Table Of Contents
Configuring Cisco WAAS Network Modules for Cisco Access Routers
Prerequisites for Cisco WAAS Network Modules
Restrictions for Cisco WAAS Network Modules
About Cisco WAAS Network Modules
Setting Up Cisco WAAS Network Modules and Opening a Session
Setting Up Network Module Interfaces
Opening and Closing a Network Module Session
Operating, Maintaining, and Troubleshooting Cisco WAAS Network Modules
Shutting Down and Starting Up Cisco WAAS Network Modules
interface integrated-service-engine
service-module integrated-service-engine default-boot
service-module integrated-service-engine reload
service-module integrated-service-engine reset
service-module integrated-service-engine session
service-module integrated-service-engine shutdown
service-module integrated-service-engine statistics
service-module integrated-service-engine status
show controllers integrated-service-engine
show interfaces integrated-service-engine
Obtaining Documentation, Obtaining Support, and Security Guidelines
Configuring Cisco WAAS Network Modules for Cisco Access Routers
Revised: January 7, 2009The Cisco Wide Area Application Services (WAAS) network module (NME-WAE family of devices) works together with other wide area application engines (WAEs) in your network to optimize TCP traffic over your network.
When client and server applications attempt to communicate with each other, the network intercepts and redirects this traffic to the WAEs so that they can act on behalf of the client application and the destination server. The WAEs examine the traffic and use built-in application policies to determine whether to optimize the traffic or allow it to pass through your network unoptimized.
Contents
•Prerequisites for Cisco WAAS Network Modules
•Restrictions for Cisco WAAS Network Modules
•About Cisco WAAS Network Modules
•Setting Up Cisco WAAS Network Modules and Opening a Session
•Operating, Maintaining, and Troubleshooting Cisco WAAS Network Modules
•Obtaining Documentation, Obtaining Support, and Security Guidelines
Prerequisites for Cisco WAAS Network Modules
The prerequisites for the Cisco WAAS network modules are as follows:
Router
•Plan software upgrades or downgrades for times when you can take out of service or offline all applications that run on the host router.
•Ensure that you have the appropriate Cisco access router to serve as the host router. The Cisco Wide Area Application Services network module is supported on the following Cisco access routers:
–Cisco 2811, Cisco 2821, and Cisco 2851
–Cisco 3825 and Cisco 3845 (required for the NME-WAE-522-K9)
•Use the show version command to ensure that the router is running the IOS version listed in Table 1.
Note When minimum release requirements are met, you can change images on either the router or the network modules without affecting performance.
Network Module
•The Cisco NME-WAE modules are supported in WAAS 4.0.3 and later versions of WAAS software.
•To install the Cisco NME-WAE use the Quick Start Guide: Network Modules for Cisco Access Routers and Cisco Network Modules and Interface Cards Regulatory Compliance and Safety Information.
•The Cisco NME-WAE ships from the factory with the hardware listed in Table 1 preinstalled.
•Make a note of the network module's location in the host router:
–slot—Number of the router chassis slot for the module. After you install the module, you can get this information from the router's show running-config command output.
–unit—Number of the daughter card on the module. This value is always 0.
Note You need the slot and unit numbers for the "Setting Up Network Module Interfaces" section and the "Opening and Closing a Network Module Session" section.
File Server
•Verify that your download FTP or TFTP file server is accessible:
–FTP file server—Use for installations, backups, and restores.
–TFTP file server—Use (on the FTP-file-server machine) for boothelper operations to recover from a failed installation.
Restrictions for Cisco WAAS Network Modules
The restrictions for the Cisco WAAS network modules are as follows:
Upgrade or Downgrade
•You can do a software upgrade or downgrade only on an inactive system. You must plan upgrades or downgrades for times when you can take all applications that run on the host router out of service or offline.
•All WAE appliances and network modules that are in your network must be running the same version of the Cisco WAAS software.
