QoS), page 24

    IPv6, page 26

    Other Cisco IOS XR Issues, page 27

    Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language, page 311Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsConversion ProcedureConversion ProcedureIn general, the method of conversion is to proceed line-by-line over the Cisco IOS configuration using the information in this conversion guide to look up and create the equivalent configuration commands for Cisco IOS XR software.

    Note If you have many nodes in your network on which you plan to convert your configurations, you may also consider contacting Cisco Advanced Services to help expedite the conversion.

    Step 1 Before you install Cisco IOS XR software, convert any Cisco IOS commands for configurations you want to keep to Cisco IOS XR configuration commands, creating a text file containing the desired IOS XR configurations.

    Step 2 Install the Cisco IOS XR software according to the instructions in Migrating from Cisco IOS to Cisco IOS XR Software on the Cisco XR 12000 Series Router.

    Step 3 After installing the Cisco IOS XR software, reconfigure your router using the Cisco IOS XR configuration commands you developed in step 1. You can reconfigure your router using one of two methods:

    Enter the new CLI configuration commands line-by-line at the appropriate configuration submodes, using the IOS XR configurations you created as a reference. You must enter the commit command to make new configurations part of the running configuration. You can enter the commit command after entering a configuration at each submode or enter the command in the global configuration mode after entering all the new configurations.

    Go to global configuration mode and copy and paste the entire text file containing the new IOS XR configuration at the command prompt, then enter the commit replace command to replacethe entire running configuration.

    Note As the commands are parsed, error messages might displayindicating incorrect commands or syntax.

    General Differences Between Cisco IOS and Cisco IOS XR Software

    In Cisco IOS XR software, features are generally disabled by default and must be explicitly enabled. This means that, for example, you need to explicitly enable the address-family ipv4 unicast command in some routing protocols (IS-IS, BGP), whereas you did not need to do it in Cisco IOS. This also means that external services that listen to TCP/UDP ports and IP protocols (telnet, ssh, tcp-small-servers, and so forth) are off unless you turn them on.

    In general, use the following guidelines when initially converting between operating systems:

    Do not configure new features without understanding them first.

    Do not turn on features in Cisco IOS XR software that are off in your Cisco IOS configuration.

    Do not assume that you need all the same features in Cisco IOS XR software that you needed in Cisco IOS.2Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsCisco IOS Configurations Absent From Cisco IOS XR Software Think before you add or remove features. Is the feature really something you use, or are you just carrying it over because it is in your Cisco IOS configuration?

    Test changes carefully and ask for help if you are having difficulty.

    After you have converted an existing Cisco IOS configuration to a working Cisco IOS XR software configuration, you might want to try some of the additional features in Cisco IOS XR software. For more information on these features, consult the standard Cisco IOS XR configuration guides:

    Cisco IOS XR IP Addresses and Services Configuration Guide

    Cisco IOS XR Interface and Hardware Component Configuration Guide

    Cisco IOS XR Multicast Configuration Guide

    Cisco IOS XR Multiprotocol Label Switching Configuration Guide

    Cisco IOS XR Modular Quality of Service Configuration Guide

    Cisco IOS XR Routing Configuration Guide

    Cisco IOS XR System Management Configuration Guide

    Cisco IOS XR System Security Configuration Guide

    Cisco IOS Configurations Absent From Cisco IOS XR SoftwareIn Table 2 are some of the Cisco IOS configurations that do not exist in Cisco IOS XR software. The Cisco IOS column contains either a configuration string or a partial configuration string. If it is partial (like ip tftp ), that means that only the top level text has changed and options past the listed text are the same in Cisco IOS and Cisco IOS XR software.

    The Cisco IOS XR column contains the text No such configuration or No such keyword. No such configuration means that the service that is configured in Cisco IOS cannot be configured in Cisco IOS XR software. largely because the feature does not exist. An example is the Cisco IOS version command. No such keyword means that, although the configuration exists, the specific keyword listed in the Cisco IOS configuration does not exist in CCisco IOS XR software. Both types of entries might also have a comment explaining what happened to the Cisco IOS functionality.

    Table 2 List of Cisco IOS Configurations That Do Not Exist in Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Software

    aaa authentication enable No such keyword.

    Cisco IOS XR software has no concept of changing enable level when logged in; all permissions are defined in the usergroup/taskgroup model.

    aaa new-model No such configuration.

    There is no old model authentication, authorization, and accounting (AAA) in Cisco IOS XR software.

    access-list compiled No such configuration.

    Cisco IOS XR software manages access control lists (ACL) and takes no configurable input from the user.3Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsCisco IOS Configurations Absent From Cisco IOS XR Softwareaccess-list number No such configuration.

    All ACLs are configured using ipv4 access-list submode; see the ACL section later on.

    boot system ... No such configuration.

    The Cisco IOS XR boot model is very different from Cisco IOS boot model.

    enable No such configuration.

    You must have a username. The password and enable level ability are defined within the username and taskgroup set of commands.

    ip bgp-community new-format No such configuration.

    Community-lists, which support old-style numbering, are being phased out. See also the extensive section on Border Gateway Protocol (BGP) later in this document.

    ip bootp server No such configuration.

    No BOOTP server exists in Cisco IOS XR software.

    ip classless No such configuration,

    Cisco IOS XR software fully supports classless interdomain routing (CIDR) and variable-length subnet mask (VLSM). Classful routing does not exist in Cisco IOS XR software, so no classless enable is needed.

    ip finger No such keyword.

    There is no finger daemon on Cisco IOS XR software.

    ip receive No such configuration.

    Cisco IOS XR software does not support receive ACLs.

    ip spd No such configuration.

    Selective Packet Discard (SPD) does not exist in Cisco IOS XR software, in which Local Packet Transport Services (LPTS) mostly eliminates the need for SPD; LPTS is not configurable and is not discussed in this book.

    ip subnet-zero No such configuration.

    This behavior is automatic. Cisco IOS XR is fully classless and CIDR-capable.

    mpls label protocol ldp No such configuration.

    No Tag Distribution Protocol (TDP) exists in Cisco IOS XR software, so no need to pick between Label Distribution Protocol (LDP) and TDP.

    mpls traffic-eng auto-bw No such configuration.

    There is no support for Traffic Engineering (TE) auto-bw in Cisco IOS XR software.

    Table 2 List of Cisco IOS Configurations That Do Not Exist in Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Software4Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsCisco IOS and Cisco IOS XR Configurations That Are the SameCisco IOS and Cisco IOS XR Configurations That Are the SameA list of some of the configurations that are identical in Cisco IOS and Cisco IOS XR software appear in Table 3. The Cisco IOS column contains either a configuration string or a partial configuration string. If it is partial, like ip tftp , that means that all options past the listed text are the same in Cisco IOS and Cisco IOS XR software.

    Table 3 List of Cisco IOS Configurations That Are the Same in Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Software

    banner Same

    hostname hostname Same

    service timestamps debug datetime msec Same

    service timestamps log datetime msec Same

    snmp-server Same

    no service pad No such configuration.

    service compress-config No such configuration.

