Specifications

9-72
Cisco MGX 8800/8900 Series Software Configuration Guide
Release 5.1, Part Number OL-6482-01, Rev. A0, January 25, 2005
Chapter 9 Switch Operating Procedures
Verifying PXM Disk Data
Avoiding Command Mode Authorization Issues with RPM
Cisco Route Processor Module (RPM) cards are router cards that can be installed in Cisco MGX
switches. The switch has its own operating system and so does each RPM card installed in the switch.
When command mode authorization is enabled, RPM login names, passwords, and commands must be
authorized by the AAA server and the RPM operating system, which is IOS. If users establish Telnet
sessions from an RPM card to a different operating system (such as a UNIX host running CWM), all
commands for the additional operating system must be authorized by the AAA server and that operating
system.
The switch software provides a special command to prevent redundant authorization and the enormous
amount of configuration that would be required to configure the AAA server for multiple operating
systems. The cnfaaa-ignore-ios command configures the switch to exclude select slots from
authentication and authorization when the slots host RPM cards.
To enable or disable switch authentication and authorization for slots that host RPM cards, log in using
a username with SERVICE_GP privileges or higher and enter the cnfaaa-ignore-ios command in the
following format:
M8850_LA.7.PXM.a > cnfaaa-ignore-ios add|del [slot]
Enter the add keyword to add the selected slot or slots to the list of slots that are ignored for switch
authentication and authorization when an RPM card is installed. Enter the del keyword to delete the
selected slot or slots from the ignored list. If you specify a slot, the command applies to only that slot.
If you do not specify a slot, the command applies to all slots in the switch.
The following example configures the switch to ignore switch authentication and authorization for card
slot 3 when an RPM card is inserted in that slot:
M8830_SF.2.PXM.a > cnfaaa-ignore-ios add 3
AAA CONFIGURATION:
Authentication Methods : tacacs+ cisco
Authorization Methods : local cisco
Authorization Type : group
Default Privilege Level : NOUSER_GP
Prompt Display : acs
SSH/FTP Message Type : Inbound PAP Login
IOS Exclusion List : 3
WARNING: The newly configured IOS card exclusion list will apply to new session.
This configuration has no impact on existing sessions.
Verifying PXM Disk Data
When a failure occurs before a write is complete, the data on the active and standby hard disk may not
match.
Enter the verifydiskdb check [-l <level>] [-s <slot>] [-p <pass>] command at the active PXM to run
the disk verification utility. Table 9-31 describes the possible options for the verifydiskdb check
command.
Note Cisco recommends that you run the disk verification utility during a time when there is minimal activity
on the switch.
Table 9-31 describes the possible options for the verifydiskdb check command.