Configuration
•You can configure network module software only by using a console that connects to a single serial-port console port on the host router
•You can access the WAAS software that runs on the network module by first accessing one of the following:
–The router's Cisco IOS command-line interface (CLI) to open a console session to the network module
–The WAAS graphical user interface (GUI)
About Cisco WAAS Network Modules
Cisco Wide Area Application Services is a Linux system-based application that resides on a network module that plugs into a host Cisco access router that runs Cisco IOS software. The network module is also referred to as the integrated service engine (ISE) on the Cisco IOS CLI.
The network module is a standalone Wide Area Application Engine (WAE) with its own startup and run-time configurations that are independent of the Cisco IOS configuration on the router. The module does not have an external console port. Instead, you launch and configure the module through the router, by means of a configuration session on the module. After the session, you return to the router CLI and clear the session.
The host router and the network module (the module is also referred to as an appliance or blade or, with installed software, a network module)—provide a router-integrated application platform for accelerating data-intensive applications. Typically, such applications involve the following services:
•Application-oriented networking
•Contact centers and interactive voice-response applications
•Content caching and delivery
•Data and video storage
•Network analysis
•Voice mail and auto-attendant applications
Figure 1 shows the Cisco NME-WAE faceplate and LEDs.
Figure 1 NME-WAE Faceplate and LEDs
Note The USB port is not used.
Hardware Interfaces
The host router and network module use several interfaces for internal and external communication (see Figure 2). Each interface is configurable by using a Cisco IOS software-like CLI.
Figure 2 Router and Network Module Interface
The NME-WAE accepts traffic to be optimized on either its internal or external interface but not on both interfaces. Configure either the module internal interface to the router (3 above) or the module external interface (4) but not both interfaces.
Note When using the WAAS Central Manager GUI for an NME-WAE device, the internal interface to the router is designated as slot 1, port 0 and the external network interface is designated as slot 2, port 0, regardless of the physical slot in which the NME-WAE is installed.
Setting Up Cisco WAAS Network Modules and Opening a Session
This section contains the following topics:
•Setting Up Network Module Interfaces
•Opening and Closing a Network Module Session
Note•If you lose power or connection during any of the following procedures, the system usually detects the interruption and tries to recover. If it fails to recover, reinstall the system using the boothelper.
•You can configure basic network parameters for the network module by means of the CLI, which is described in this document. For additional configuration instructions, see the Cisco Wide Area Application Services online help included with the software application.
Setting Up Network Module Interfaces
Your first configuration task is to set up the network module interfaces to the host router and to its external links. You use these interfaces to access the module for installing and configuring the
Cisco Wide Area Application Services software application.
Note The first several steps open the host-router CLI to the module. The subsequent steps configure the interface.
SUMMARY STEPS
From the Host-Router CLI
1. enable
2. configure terminal
3. interface integrated-service-engine slot/0
4. ip address router-side-ip-address subnet-mask
5. service-module ip address module-side-ip-address subnet-mask
or
service-module external ip address module-side-ip-address subnet-mask
6. service-module ip default-gateway gateway-ip-address
7. end
8. copy running-config startup-config
9. show running-config
DETAILED STEPS
Command or Action Purpose From the Host-Router CLIStep 1
enable
Example:Router> enable
Enters privileged EXEC mode on the host router. Enter your password if prompted.
Step 2
configure terminal
Example:Router# configure terminal
Enters global configuration mode on the host router.
Step 3
interface integrated-service-engine slot/0
Example:Router(config)# interface integrated-service-engine 1/0
Enters interface configuration mode for the slot where the network module resides.
Step 4
ip address router-side-ip-address subnet-mask
Example:Router(config-if)# ip address 10.0.0.20 255.255.255.0
Specifies the router interface to the module (2 in Figure 2). Arguments are as follows:
•router-side-ip-address subnet-mask—IP address and subnet mask for the interface.