    Configuration file management is very different between Cisco IOS and Cisco IOS XR software

    service nagle No such configuration.

    nagle is on by default, and this cannot be changed by the user.

    service password-encryption No such configuration.

    You cannot have unencrypted passwords in Cisco IOS XR software

    service tcp-keepalives-in No such configuration.

    In Cisco IOS XR software, it is up to the application to decide whether to use keepalives or not, and none of this is configurable. The telnet server sends keepalives every 5 minutes. Telnet client does not send them. Other TCP-based protocols (BGP, SSH, and so on) have similar built-in keepalive values.

    service tcp-keepalives-out No such configuration.

    service upgrade all No such configuration.

    tag-switching No such configuration.

    All the tag-switching CLI is gone, replaced with Multiprotocol Label Switching (MPLS)

    version No such configuration.

    Table 2 List of Cisco IOS Configurations That Do Not Exist in Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Software5Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsCisco IOS Configurations That Are Similar in Cisco IOS XRCisco IOS Configurations That Are Similar in Cisco IOS XRThe following table lists some of the Cisco IOS configurations that differ from their Cisco IOS XR counterparts in minor ways. The Cisco IOS column contains either a configuration string or a partial configuration string. If it is partial like ip tftp , only the top level text has changed and options past the listed text are the same in Cisco IOS and Cisco IOS XR software.

    The Cisco IOS XR column contains an explanation of the differences between the two configurations.

    Table 4 Cisco IOS Configurations That are Similar in Cisco IOS XR software

    Cisco IOS Cisco IOS XR Software

    aaa authentication login name tacacs+ aaa authentication login name group tacacs+

    Note the group before tacacs+; this is common for all aaatacacs+ commands.

    aaa authorization commands level {default | list-name} tacacs+

    aaa authorization commands {default | list-name} group tacacs+

    Note the lack of a level, because Cisco IOS XR permissions are different from those of Cisco IOS.

    aaa accounting exec {default | list-name} {start-stop | stop-only} tacacs+

    aaa accounting exec {default | list-name} {start-stop | stop-only} group tacacs+

    Note the group before tacacs+.

    aaa accounting commands level {default | list-name} {start-stop | stop-only} tacacs+

    aaa accounting commands {default | list-name} {start-stop | stop-only} group tacacs+

    Note the lack of a level; see also the taskgroup section below.

    ip tcp path-mtu-discovery tcp path-mtu-discovery age-timer minutes

    ip telnet source-interface telnet ipv4 client source-interface

    ip tftp tftp client

    ip ftp ... ftp client ...

    ip name-server domain name-server

    ip route network mask

    Router# ip route 10.0.0.0 255.0.0.0

    route ipv4 network/masklen ...RP0/0/RP0/CPU0:router# route ipv4 unicast 10.0.0.0/8 ...

    All the options available after the network and mask in parameters Cisco IOS (outgoing interface, next-hop, tag, admin distance, and so on) are also available after the network/masklen parameter with the same command in Cisco IOS XR software.6Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsBasic Interface ConfigurationBasic Interface ConfigurationA few differences in interface configuration are shown in the examples below:

    Table 5 Basic Interface Configuration in Cisco IOS and Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Software

    interface POS2/1 ip address 192.168.14.5 255.255.255.0 no ip directed-broadcast crc 32 clock source internal pos ais-shut pos scramble-atm end

    interface POS0/2/0/1 mtu 4474 ipv4 address 192.168.14.8 255.255.255.0 pos crc 32 ! ! controller SONET0/2/0/1 ais-shut path ais-shut ! clock source internal !

    The major differences are as follows:

    Cisco IOS XR software has of a separate mode for configuring SONET.

    Cisco IOS XR software has the ipv4 address command instead of the ip address command that Cisco IOS has.

    The Cisco IOS XR software configuration has both ais-shut and path ais-shut commands configured. This does not map exactly to the Cisco IOS pos ais-shut command, which enables only line ais-shut, but you achieve the same thing with the two configurations.

    Only Packet-over-SONET (PoS) specific configurations (configurations having to do with High-level Data Link Control (HDLC) and Point-to-Point Protocol (PPP) payload and how they are put into a Synchronous Payload Envelope [SPE]) go on the interface in Cisco IOS XR software.

    The crc command is issued in the (config-if-pos) submode in Cisco IOS XR software.

    The ais-shut, clock, path, and other commands in the (config-SONET-path) submode are issued while in SONET controller submode in Cisco IOS XR software.

    Payload scrambling (pos scramble-atm in Cisco IOS) is on by default in Cisco IOS XR software. It can be disabled using the path scrambling disable command.

    line {aux | console} 0 line {aux | console}

    No line number is necessary. See also the VTY section later in this document.

    logging buffered 1000000 debugging The debug level and the buffer size are now two separate commands:

    logging buffered 150000

    logging buffered debugging

    Table 4 Cisco IOS Configurations That are Similar in Cisco IOS XR software

    Cisco IOS Cisco IOS XR Software7Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingFor further information on SONET controller configuration and PoS configurations, including PPP and HDLC, see the following configuration guide and command reference modules:

    The Configuring SONET Controller Interfaces on Cisco IOS XR Software module of the Cisco IOS XR Interface and Hardware Component Configuration Guide

    The Configuring POS Interfaces on Cisco IOS XR Software module of the Cisco IOS XR Interface and Hardware Component Configuration Guide

    The Packet-over-SONET User Interface and SONET Layer-1 Commands on Cisco IOS XR Software module of the Cisco IOS XR Interface and Hardware Component Command Reference

    The SONET APS Commands on Cisco IOS XR Software module of the Cisco IOS XR Interface and Hardware Component Command Reference

    The cHDLC Commands on Cisco IOS XR Software module of the Cisco IOS XR Interface and Hardware Component Command Reference

    The PPP Commands on Cisco IOS XR Software module of the Cisco IOS XR Interface and Hardware Component Command Reference

    Note The other interface type supported in Cisco IOS XR software is the Gigabit Ethernet (GigE) interface. The GigE interface does not have a controller submode and, therefore, configuration of GigE is similar to configuration of GigE in Cisco IOS.

    IPv4 Unicast Routing and ForwardingThis section contains the following parts:

    General IP Routing, page 8

    Intermediate System-to-Intermediate System (IS-IS), page 9

    Open Shortest Path First (OSPF), page 11

    Border Gateway Protocol (BGP), page 13

    Multicast, page 20

    General IP Routing A major difference between Cisco IOS and Cisco IOS XR software is that in Cisco IOS, you enable a protocol on an interface by some combination of configuration in the Interior Gateway Protocol (IGP) and on the physical interface. An example of the first method is an Open Shortest Path First (OSPF) network statement, while an example of the second method is an Intermediate System-to-Intermediate System (IS-IS) ip router isis command, or any change in the cost of an interface. In Cisco IOS XR software, all protocol-specific configuration goes under the global protocol configuration submode and not on the physical interface configuration. This means that there are no OSPF or IS-IS commands on a physical interface; they are all put under the interface submode of the routing protocol configuration. See the examples in Intermediate System-to-Intermediate System (IS-IS) and Open Shortest Path First (OSPF) for more detail.

    A useful feature for all routing protocols in Cisco IOS XR software is the global router-id command. In Cisco IOS, it is recommended that you hard-code a router-id to a loopback (by convention, Loopback0) for every protocol. In Cisco IOS XR software, you can use the global command router-id interface. Thus, all the following Cisco IOS commands are replaced by a single Cisco IOS XR command:8Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingTable 6 Examples of Cisco IOS Commands Replaced by the Cisco IOS XR router-id Command

    Cisco IOS Cisco IOS XR Software

    Example of the IS-IS router-id command:

    router isis mpls traffic-eng router-id Loopback0

    Example of the OSPF router-id command:

    router ospf router-id ip_address_of_Loopback0 mpls traffic-eng router-id Loopback0

    Example of the BGP router-id command:

    router bgp bgp router-id ip_address_of_Loopback0

    router-id Loopback0

    You can override the global router-id command in Cisco IOS XR software by further configuring a router-id command within a given protocol. However, configuring different router IDs per protocol makes management more complicated and provides no gain, so we do not recommend this practice.

    For more information about the router-id command, see the following configuration guide and command reference modules:

    The Implementing Network Stack IPv4 and IPv6 on Cisco IOS XR Software module of the Cisco IOS XR IP Addresses and Services Configuration Guide

    The Network Stack IPv4 and IPv6 Commands on Cisco IOS XR Software module of the Cisco IOS XR IP Addresses and Services Command Reference

    The Implementing Label Distribution Protocol on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Configuration Guide

    The Implementing Optical User Network Interface on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Configuration Guide

    The MPLS Label Distribution Commands on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Command Reference

    The Implementing Optical User Network Interface on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Configuration Guide

    The MPLS Optical User Network Interface Commands on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Command Reference

    The Implementing OSPF on Cisco IOS XR Software module of the Cisco IOS XR Routing Configuration Guide

    The OSPF Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    The OSPFv3 Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    Intermediate System-to-Intermediate System (IS-IS)Some key differences between the Cisco IOS and Cisco IOS XR IS-IS implementation are:9Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and Forwarding Cisco IOS XR software does not support Connectionless Network Services (CLNS) routing.

    Cisco IOS XR software defaults to multitopology mode for IPv6 (see the IPv6 section later in this document).

    Cisco IOS XR software must have a process name, such as router isis lab, whereas Cisco IOS could be configured with just router isis.

    A sample configuration for IPv4 routing only is given in the Table 7. This is for a very simple network consisting of a router (Router ID: 192.168.1.5) configured with a PoS interface (POS2/1) under Cisco IOS, and another router (Router ID:192.168.1.8) configured with a PoS interface (POS0/2/0/1) under Cisco IOS XR software.

    Table 7 Configuration Comparison for IPv4 in Cisco IOS and Cisco IOS XR

    IOS (Router ID:192.168.1.5) IOS XR (Router ID:192.168.1.8)

    router isis lab net 49.0192.0168.0001.0005.00 is-type level-2-only passive-interface Loopback0 ! interface POS2/1 ... ip router isis lab isis metric 42 ...

    router isis lab is-type level-2-only net 49.0192.0168.0001.0008.00 interface Loopback0 passive address-family ipv4 unicast ! ! interface POS0/2/0/1 address-family ipv4 unicast metric 42 ! ! !

    The largest change difference Cisco IOS and Cisco IOS XR software is that in Cisco IOS XR software you need to enable the ipv4 address family explicitly, whereas in Cisco IOS it is implicitly enabled. Most or all of the IS-IS options in Cisco IOS also exist in Cisco IOS XR. Another difference is that there are very few CLNS commands in Cisco IOS XR; most of the show clns options in Cisco IOS are under the show isis command in Cisco IOS XR software.

    Redistribution for IS-IS is very similar; the only difference is that instead of a route-map (as in Cisco IOS), you specify a route-policy. Thus, redistribution into Cisco IOS XR software is an attach point for an RPL route-policy. See Table 8.

    Table 8 IS-IS Redistribution Differences Between Cisco IOS and Cisco IOS XR

    Cisco IOS Cisco IOS XR

    router isis lab

    redistribute connected route-map route-map

    router isis lab

    address-family ipv4 unicast

    redistribute connected route-policy policy

    redistribute connected policy policy

    All of the standard options are available in both Cisco IOS and Cisco IOS XR software.

    Table 9 shows the output produced by issuing the help command (?) while in the proper configuration submode for the redistribute connected command on systems running Cisco IOS and Cisco IOS XR software.10Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingTable 9 Comparison of the redistribute connected command on Cisco IOS and Cisco IOS XR

    Cisco IOS Cisco IOS XR

    Router#redistribute connected ? level-1 level-1-2 level-2 metric metric-type route-map

    RP/0/0/CPU0:gsr4(config-isis-af)#redistribute connected ? level-1 Redistribute routes into level 1 only level-1-2 Redistribute routes into both levels level-2 Redistribute routes into level 2 only (the default) metric Metric for redistributed routes metric-type IS-IS metric type for redistributed routes route-policy Route policy reference

    IS-IS configurations for multitopology are slightly different, as well; see the sections on Multiprotocol Label Switching (MPLS) and IPv6 for details.

    For further information on IS-IS configuration, see the following configuration guide and command reference modules:

    The Implementing IS-IS on Cisco IOS XR Software module of the Cisco IOS XR Routing Configuration Guide

    The IS-IS Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    Open Shortest Path First (OSPF)An OSPF configuration is very similar to an IS-IS configuration. A sample configuration for OSPF routing only is given in Table 10 below. This is for a very simple network consisting of a router (Router ID:192.168.1.5) configured with a PoS interface (POS2/1) under Cisco IOS, and another router (Router ID:192.168.1.5) configured with a PoS interface (POS0/2/0/1) under Cisco IOS XR software.

    The main point in this description is that redistribution into OSPF on Cisco IOS XR software is a policy-attach point.11Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingTable 10 OSPF Configuration for Cisco IOS and Cisco IOS XR

    Cisco IOS (Router ID:192.168.1.5) Cisco IOS XR (Router ID:192.168.1.8)

    router ospf 1 log-adjacency-changes passive-interface Loopback0 network 192.168.1.0 0.0.0.255 area 0 network 192.168.7.0 0.0.0.255 area 0 network 192.168.12.0 0.0.0.255 area 0 network 192.168.13.0 0.0.0.255 area 0 network 192.168.14.0 0.0.0.255 area 0 network 192.168.18.0 0.0.0.255 area 0 network 192.168.20.0 0.0.0.255 area 0 ! interface Loopback0 ip address 192.168.1.5 255.255.255.255 ! interface POS2/1 ip address 192.168.14.5 255.255.255.0 ip ospf cost 17

    router ospf lab log adjacency changes area 0 interface Loopback0 passive enable ! interface POS0/1/0/1 ! interface POS0/2/0/0 ! interface POS0/2/0/1 cost 17 ! interface POS0/2/0/2 ! ! mpls traffic-eng area 0 !

    Note that the network statement in Cisco IOS has been replaced by enabling the interface under the area keyword inside OSPF. Also, OSPF does not need an address-family ipv4 unicast command like BGP or IS-IS. This is because router ospf implies support for unicast IPv4. Cisco does not support MOSPF, and unicast IPv6 has its own routing protocol, consisting of the router ospfv3 family of commands.