Step 5
service-module ip address module-side-ip-address subnet-mask
or
service-module external ip address module-side-ip-address subnet-mask
Example:Router(config-if)# service-module ip address 10.0.0.30 255.255.255.0
or
Router(config-if)# service-module external ip address 10.0.0.30 255.255.255.0
Specifies the IP address for the module interface to the router (3 in Figure 2). To configure the external interface (4 in Figure 2) instead of the internal interface, use the second form of the command. Arguments are as follows:
•module-side-ip-address—IP address for the interface.
•subnet-mask—Subnet mask to append to the IP address; must be in the same subnet as the host-router subnet specified in Step 4.
Step 6
service-module ip default-gateway gateway-ip-address
Example:Router(config-if)# service-module ip default-gateway 10.0.0.20
Specifies the IP address for the default gateway router for the module. The argument is as follows:
•gateway-ip-address—IP address for the gateway router.
Step 7
end
Example:Router(config-if)# end
Returns to global configuration mode on the host router.
Step 8
copy running-config startup-config
Example:Router# copy running-config startup-config
Saves the router's new running configuration.
Step 9
show running-config
Example:Router# show running-config
Displays the router's running configuration so that you can verify address configurations.
Examples
The following partial output from the show running-config command shows how the interfaces are configured:
interface service-engine1/0ip address 10.0.0.20 255.255.255.0service-module integrated-service-engine ip address 10.0.0.30 255.255.255.0service-module integrated-service-engine ip default-gateway 10.0.0.20Opening and Closing a Network Module Session
You can now open and close a session on the network module. Opening a session is the equivalent of accessing a WAE appliance from its console.
The procedure listed below uses the service-module integrated-service-engine slot/0 session command to open a session. Alternatively, you can access the network module console by telneting to a specific port at the network module IP address, depending on the slot where the network module is installed, as follows:
•slot 1—telnet to port 2066
•slot 2—telnet to port 2130
•slot 3—telnet to port 2194
•slot 4—telnet to port 2258
Note You can conduct only one session at a time.
SUMMARY STEPS
From the Host-Router CLI
1. enable
2. service-module integrated-service-engine slot/0 status
3. service-module integrated-service-engine slot/0 session
From the Network Module Interface
4. Log in to the network module.
5. Perform configuration or other procedures by using the CLI.
6. Press Control-Shift-6 x.
From the Host-Router CLI
7. service-module integrated-service-engine slot/0 session clear
DETAILED STEPS
Command or Action Purpose From the Host-Router CLIStep 1
enable
Example:Router> enable
Enters privileged EXEC mode on the host router. Enter your password if prompted.
Step 2
service-module integrated-service-engine slot/0 status
Example:Router# service-module integrated-service-engine 2/0 status
Displays the status of the specified module so that you can ensure that the module is running (that is, in the steady state). For details, see the service-module integrated-service-engine status command.
Note If the module is not running, start it with one of the startup commands listed in the "Shutting Down and Starting Up Cisco WAAS Network Modules" section.
Step 3
service-module integrated-service-engine slot/0 session
or
telnet module-ip-address port
Example:Router# service-module integrated-service-engine 1/0 session
Trying 10.10.10.1, 2066 ... Open
or
Router# telnet 10.10.10.1 2066
Begins a service module session on the specified module. Do one of the following:
•To interrupt the auto-boot sequence and access the bootloader, quickly type ***.
•To start a configuration session, press Enter.
To use telnet to access the network module, use the second form of the command.
From the Network-Module InterfaceStep 4
Cisco Wide Area Application Services Engine Console
Username: admin
Password:
System Initialization Finished.
SE-Module#
Log in to the network module. The default username is admin and the default password is default.
Step 5
Example (Configuration):
SE-Module# configure terminal
SE-Module(config)#
.
.
.