    Redistribution is a little different as well. Table 11 gives examples of redistribution configurations in Cisco IOS and Cisco IOS XR software.

    Table 11 Redistribution Configurations for OSPF in Cisco IOS and Cisco IOS XR

    Cisco IOS Cisco IOS XR

    router ospf 1 redistribute connected subnets redistribute static subnets route-map map

    router ospf lab redistribute connected redistribute static policy

    You no longer need the subnets keyword in Cisco IOS XR software. Instead, you declare an RPL route-policy rather than a route map.

    If you want to redistribute only classful routes into OSPF in Cisco IOS XR software, you can use the redistribute command with the classful keyword. The use of policies rather than route maps is covered in the Border Gateway Protocol (BGP) section and also in the existing Cisco IOS XR software documentation on RPL. The main point in this description is that redistribution into OSPF on Cisco IOS XR software is a policy-attach point.

    For more information on OSPF configuration, see the following modules:

    The Implementing OSPF on Cisco IOS XR Software module of the Cisco IOS XR Routing Configuration Guide

    The OSPF Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    The OSPFv3 Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference12Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingBorder Gateway Protocol (BGP)This section is divided into the following areas:

    Introduction and General Examples, page 13

    Address-Family Parameters, page 14

    Session Parameters, page 15

    BGP Neighbors, page 15

    Building a Route Policy, page 17

    Neighbor Independent Issues, page 19

    Introduction and General Examples

    BGP is the largest piece of conversion work to be done when migrating to Cisco IOS XR software. BGP is also where Route Policy Language (RPL) is used most heavily, so this is where RPL is explained. Because this document focuses on configuration conversion, and because it is not an RPL tutorial, the treatment of RPL is not complete. For more information on RPL, see the following configuration guide and command reference modules:

    The Implementing Routing Policy on Cisco IOS XR Software module of the Cisco IOS XR Routing Configuration Guide

    The Routing Policy Language Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    BGP configuration is complex enough that it is worth going over several sample configurations.

    First, let us start with a simple IBGP peering between a Cisco IOS router and a Cisco IOS XR router. For these examples, the Cisco IOS router has an IP address of 192.168.1.5, and the Cisco IOS XR router has an IP address of 192.168.1.8.

    Table 12 Basic BGP Configuration Between a Cisco IOS Router and a Cisco IOS XR Router

    Cisco IOS (Router ID: 192.168.1.5) Cisco IOS XR (Router ID: 192.168.1.8)

    router bgp 3402 no synchronization bgp log-neighbor-changes neighbor 192.168.1.8 remote-as 3402 neighbor 192.168.1.8 update-source Loopback0 no auto-summary

    router bgp 3402 address-family ipv4 unicast ! neighbor 192.168.1.4 remote-as 3402 update-source Loopback0 address-family ipv4 unicast

    Note This command is mandatory.

    Note the following:

    The remote-as and update-source in Cisco IOS XR software are configured inside a neighbor submode (config-bgp-nbr).

    bgp log neighbor changes disable (no hyphens)logging of BGP neighbor resets is on by default and does not show up in the Cisco IOS XR configuration.

    Cisco IOS XR software does not have the concept of auto-summary, so there is nothing to disable as there is in Cisco IOS.13Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingThe most important thing to learn from the above configuration is that you can configure everything you need by using the neighbor submode. Also, Cisco IOS XR software lets you break the BGP configuration down into separate building blocks that can be reused to build a more modular and more readable configuration.

    Address-Family Parameters

    Two building blocks for basic BGP neighbor configuration are supported in Cisco IOS XR software: address-family groups (referred to in a configuration as an af-group) and session groups (referred to in a configuration as a session-group). For more discussion of session groups see the Session Parameters of this document.

    You configure properties of different address families using the af-group keyword. The following address-family groups are supported for Cisco IOS XR Software Release 3.3.0:

    IPv4 unicast

    IPv4 multicast

    IPv6 unicast

    IPv6 multicast

    Note A given address family is only supported with a neighbor whose address is from that address family. For instance, IPv4 neighbors support IPv4 unicast and multicast address families, and IPv6 neighbors support IPv6 unicast and multicast address families. However, you cannot exchange IPv6 routing information with an IPv4 neighbor and vice versa.

    Inside an af-group, you configure properties specific to the exchange of information for a specific address family.

    Table 13 shows a more complex example of an IBGP peering between a Cisco IOS router (Router ID 192.168.1.5) and a Cisco IOS XR router (Router ID 192.168.1.8):

    Table 13 BGP Configuration Using an af-group

    Cisco IOS (Router ID:192.168.1.5) Cisco IOS XR (Router ID:192.168.1.8)

    router bgp 3402 no synchronization bgp log-neighbor-changes neighbor 192.168.1.8 remote-as 3402 neighbor 192.168.1.8 update-source Loopback0 neighbor 192.168.1.8 soft-reconfiguration inbound neighbor 192.168.1.8 weight 50 neighbor 192.168.1.8 maximum-prefix 75 no auto-summary !

    router bgp 3402 af-group test address-family ipv4 unicast weight 50 maximum-prefix 75 75 soft-reconfiguration inbound ! neighbor 192.168.1.5 remote-as 3402 update-source Loopback0 address-family ipv4 unicast use af-group test ! ! !

    You can see from the example that Cisco IOS XR software allows you to put address-family specific configuration in an af-group and apply that af-group to a specific neighbor using the af-group command, thus avoiding the need for a series of lines beginning with neighbor 192.168.1.5.14Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingSession Parameters

    Session-groups are conceptually very similar to af-groups, except that they allow you to configure properties of a BGP session itself rather than configure properties of a specific address family.

    Table 14 BGP Configuration Using session-group for Cisco IOS XR

    Cisco IOS Cisco IOS XRrouter bgp 3402 no synchronization bgp log-neighbor-changes neighbor 192.168.1.8 remote-as 3402 neighbor 192.168.1.8 password 7 045D0409 neighbor 192.168.1.8 update-source Loopback0 neighbor 192.168.1.8 soft-reconfiguration inbound neighbor 192.168.1.8 weight 50 neighbor 192.168.1.8 maximum-prefix 75 no auto-summary !

    router bgp 3402 af-group test address-family ipv4 unicast weight 50 maximum-prefix 75 75 soft-reconfiguration inbound ! session-group example remote-as 3402 password encrypted 1303181D update-source Loopback0 ! neighbor 192.168.1.5 use session-group example address-family ipv4 unicast use af-group test ! ! !

    In this example, a password was added between the neighbors; in Cisco IOS XR software, this is in the session-group, because it is a property of the session rather than a property of the address-family. Also, instead of the Cisco IOS keyword syntax password 0 or password 7, Cisco IOS XR uses the keyword syntax password clear or password encrypted.

    BGP Neighbors

    The next major configuration task is the Cisco IOS XR equivalent of Cisco IOS peer-groups. Cisco IOS XR calls them neighbor-groups rather than peer-groups, but the function is the same. In recent versions of Cisco IOS, the concept of dynamic update-groups was added to separate policy grouping from neighbor grouping. Cisco IOS XR software does this as well, so there is no restriction on what policies can be shared across which update-groups.