SE-Module(config)# exit
SE-Module# write
Enter configuration commands on the module as needed. Configuration command choices are similar to those commands that are available on the router. Access global configuration mode by using the configure terminal command. Enter configuration commands. Then exit global configuration mode with the exit command and save your new configuration with the write command.
Step 6
Press Ctrl-Shift-6 x.
Closes the service module session and returns to the router CLI.
Note The service module session stays up until you clear it in the next step. While it remains up, you can return to it from the router CLI by pressing Enter.
From the Host-Router CLIStep 7
service-module integrated-service-engine slot/0 session clear
Example:Router# service-module integrated-service-engine 1/0 session clear
Clears the service module session for the specified module. When prompted to confirm this command, press Enter.
Where to go Next
See the "Operating, Maintaining, and Troubleshooting Cisco WAAS Network Modules" section for information about maintaining and administering the
Cisco Wide Area Application Services module.See the "Command Reference" section for a list of new and modified Cisco IOS commands used to configure the Cisco Cisco Wide Area Application Services.
Operating, Maintaining, and Troubleshooting Cisco WAAS Network Modules
This section contains the following topics:
•Shutting Down and Starting Up Cisco WAAS Network Modules
Note•The tables in these sections list only the most common router and network module commands.
–To view a complete list of available commands, type ? at the prompt
(Example:Router(config-if)#
?).–To view a complete list of command keyword options, type ? at the end of the command
(Example:Router#
service-module integrated-service-engine?).•The tables group commands by the configuration mode in which they are available. If the same command is available in more than one mode, it may act differently in each mode.
For details about configuring and maintaining your WAAS network, see the following documents:
•Cisco Wide Area Application Services Configuration Guide
•Cisco Wide Area Application Services Quick Configuration Guide
•Cisco Wide Area Application Services Command Reference
Note When using the WAAS Central Manager GUI, for an NME-WAE device, the internal interface to the router is designated as slot 1, port 0 and the external network interface is designated as slot 2, port 0, regardless of the physical slot in which the NME-WAE is installed.
Shutting Down and Starting Up Cisco WAAS Network Modules
To shut down or start up the network module or the Cisco WAAS application that runs on the module, select from the common router and network module commands listed in Table 2.
Note•Some shutdown commands can potentially disrupt service. If the command output for such a command displays a confirmation prompt, confirm by pressing Enter or cancel by typing n and pressing Enter. Alternatively, you can prevent the prompt from displaying by using the no-confirm keyword.
•Some commands shut the module or application down and then immediately restart it.
Verifying the System Status
To verify the status of an installation, upgrade, or downgrade, or to troubleshoot problems, use commands as needed from the common router and network module commands listed in Table 3.
Note Many show commands provide keyword options to display diagnostic output on your screen or send the output to a file or a URL.
Command Reference
This section documents the following new and modified Cisco IOS commands and specific commands that are used to configure the Cisco WAAS software. All other Cisco IOS software commands used with this feature are documented in the Cisco IOS Release 12.4(9) T command reference publication at this URL: http://www.cisco.com/en/US/products/ps6441/tsd_products_support_series_home.html
Note The network module is also known as the integrated-service-engine within the Cisco IOS command-line interface (CLI).
New Commands
•interface integrated-service-engine
•service-module integrated-service-engine default-boot
•service-module integrated-service-engine reload
•service-module integrated-service-engine reset
•service-module integrated-service-engine session
•service-module integrated-service-engine shutdown
•service-module integrated-service-engine statistics
•service-module integrated-service-engine status
•show controllers integrated-service-engine
•show interfaces integrated-service-engine
Modified Commands
interface integrated-service-engine
To enter the interface configuration mode for an integrated-service-engine (ISE) network module, use the interface integrated-service-engine command in global configuration mode.
interface integrated-service-engine slot/unit
Syntax Description
slot
Interface slot number.
unit
Number of the daughter card on the network module. For ISE network modules, always use 0.