    The following configuration examples illustrate the difference in peer-groups under Cisco IOS and neighbor-groups under Cisco IOS XR software.15Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingTable 15 Configuring BGP by Using Peer Groups in Cisco IOS and Neighbor Groups in Cisco IOS XR Software

    Cisco IOS Cisco IOS XR

    router bgp 3402 no synchronization bgp log-neighbor-changes neighbor ibgp-peers peer-group neighbor ibgp-peers remote-as 3402 neighbor ibgp-peers password 7 10480616 neighbor ibgp-peers update-source Loopback0 neighbor ibgp-peers soft-reconfiguration inbound neighbor ibgp-peers weight 50 neighbor ibgp-peers maximum-prefix 75 neighbor 192.168.1.8 peer-group ibgp-peers no auto-summary!

    router bgp 3402 af-group test address-family ipv4 unicast weight 50 maximum-prefix 75 75 soft-reconfiguration inbound ! session-group example remote-as 3402 password 7 1303181D update-source Loopback0 ! neighbor-group ibgp-peers use session-group example address-family ipv4 unicast use af-group test ! ! neighbor 192.168.1.5 use neighbor-group ibgp-peers ! !

    Although the Cisco IOS XR configuration is longer, as the number of peers grows, the abstractions that Cisco IOS XR software offers makes your configurations shorter and more manageable.

    Another issue to look at is routing policy. Routing policy is applied in Cisco IOS XR software through Route Policy Language (RPL) and is a powerful replacement for Cisco IOS route maps. The terminology translation table for RPL vs. route-maps is:

    Table 16 Translation Table Between Cisco IOS Route Maps and Cisco IOS XR RPL

    Cisco IOS route-map terminology Cisco IOS XR RPL terminology

    route-map route-policy

    ip prefix-list prefix-set

    ip as-path access-list as-path-set

    community-list community-set

    Cisco IOS uses lists, but Cisco IOS XR software uses sets. A set in the mathematical sense is an unordered grouping of items, which is more logical than an ordered list for many applications.

    One major change between Cisco IOS and Cisco IOS XR is that in Cisco IOS XR software there must be a policy applied (both inbound and outbound) between EBGP neighbors for routes to be exchanged. Below is a basic configuration between the same two routers as before, but note in Table 17 that the autonomous system (AS) numbers are now different.16Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingTable 17 EGBP Configurations in Cisco IOS and Cisco IOS XR Software with No Policies

    Cisco IOS (Router ID: 192.168.1.5) Cisco IOS XR (Router ID: 192.168.1.8)

    router bgp 5 no synchronization bgp log-neighbor-changes neighbor 192.168.1.8 remote-as 8 neighbor 192.168.1.8 ebgp-multihop 255 neighbor 192.168.1.8 update-source Loopback0 no auto-summary !

    router bgp 8 neighbor 192.168.1.5 remote-as 5 ebgp-multihop 255 update-source Loopback0 ! !

    With the above configuration, no routes are sent from or received by the Cisco IOS XR router; when the configuration is committed, Cisco IOS XR software displays the following message:

    %BGP-4-NBR_NOPOLICY: No inbound IPv4 Unicast policy is configured for eBGP neighbor 192.168.1.5. No IPv4 Unicast prefixes will be accepted from the neighbor until inbound policy is configured. %BGP-4-NBR_NOPOLICY: No outbound IPv4 Unicast policy is configured for eBGP neighbor 192.168.1.5. No IPv4 Unicast prefixes will be sent to the neighbor until outbound policy is configured.

    A warning also shows when using the show bgp summary command if you do not have a policy configured.

    Building a Route Policy

    You need both an inbound policy and outbound policy on Cisco IOS XR software. The simplest policy is one that allows all routes to pass back and forth. Adding this to the configuration, we have:

    Table 18 EBGP Configuration in Cisco IOS and Cisco IOS XR Software with Inbound and Outbound Policies

    Cisco IOS Cisco IOS XR Software

    router bgp 5 no synchronization bgp log-neighbor-changes neighbor 192.168.1.8 remote-as 8 neighbor 192.168.1.8 ebgp-multihop 255 neighbor 192.168.1.8 update-source Loopback0 no auto-summary !

    route-policy permit pass end-policy ! router bgp 8 neighbor 192.168.1.5 remote-as 5 ebgp-multihop 255 update-source Loopback0 address-family ipv4 unicast route-policy permit in route-policy permit out ! ! !

    With the policy in place, the routes can pass.

    A complete explanation of converting route maps to RPL policies is beyond the scope of this document. However, we include an extended example here to briefly illustrate the process. See Translating Cisco IOS Route Maps to Cisco IOS XR Routing Policy Language in this document for a more complete example of the conversion process.17Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and ForwardingFor more information on writing route policies in Cisco IOS XR software, see the following documents:

    The Implementing Routing Policy on Cisco IOS XR Software module of the Cisco IOS XR Routing Configuration Guide

    The Routing Policy Language Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    To get the same behavior in Cisco IOS XR software as in Cisco IOS, create the permit route policy and apply it to every address-family (or in the af-group) for all EBGP neighbors.

    Combining the EBGP policy configuration with the af-group and session-group configuration from the IBGP example, the final configurations are:

    Table 19 Final Configuration for EBGP for Cisco IOS and Cisco IOS XR Software

    Cisco IOS Cisco IOS XRrouter bgp 5 no synchronization bgp log-neighbor-changes neighbor ebgp-peers peer-group neighbor ebgp-peers remote-as 8 neighbor ebgp-peers password 7 15140403 neighbor ebgp-peers ebgp-multihop 255 neighbor ebgp-peers update-source Loopback0 neighbor ebgp-peers soft-reconfiguration inbound neighbor ebgp-peers weight 50 neighbor ebgp-peers maximum-prefix 75 neighbor 192.168.1.8 peer-group ebgp-peers no auto-summary !

    route-policy permit pass end-policy ! router bgp 8 af-group test address-family ipv4 unicast weight 50 maximum-prefix 75 75 soft-reconfiguration inbound route-policy permit in route-policy permit out ! session-group example remote-as 5 password 7 00021C09 ebgp-multihop 255 update-source Loopback0 ! neighbor-group ebgp-peers use session-group example address-family ipv4 unicast use af-group test ! ! neighbor 192.168.1.5 use neighbor-group ebgp-peers ! !

    If you look closely at the Cisco IOS XR configuration, you see that the EBGP AS (remote-as 5) is embedded in the session group. Although you can do this if you want, it is not necessary. If you do this, you end up having to create a session group per external AS, or not use session groups.

    Policies can be cascaded, so that session groups and address family groups can inherit from each other, and settings in session groups can be overridden. Following are two other ways to accomplish the same configuration on Cisco IOS XR software while making the configuration more flexible.