Defaults
None
Command Modes
Global configuration
Command History
Usage Guidelines
This command may be used only for ISE network modules. If your system does not have this hardware, then you will not be able to enter this command.
A no form of this command (no interface integrated-service-engine) is not available. The exit command can be used to exit the interface configuration mode.
Examples
The following example shows the command for entering configuration mode for ISE network modules located in slot 1, unit 0:
Router (config)# interface integrated-service-engine 1/0Router (config-if)# exitservice-module integrated-service-engine default-boot
To configure the integrated-service-engine (ISE) network module to use the default BIOS and bootloader, use the service-module integrated-service-engine default-boot command in privileged EXEC mode.
service-module integrated-service-engine slot/unit default-boot
Syntax Description
slot
Number of the router chassis slot for the network module.
unit
Number of the daughter card on the network module. For ISE network modules, always use 0.
Defaults
None
Command Modes
Privileged EXEC
Command History
Examples
After a downtime event or failed upgrade, use the service-module integrated-service-engine slot/unit default-boot command to configure the network module to use the primary BIOS and primary bootloader to perform startup routines.
The following is sample output from the integrated-service-engine slot/unit default-boot command for a port adapter in chassis slot 2 on a Cisco router:
Router# service-module integrated-service-engine 2/0 default-bootclear Clear Default Bootset Set Default BootRouter# service-module integrated-service-engine 2/0 default-boot clearRouter# service-module integrated-service-engine 2/0 default-boot setservice-module integrated-service-engine reload
To perform a graceful shutdown and reboot of the integrated-service-engine (ISE) network module WAAS operating system, use the service-module integrated-service-engine reload command in privileged EXEC mode.
service-module integrated-service-engine slot/unit reload
Syntax Description
Defaults
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
At the confirmation prompt, press Enter to confirm the action or n to cancel.
Examples
The following example gracefully shuts down and reboots the ISE network module's WAAS operating system in slot 1:
Router# service-module integrated-service-engine 1/0 reloadDo you want to proceed with reload?[confirm]Related Commands
service-module integrated-service-engine reset
To reset the integrated-service-engine (ISE) network module hardware, use the service-module integrated-service-engine reset command in privileged EXEC mode.
service-module integrated-service-engine slot/unit reset
Syntax Description
Defaults
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
At the confirmation prompt, press Enter to confirm the action or n to cancel.
Caution Because you may lose data, use the service-module integrated-service-engine reset command only to recover from a shutdown or failed state.
Examples
The following example resets the hardware on the ISE network module in slot 1:
Router# service-module integrated-service-engine 1/0 resetUse reset only to recover from shutdown or failed state
Warning: May lose data on the hard disk!
Do you want to reset?[confirm]
Related Commands
service-module integrated-service-engine session
To begin a configuration session with an integrated-service-engine (ISE) network module through a console connection, use the service-module integrated-service-engine session command in privileged EXEC mode.
service-module integrated-service-engine slot/unit session [clear]
Syntax Description
Defaults
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Only one session at a time is allowed into the network module from the internal ISE network-module-side interface.
After starting a session, you can perform any ISE configuration task. You first access the ISE console in a user-level shell. To access the privileged EXEC command shell, where most commands are available, use the enable command.
After you finish ISE configuration and exit the ISE console session, use this command with the clear keyword to clear the session. At the confirmation prompt, press Enter to confirm the action or n to cancel.
Examples
The following example shows an ISE session being opened for an ISE network module in slot 2:
Router# service-module integrated-service-engine 2/0 session
Trying 10.10.10.1, 2066 ... OpenCisco Wide Area Application Services Engine ConsoleUsername:The following example clears the session that had been used to configure the ISE in the network module in slot 2:
Router# service-module integrated-service-engine 2/0 session clear[confirm][OK]Related Commands
service-module integrated-service-engine shutdown
To gracefully shut down an integrated-service-engine (ISE) network module, use the service-module integrated-service-engine shutdown command in privileged EXEC mode.
service-module integrated-service-engine slot/unit shutdown
Syntax Description
Defaults
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
At the confirmation prompt, press Enter to confirm the action or n to cancel.
The service-module integrated-service-engine shutdown command brings down the operating system of the specified integrated-service-engine network module in an orderly fashion to protect the hard drive. When the system has been shut down, the module can be removed from the router.
Examples
The following example gracefully shuts down the ISE network module in slot 1:
Router# service-module integrated-service-engine 1/0 shutdownShutdown is used for Online removal of Service Module.Do you want to proceed with shutdown?[confirm]Use service module reset command to recover from shutdown.Related Commands
service-module integrated-service-engine statistics
To display reset and reload information for an integrated-service-engine (ISE) network module and its Cisco IOS software, use the service-module integrated-service-engine statistics command in EXEC mode.
service-module integrated-service-engine slot/unit statistics
Syntax Description
Defaults
none
Command Modes
User EXEC
Privileged EXEC
Command History
Usage Guidelines
The statistics displayed by this command represent control communication events between the network module and the router. For WAAS-specific statistics, access the WAAS CLI and use the show statistics commands documented in the Cisco Wide Area Application Services Command Reference.
Examples
The following example displays information for an ISE network module that is installed in slot 2 of an access router:
Router# service-module integrated-service-engine 2/0 statistics
Module Reset Statistics:CLI reset count = 1CLI reload count = 0Registration request timeout reset count = 0Error recovery timeout reset count = 0Module registration count = 2The last IOS initiated event was a cli reset at *13:34:33.847 UTC Sun Dec 18 2005service-module integrated-service-engine status
To display configuration information related to software on the integrated-service-engine (ISE) side of a network module, use the service-module integrated-service-engine status command in privileged EXEC mode.
service-module integrated-service-engine slot/unit status
Syntax Description
Defaults
None
Command Modes
Privileged EXEC
Command History
Usage Guidelines
Use the service-module integrated-service-engine status command to do the following tasks:
•Display the ISE network module's software release version
•Check the ISE network module status (steady or down)
Examples
The following example displays information for an ISE network module that is installed in slot 1 of an access router:
Router# service-module integrated-service-engine 1/0 statusService Module is Cisco Integrated-Service-Engine1/0Service Module supports session via TTY line 66Service Module is in Steady stateGetting status from the Service Module, please wait..Cisco Wide Area Application Services Software 4.0.2 (b170 Sep 27 2006 08:56:37)Restarted at Sun Jan 1 15:32:38 2006The following example displays information for an ISE network module that is not running:
Router# service-module integrated-service-engine 1/0 statusService Module is Cisco Integrated-Service-Engine1/0Service Module supports session via TTY line 258Service Module is trying to recover from reset/shutdownService Module status is not availableRelated Commands
show controllers integrated-service-engine
To display controller information for integrated-service-engine (ISE) network modules, use the show controllers integrated-service-engine command in privileged EXEC mode.