    Alternate examples for creating BGP policies on Cisco IOS XR software:

    Remove the remote-as command from the neighbor group and put it in the neighbor directly:

    session-group example password 7 00021C09 ebgp-multihop 25518Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and Forwarding update-source Loopback0!neighbor-group ebgp-peers use session-group example address-family ipv4 unicast use af-group test !!neighbor 192.168.1.5 remote-as 5 use neighbor-group ebgp-peers !!

    Create a second neighbor group and use inheritance

    router bgp 8 af-group test address-family ipv4 unicast weight 50 maximum-prefix 75 75 soft-reconfiguration inbound route-policy permit in route-policy permit out ! session-group example password 7 00021C09 ebgp-multihop 255 update-source Loopback0 ! neighbor-group ASFive remote-as 5 use neighbor-group ebgp-peers ! neighbor-group ebgp-peers use session-group example address-family ipv4 unicast use af-group test ! ! neighbor 192.168.1.5 use neighbor-group ASFive !!

    The second example hints at the real power you can get with inheritance.

    Neighbor Independent Issues

    Another important issue to look at in BGP are keywords that are independent of any neighbors or policy. The three major keywords in Cisco IOS XR software for BGP are bgp, socket, and timers. The keywords you can configure under BGP are not explored in depth in this document. The bgp command keywords are listed below:

    as-path-loopcheck

    auto-policy-soft-reset

    bestpath

    bgp

    cluster-id19Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv4 Unicast Routing and Forwarding confederation

    default

    enforce-first-as

    fast-external-fallover

    graceful-restart

    log

    receive-buffer-size

    redistribute-internal

    router-id

    scan-time

    send-buffer-size

    socket

    timers bgp keepalive holdtime

    update-delay

    write-limit

    For further information on BGP configuration, see the following configuration guide and command reference modules:

    The Implementing BGP on Cisco IOS XR Software module of the Cisco IOS XR Routing Configuration Guide

    The Implementing Routing Policy on Cisco IOS XR Software module of the Cisco IOS XR Routing Configuration Guide

    The BGP Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    The Routing Policy Language Commands on Cisco IOS XR Software module of the Cisco IOS XR Routing Command Reference

    MulticastThere are two things to configure for multicast: multicast forwarding, and multicast routing.

    It is difficult to separate out exactly where Cisco IOS configures multicast forwarding versus routing, since multicast forwarding is not enabled on a Cisco IOS interface until you enable a multicast routing protocol. Also, enabling multicast-routing on a specific interface inCisco IOS XR software enables Protocol Independent Multicast (PIM) on that interface, despite the fact that there is a separate PIM configuration submode.

    Cisco IOS XR software does not support PIM dense mode, although enough of dense mode is supported to enable auto-RP; forwarding of multicast groups not related to auto-RP is not supported.

    Multicast is consistent with the Cisco IOS XR model of configuring everything under a protocol submode rather than on an interface. The examples in Table 20 illustrate enabling basic multicast (multicast forwarding and PIM with AutoRP).20Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsMultiprotocol Label Switching (MPLS)Table 20 Basic Multicast Configuration on Cisco IOS and Cisco IOS XR Software

    Cisco IOS Cisco IOS XR

    ip multicast-routing interface POS6/0 ip pim sparse-dense-mode

    multicast-routing address-family ipv4 interface POS0/6/0/2 enable ! !

    To change PIM parameters in Cisco IOS XR software, do so in router PIM configuration mode. For example, to specify an RP address rather than letting AutoRP discover it, the configuration is:

    Table 21 Changing PIM Parameters for Cisco IOS and Cisco IOS XR Multicast Configurations

    Cisco IOS Cisco IOS XR software

    ip pim rp-address 1.2.3.4 router pim address-family ipv4 rp-address 1.2.3.4 !

    The basic idea in Cisco IOS XR software is this: enabling multicast-routing turns on AutoRP (so by definition PIM sparse-dense) and also multicast forwarding on any interface you specify. Additionally, the all keyword allows you to turn on multicast on all interfaces in the router and then selectively disable some of them. If you want to modify your PIM configuration, most of the changes you make are under router pim; configurations such as administratively scoped boundaries, which have nothing to do with PIM but are instead forwarding-related, are configured under the (config-mcast-ipv4)submode.

    Multiprotocol Label Switching (MPLS)There are three major parts to MPLS configuration on Cisco IOS XR software:

    Minor Differences and Adjustments, page 21

    Label Distribution Protocol (LDP), page 22

    Traffic Engineering (TE), page 22

    No support exists in Cisco IOS XR software for static labels, VPNv4 prefixes in BGP, or AToM.

    Minor Differences and AdjustmentsTable 22 lists some minor differences in MPLS usage between the Cisco IOS and Cisco IOS XR configurations.

    Table 22 Minor DIfferences in MPLS usage for Cisco IOS and Cisco IOS XR Configurations

    Cisco IOS Cisco IOS XR software

    no mpls ip propagate-ttl mpls ip-ttl-propagate disable

    mpls label range min max {static } mpls label range {table table-id} min max21Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsMultiprotocol Label Switching (MPLS) Label Distribution Protocol (LDP)The difference in configuration between LDP in Cisco IOS and Cisco IOS XR software is similar to the difference between OSPF configurations. There is a global mpls ldp submode under which all LDP commands exist, including those relevant to an interface. Sample LDP configurations are presented in the configurations below:

    Table 23 LDP Configurations in Cisco IOS and Cisco IOS XR software

    Cisco IOS Cisco IOS XR softwarempls label protocol ldp interface POS2/1 ... tag-switching ip

    mpls ldp interface POS0/1/0/1 ! interface POS0/2/0/0 ! interface POS0/2/0/1 ! interface POS0/2/0/2 ! !

    Most of the Cisco IOS LDP capabilities also are in Cisco IOS XR software. One notable exception is the ability to configure an LDP targeted session. You can accept targeted hellos in Cisco IOS XR software using the command sequence

    mpls ldp discovery targeted-hello accept

    and the equivalent to the Cisco IOS command mpls ldp neighbor targeted is neighbor targeted under the MPLS LDP submode.

    Other configurations, such as authentication, timer tuning, and graceful restart are similar in both systems. Note that Cisco IOS XR software supports DU mode only, so there are no DoD commands.

    For further information on LDP configuration, see the following configuration guide and command reference modules:

    The Implementing MPLS Label Distribution Protocol on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Configuration Guide

    The MPLS Label Distribution Protocol Commands on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Command Reference

    Traffic Engineering (TE)TE configuration in Cisco IOS XR software is slightly different from Cisco IOS. In either Cisco IOS or Cisco IOS XR software, there are four things you configure: Interior Gateway Protocol (IGP), TE infrastructure, Resource Reservation Protocol (RSVP), and TE tunnels. IGP configuration is very similar between Cisco IOS and Cisco IOS XR software. In Cisco IOS XR software, both TE and RSVP have their own submodes, whereas in Cisco IOS neither one has a submode and most of the configuration is done on a physical interface. TE tunnel head end configuration is similar, except that in Cisco IOS XR software the name of the tunnel denotes its type, which removes the need to preface every TE tunnel command with the tunnel mpls traffic-eng command.22Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsMultiprotocol Label Switching (MPLS)A sample configuration for two routers which are tunnel head/tail pairs follows.