show controllers integrated-service-engine slot/unit
Syntax Description
Defaults
None
Command Modes
Privileged EXEC
Command History
Examples
The following example displays controller information for the network module that is installed in slot 1 of an access router:
Router# show controllers integrated-service-engine 1/0Interface Integrated-Service-Engine1/0Hardware is Intel 82559 FastEthernetIDB: 82A92DC4, FASTSEND: 8021B488, MCI_INDEX: 0INSTANCE=0x82A94534Rx Ring entries = 64Rx Shadow = 0x82A947A0Rx Ring = 0x 3CB5160Rx Ring Head = 14Rx Ring Last = 13Rx Buffer Descr = 0x 3CB55A0Rx Buffer Descr Head = 14Rx Buffer Descr Last = 13Rx Shadow (malloc) = 0x82A947A0Rx Ring (malloc) = 0x 3CB5160Rx Buffer Descr (malloc) = 0x 3CB55A0Tx Ring entries = 128Tx Shadow = 0x82A948D0Tx Shadow Head = 79Tx Shadow Tail = 79Tx Shadow Free = 128Tx Ring = 0x 3CB59E0Tx Head = 81Tx Last = 80Tx Tail = 81Tx Count = 0Tx Buffer Descr = 0x 3CB6A20Tx Buffer Descr Head = 0Tx Buffer Descr Tail = 0Tx Shadow (malloc) = 0x82A948D0Tx Ring (malloc) = 0x 3CB59E0Tx Buffer Descr (malloc) = 0x 3CB6A20CONTROL AND STATUS REGISTERS (CSR)=0x40800000SCB Intr Mask = 00SCB CU/RU Cmd = 00SCB Intr Status = 00SCB CU/RU Status = 50SCB General Ptr = 00000000PORT = 00000000EEPROM = 0008FLASH = 0002MDI = 1821782DRx Byte Count = 00000608PMDR = 80FC Cmd = 00FC Threshold = 03Early Rx = 00General Status = 05General Control = 00PHY REGISTERSRegister 0x00: 1000 782D 02A8 0154 0441 45E1 0001 0000Register 0x08: 0000 0000 0000 0000 0000 0000 0000 0000Register 0x10: 0401 0000 0001 0000 0000 0000 0000 0000Register 0x18: 0000 0000 8000 0000 0000 0000 0000 0000HARDWARE STATISTICSRx good frames: 14Rx CRC: 0Rx alignment: 0Rx resource: 0Rx overrun: 0Rx collision detects: 0Rx short: 0Tx good frames: 79Tx maximum collisions: 0Tx late collisions: 0Tx underruns: 0Tx lost carrier sense: 0Tx deferred: 0Tx single collisions: 0Tx multiple collisions: 0Tx total collisions: 0FC Tx pause: 0FC Rx pause: 0FC Rx unsupported: 0INTERRUPT STATISTICSCX = 613298FR = 805CNA = 0RNR = 0MDI = 0SWI = 0FCP = 0Receive All Multicasts = enabledReceive Promiscuous = disabledLoopback Mode = disabledTable 4 describes the significant fields shown in the command output.
Related Commands
show diag
To display hardware and diagnostic information for a networking device, a line card, a processor, a jacket card, a chassis, or a network module, use the show diag command in privileged EXEC configuration mode.
show diag [slot-number]
Syntax Description
slot-number
(Optional) Slot number of the interface. If a slot number is not specified, diagnostic information for all slots is displayed.
Defaults
None
Privileged EXEC
Command History
Usage Guidelines
Use this command to determine the type of hardware installed in your router, and to show detailed hardware information and EEPROM version information.
This command displays information for the motherboard, WAN interface cards (WICs), voice interface cards (VICs), high-speed WICs (HWICs), ATM interface cards (AICs), advanced integration modules (AIMs), port adapters, shared port adapters (SPAs), modular services cards (MSCs), SPA interface processors (SIPs), and network modules (NME).
Examples
NME-WAE-502-K9 Installed in a Cisco 3845: Example
The following is sample output of the show diag command for an integrated-service-engine WAAS network module that is installed in slot 2 of a Cisco 3845 router:
Router# show diag 2Slot 2:Integrated Service Engine Port adapter, 1 portPort adapter is analyzedPort adapter insertion time unknownEEPROM contents at hardware discovery:Hardware Revision : 1.0Top Assy. Part Number : 800-28152-01Board Revision : 03Deviation Number : 0Fab Version : 01PCB Serial Number : FOC101430NKRMA Test History : 00RMA Number : 0-0-0-0RMA History : 00Version Identifier : NACLEI Code : TDBProduct (FRU) Number : NME-WAE-502-K9EEPROM format version 4EEPROM contents (hex):0x00: 04 FF 40 05 5B 41 01 00 C0 46 03 20 00 6D F8 010x10: 42 30 33 88 00 00 00 00 02 01 C1 8B 46 4F 43 310x20: 30 31 34 33 30 4E 4B 03 00 81 00 00 00 00 04 000x30: 89 4E 41 00 00 D9 02 40 C1 C6 8A 54 44 42 00 000x40: 00 00 00 00 00 CB 88 4E 4D 45 2D 52 56 50 4E FF0x50: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF0x60: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF0x70: FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
Table 5 describes the significant fields shown in the command output.