    Table 24 Configuration of Tunnel head/tail Pairs in Cisco IOS and Cisco IOS XR Software

    Cisco IOS Cisco IOS XR softwareinterface Tunnel1 ip unnumbered Loopback0 tunnel destination 192.168.1.1 tunnel mode mpls traffic-eng tunnel mpls traffic-eng autoroute announce tunnel mpls traffic-eng path-option 10 dynamic

    interface POS6/0 ... mpls traffic-eng tunnels ip rsvp bandwidth

    interface POS7/0 ... mpls traffic-eng tunnels ip rsvp bandwidth

    router ospf 1 mpls traffic-eng router-id Loopback0 mpls traffic-eng area 0

    interface tunnel-te1 ipv4 unnumbered Loopback0 tunnel destination 192.168.1.11 autoroute announce path-option 10 dynamic !

    mpls traffic-eng interface POS0/6/0/0 ! interface POS0/7/0/0 ! !

    router ospf lab mpls traffic-eng area 0!

    rsvp interface POS0/6/0/0 bandwidth ! interface POS0/7/0/0 bandwidth ! !

    In Cisco IOS XR software, four TE-related submodes exist below global configuration mode: tunnel interface, MPLS traffic-eng, IGP, and RSVP. In Cisco IOS, three TE-related submodes exist below global configuration mode: tunnel interface, physical interface, and IGP.

    An IS-IS TE configuration in Cisco IOS XR software is similar to an IS-IS configuration in Cisco IOS; Cisco IOS XR software supports the full range of narrow, transition, and wide metrics that Cisco IOS supports, and the TE configuration is under the IPv4 address family:

    router isis lab address-family ipv4 unicast mpls traffic-eng level 2 !!

    In Cisco IOS XR software the default metric-style is narrow, just as it is in Cisco IOS.

    For further information on TE configuration, see the following configuration guide and command reference modules:

    The Implementing MPLS Traffic Engineering on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Configuration Guide

    The MPLS Traffic Engineering Commands on Cisco IOS XR Software module of the Cisco IOS XR Multiprotocol Label Switching Command Reference23Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsQuality of Service (QoS)Quality of Service (QoS)The most commonly used QoS element on a Cisco XR 12000 Series Router is the Modular QoS CLI (MQC). Converting Cisco IOS MQC to Cisco IOS XR MQC is straightforward because the syntax is the same; the only difference is the available set of capabilities. A list of the matching options for Cisco IOS XR Software Release 3.3.0 and Cisco IOS 12.0(28)S on a Cisco XR 12000 Series Router appears in Table 25.

    Table 25 Matching Options for QoS in Cisco IOS and Cisco IOS XR Configurations

    Cisco IOS Cisco IOS XR

    access-group

    any

    atm

    cos

    dscp

    fr-dlci

    ip

    mpls

    not

    precedence

    protocol

    qos-group

    vlan

    access-group

    any

    discard-class

    dscp

    mpls

    packet

    precedence

    protocol

    qos-group

    vlan24Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsQuality of Service (QoS)Table 26 Available Policy-map Actions in Cisco IOS and Cisco IOS XR

    Cisco IOS Cisco IOS XR

    bandwidth

    police

    priority

    queue-limit

    random-detect

    service-policy

    set

    dscp

    ip

    mpls

    precedence

    atm-clp

    cos

    discard-class

    fr-de

    qos-group

    shape

    bandwidth

    police

    priority

    queue-limit

    random-detect

    service-policy

    set

    cos

    discard-class

    dscp

    mpls

    precedence

    qos-group

    srp-priority

    shape

    You have a few more class-map options in Cisco IOS than Cisco IOS XR software, but the core matching options of dscp, mpls, qos-group, and discard-class are present. Cisco IOS XR software has no support for atm-clp or fr-de, but that is because there is no support for ATM or FR encapsulation in Cisco IOS XR software.

    The actions you can take in a policy map are almost identical as well.

    One issue to note in MQC is that in Cisco IOS some measures of bandwidth are in bits per second, some are in bytes per second, and some are in kilobits per second. The three keywords in a policy-map that refer to bandwidth on a Cisco XR 12000 Series Router in 12.0(28)S are:

    bandwidth rate_in_kilobits_per_second

    police rate_in_bits_per_second bc_bytes be_bytes

    shape average cir_bits_per_second bc_bits be_bits

    In Cisco IOS XR software, everything is in kilobits per second:

    bandwidth kilobits_per_second

    police rate kilobits_per_second bc_kilobits be_kilobits

    shape average cir_kilobits_per_second burst_in_kilobits

    To convert from bytes to kilobits, multiply by 0.008. Thus, 64,000 bytes is 512 kilobits.25Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsIPv6Other parts of QoS that exist in Cisco IOS are Selective Packet Discard (SPD) and receive ACLs. Cisco IOS XR software also has Local Packet Transport Service (LPTS) to provide protection against Denial of Service (DoS) attacks. In the current release, you can monitor but not configure LPTS, so this document does not describe LPTS.

    For further information on QoS configuration, see the following configuration guide and command reference:

    Cisco IOS XR Modular Quality of Service Configuration Guide

    Cisco IOS XR Modular Quality of Service Command Reference

    IPv6IPv6 configuration is very similar to IPv4.

    Table 27 IPv6 IS-IS Configuration in Cisco IOS and Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Softwareinterface POS2/1 ipv6 address FEC0:0:0:14::5/104 ipv6 router isis labv6

    router isis labv6 net 49.0192.0168.0001.0005.00 is-type level-2-only metric-style wide redistribute connected passive-interface Loopback0 ! address-family ipv6 multi-topology exit-address-family !

    interface POS0/2/0/1 ipv6 address fec0:0:0:14::8/104

    router isis labv6 is-type level-2-only net 49.0192.0168.0001.000.8.00 interface Loopback0 passive address-family ipv6 unicast ! ! interface POS0/2/0/1 address-family ipv6 unicast ! !

    One thing to note is that Cisco IOS XR software uses multi-topology routing rather than a single topology with all prefixes as leaf nodes, so you need to enable multi-topology under the address family in Cisco IOS.

    In general, IPv6 show commands are the same as IPv4 show commands; many of the show ip commands in Cisco IOS are now show ipv4 commands in Cisco IOS XR software, and most of those commands have a show ipv6 equivalent.

    Three routing protocols in Cisco IOS XR software support IPv6:

    BGP using IPv6 unicast or multicast address-family

    OSPFv3

    IS-IS using IPv6 unicast address-family

    The IS-IS configuration appears in Table 27. A BGP configuration appears the same as previously demonstrated BGP configurations (except for using the IPv6 address-family here). OSPF, rather than having separate address families in a single routing protocol, has its own new routing protocol, OSPFv3. An OSPFv3 configuration appears like an IPv4 OSPF (also known as OSPFv2) configuration.26Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsOther Cisco IOS XR IssuesTable 28 IPv4 OSPFv2 and IPv6 OSPFv3 Configurations in Cisco IOS XR Software

    Cisco IOS XR OSPFv2 (IPv4) Cisco IOS XR OSPFv3 (IPv6)

    router ospf lab log adjacency changes area 0 interface Loopback0 passive enable ! interface POS0/1/0/1 ! interface POS0/2/0/0 ! interface POS0/2/0/1 cost 17 ! interface POS0/2/0/2 ! ! !

    router ospfv3 labv6 log adjacency changes area 0 interface Loopback0 passive ! interface POS0/1/0/1 ! interface POS0/2/0/0 ! interface POS0/2/0/1 cost 17 ! interface POS0/2/0/2 ! ! !

    There is no implementation of MPLS-TE for IPv6 in IS-IS or OSPF, so any traffic-engineering commands under the IGP will not be accepted.

    IPv6 in both Cisco IOS and Cisco IOS XR software has capabilities that are not covered in this document

    For further information on IPv6 configuration, see the following configuration guide and command reference:

    Cisco IOS XR IP Addresses and Services Configuration Guide

    Cisco IOS XR IP Addresses and Services Command Reference

    Other Cisco IOS XR IssuesThis section addresses the following miscellaneous issues:

    Access Lists, page 27

    Username Configuration and Permission Levels, page 28

    Network Time Protocol (NTP), page 29

    Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP), page 29

    Line Configurations, page 30

    Access ListsCisco IOS has standard and extended in addition to named and numbered ACLs. Cisco IOS XR software does not have named versus numbered ACLs, although you can use a set of numbers as an ASCII name string. Standard and extended ACL configurations are shown below in Table 29. For Cisco IOS, named and numbered ACLs are shown; for Cisco IOS XR software, the corresponding configuration is shown. 27Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsOther Cisco IOS XR IssuesNote that Cisco IOS XR software does not have a concept of named or numbered ACLs, and also note that there is no such thing as a standard or extended ACL; for the equivalent of the standard Cisco IOS ACL, configure a Cisco IOS XR ACL with only the source IP address specified.

    Cisco IOS XR software supports a full set of keyword equivalents for Cisco IOS.

    Table 29 Comparison of Access-lists between Cisco IOS and Cisco IOS XR Configurations

    Cisco IOS Cisco IOS XR Softwareaccess-list 10 permit 1.1.1.1access-list 10 permit 10.0.0.0 0.255.255.255

    ipv4 access-list ten 10 permit ipv4 host 1.1.1.1 any 20 permit ipv4 10.0.0.0 0.255.255.255 any

    access-list 100 permit ip 20.0.0.0 0.0.255.0 anyaccess-list 100 permit icmp any host 1.2.3.4

    ipv4 access-list 100 10 permit ipv4 20.0.0.0 0.0.255.0 any 20 permit icmp any host 1.2.3.4

    ip access-list standard test permit 9.9.9.9

    ipv4 access-list test 10 permit ipv4 host 9.9.9.9 any

    ip access-list extended moreTest permit eigrp 1.0.2.0 0.255.0.255 host 7.7.7.6

    ipv4 access-list moreTest 10 permit eigrp 1.0.2.0 0.255.0.255 host 7.7.7.6

    Cisco IOS XR software also allows you to resequence an ACL, so that if you have left yourself no space to add new lines, you can create that space. The first example shows the results of using the show ipv4 access-lists command:

    RP/0/RP/CPU0:router# show ipv4 access-lists test ipv4 access-list test 10 permit ipv4 11.0.0.0 0.0.0.255 any 11 permit ipv4 12.0.0.0 0.0.0.255 any

    Username Configuration and Permission LevelsThis section briefly describes a very powerful and therefore complex set of Cisco IOS XR software tools for allowing multiple levels of permissions to a CLI user. Cisco IOS has privilege levels; an unauthenticated user is privilege level 1, a user with the enable password is privilege level 15, and some networks use the levels in between for partial access.

    Cisco IOS XR software has the concepts of task groups and user groups that allow you much more flexibility in a more logical manner; you define a group of users that has access to a certain set of capabilities. Some of these capabilities are debugs, some are show commands, some are configurations. Different user groups have configuration access to different parts of the router, so deriving an exact translation of an unprivileged Cisco IOS user is difficult. However, at a minimum, you want to configure a root-system user; this is the most powerful user in the Cisco IOS XR scheme and is essentially the same as a fully enabled user in Cisco IOS. The configuration for a root-system user in Cisco IOS XR software is:

    username lab password 7 1042081B group root-system

    In this example, the name of the created user lab, with a password of lab. This user has the power to do anything on the router. Configuring a user with less than complete privileges is easy, as Cisco provides the following task groups:

    cisco-supportdebugging and troubleshooting features, usually used by Cisco support presonnel

    netadminconfiguration tasks, such as those for routing protocols28Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsOther Cisco IOS XR Issues operatorday-to-day monitoring activities and limited configuration rights

    root-systemconfiguration and display rights for all SDRs in the system

    root-lrconfiguration and display rights for a specific SDR

    sysadminadministrative tasks such as maintaining the location for stored core dumps or setting up the Network Timing Protocol (NTP)

    In addition, you can define your own task groups (with sets of capabilities that a task group member has) and usergroup (collections of task groups) and attach them to a username. Doing this is beyond the scope of this document, although investigation of task groups and the Cisco IOS XR authentication model is highly recommended. For information on task groups, user groups, and so on, see Cisco IOS XR System Security Configuration Guide and Cisco IOS XR Getting Started Guide.

    Beginning in Release 3.3.0, we support Secure Domain Routers (SDRs). Each SDR has its own set of usernames and access privileges. The root-system username can be used only on the DSC (primary RP of rack 0) to access the Admin EXEC and Admin configuration modes. The other usernames are assigned to a specific SDR. If the system has only the default SDR, then every user logs in to the same RP.

    Network Time Protocol (NTP)The NTP configuration in Cisco IOS XR software is similar to that in Cisco IOS:

    Table 30 NTP Configuration in Cisco IOS and Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Software

    ntp server 10.86.202.56 ntp server 161.44.71.59 !

    Hot Standby Router Protocol (HSRP) and Virtual Router Redundancy Protocol (VRRP)

    HSRP and VRRP configurations are similar in Cisco IOS and in Cisco IOS XR software.

    Table 31 HSRP and VRRP Configurations in Cisco IOS and Cisco IOS XR Software

    Cisco IOS Cisco IOS XR Softwareinterface GigabitEthernet4/0 standby 1 ip 1.2.3.4 end

    router hsrp interface GigabitEthernet0/6/0/0 hsrp 1 ipv4 1.2.3.4 ! !

    interface GigabitEthernet4/0 vrrp 1 ip 1.2.3.4 end

    router vrrp interface GigabitEthernet0/6/0/0 vrrp 1 ipv4 1.2.3.4 ! !

    The primary difference here is, of course, that you configure interface properties not on the interface directly, but under the interface submode of the protocol either router hsrp or router vrrp.29Converting Cisco IOS Configurations to Cisco IOS XR Configurations

  • Converting Cisco IOS Configurations to Cisco IOS XR ConfigurationsOther Cisco IOS XR IssuesLine ConfigurationsThe line {console | aux | vty} configurations are very similar in Cisco IOS and Cisco IOS XR software. In most networks, the console and vtys are configured; the aux port i