Related Commands
show interfaces integrated-service-engine
To display basic interface configuration information for an integrated-service-engine (ISE) network module, use the show interfaces integrated-service-engine command in privileged EXEC mode.
show interfaces integrated-service-engine slot/unit
Syntax Description
Command Modes
Privileged EXEC
Command History
Usage Guidelines
The following example displays interface status and data for an ISE that is installed in slot 1 of a Cisco 2811 router:
Router# show interfaces integrated-service-engine 1/0Integrated-Service-Engine1/0 is up, line protocol is upHardware is BCM5703, address is 0017.942a.c9c0 (bia 0017.942a.c9c0)Internet address is 2.43.181.181/30MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,reliability 255/255, txload 1/255, rxload 1/255Encapsulation ARPA, loopback not setKeepalive not setFull-duplex, 1000Mb/s, link type is force-up, media type is internaloutput flow-control is XON, input flow-control is XONARP type: ARPA, ARP Timeout 04:00:00Last input 00:00:02, output 00:00:02, output hang neverLast clearing of "show interface" counters neverInput queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0Queueing strategy: fifoOutput queue: 0/512 (size/max)5 minute input rate 0 bits/sec, 0 packets/sec5 minute output rate 0 bits/sec, 0 packets/sec298674 packets input, 20019979 bytes, 0 no bufferReceived 1413 broadcasts, 0 runts, 0 giants, 0 throttles0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored0 watchdog, 1365 multicast, 0 pause input0 input packets with dribble condition detected396589 packets output, 384808087 bytes, 0 underruns0 output errors, 0 collisions, 1 interface resets0 babbles, 0 late collision, 0 deferred0 lost carrier, 0 no carrier, 0 pause output0 output buffer failures, 0 output buffers swapped outTable 6 describes the significant fields shown in the command output.
Related Commands
Command Descriptioninterface integrated-service-engine
Configures an interface for an ISE and enters interface configuration mode.
show diag
Displays controller information for ISE network modules.
Glossary
Note See Internet working Terms and Acronyms for terms not included in this glossary.
Obtaining Documentation, Obtaining Support, and Security Guidelines
For information on obtaining documentation, obtaining support, providing documentation feedback, security guidelines, and also recommended aliases and general Cisco documents, see the monthly What's New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Related Documentation
For additional information on the Cisco WAAS software, Cisco IOS software, and the network module hardware, see the following documentation:
Related Topic Document TitleCisco Wide Area Application Services
Cisco Wide Area Application Services Configuration Guide
Cisco Wide Area Application Services Quick Configuration Guide
Cisco Wide Area Application Services Command Reference
All available on the Cisco WAAS documentation page at:
http://www.cisco.com/en/US/products/ps6870/tsd_products_support_series_home.html
Cisco IOS software
Cisco IOS Software http://www.cisco.com/en/US/products/ps6441/tsd_products_support_series_home.html
Network Modules
Installing Cisco Network Modules in Cisco Access Routers
Cisco Network Modules and Interface Cards Regulatory Compliance and Safety Information
http://www.cisco.com/en/US/docs/routers/access/interfaces/rcsi/IOHrcsi.html
CCDE, CCENT, Cisco Eos, Cisco HealthPresence, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0812R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
© 2006-2009 Cisco Systems, Inc. All rights reserved.