Performing an In Service Software Upgrade

This module describes how to perform an In Service Software Upgrade (ISSU) process.

Finding Feature Information

Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.

Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/​go/​cfn. An account on Cisco.com is not required.

Prerequisites for Performing an ISSU

  • Both the active and standby route processors (RPs) must be available in the system.

  • The new and old Cisco software images must be loaded into the file systems of both the active and standby RPs before you begin the ISSU process.

  • Stateful switchover (SSO) must be configured and working properly.

  • Nonstop forwarding (NSF) must be configured and working properly.

  • Before you perform ISSU, the file system for both the active and standby RPs must contain the new ISSU-compatible image. The current version running in the system must also support ISSU. You can issue various commands to determine RP versioning and compatibility, or you can use the ISSU application on Cisco Feature Navigator.

Restrictions for Performing an ISSU

General Restrictions

  • Do not make hardware changes while performing an ISSU process.

  • Perform upgrades only during a maintenance window. (Recommended)

  • Do not enable new features that require configuration changes during the ISSU process.

  • If a feature is not available in a downgrade of a Cisco software image, disable that feature before you initiate the ISSU process.

  • A permanent "ISSU barrier" exists between pre-IOS XE 3.6.0E and IOS XE 3.6.0 releases: ISSU is supported between versions on the same side of the barrier but it is not supported between versions on opposite sides.


    Note


    This restriction applies to Catalyst 4500X in a VSS, as well as to Supervisor Engine 7E, Supervisor Engine 7LE, and Supervisor Engine 8E in a VSS or in a redundant chassis. Four scenarios will illustrate the restriction:
    • If you are running a release prior to IOS XE 3.6.0E (3.5.1E, for example), you cannot perform an ISSU upgrade to IOS XE 3.6.0E.

    • If you are running IOS XE 3.6.0E, you cannot perform an ISSU downgrade to IOS XE 3.5.0E.

    • If you are running IOS XE 3.6.0E, you can perform an ISSU upgrade to IOS XE 3.6.1E (when released).

    • If you are running a release after IOS XE 3.6.0E (for example, 3.7.0, when released), you cannot perform an ISSU downgrade to IOS XE 3.5.0E.


Termination of Virtual Template Manager for ISSU Restrictions

The Virtual Template Manager for ISSU is not supported in Cisco IOS Releases 12.2(31)SB and 12.2(33)SB.

Cisco 10000 Series Internet Router Platform Restrictions

  • ISSU is available only in Cisco IOS 12.2(28)SB software released for theand later.

  • The following line cards support ISSU:
    • 1-port channelized OC-12/STM-4
    • 1-port Gigabit Ethernet
    • 1-port half-height Gigabit Ethernet
    • 1-port OC-12 ATM
    • 1-port OC-12 Packet over SONET (PoS)
    • l-port OC-48 PoS
    • 4-port channelized OC-3/STM-1
    • 4-port OC-3 ATM IR
    • 4-port OC-3 ATM LR
    • 4-port half-height channelized T3
    • 6-port channelized T3
    • 6-port OC-3 PoS
    • 8-port ATM E3/DS3
    • 8-port E3/DS3
    • 8-port half-height Fast Ethernet
    • 24-port channelized E1/T1
  • The following interface cards support ISSU:
    • SPA Interface Processor (10000-SIP-600)
    • 2-port GE SPA
    • 5-port GE SPA
    • 8-port GE SPA
    • 1-port 10GE SPA

Cisco Catalyst 4500 Restrictions

  • The single-step complete upgrade process cycle is available on the Cisco Catalyst 4500 series switch in Cisco IOS Release 12.2(47)SG.

  • An ISSU upgrade process available on the Cisco Catalyst 4500 series switch from any previous releases to Cisco IOS XE Release 3.6E is not supported. Installer uses compatibility meta data prior to performing ISSU, and upgrade to non-compatible image is terminated.

Information About Performing an ISSU

ISSU Process Overview

ISSU allows Cisco software to be upgraded or downgraded, at a router level, while the system continues to forward packets. ISSU takes advantage of the Cisco high availability infrastructure--Cisco NSF with SSO and hardware redundancy--and eliminates downtime associated with software upgrades or version changes by allowing updates while the system remains in service. Cisco high availability features combine to lower the impact that planned maintenance activities have on network service availability, with the results of less downtime and better access to critical systems.

SSO mode supports configuration synchronization. When images on the active and standby RPs are different, this feature allows the two Route Processors (RPs) to remain synchronized although they may support different sets of commands.

An ISSU-capable router consists of two RPs (active and standby) and one or more line cards. Before initiating the ISSU process, you must copy the Cisco IOS software into the file systems of both RPs

After you have copied the Cisco IOS software to both file systems, load the new version of Cisco IOS software onto the standby RP.

After switchover, the standby RP takes over as the new active RP.

Then, the former active RP, which is now the new standby RP, is loaded with the new software.

The two RPs in a system can be in one of three different states during ISSU:

  • Active--One RP is actively forwarding packets with old software. After the ISSU process is performed, the original active RP becomes the standby RP.

  • Standby--Perform ISSU on the standby RP, loading it with new software. After the ISSU process is performed, the original standby RP is the new active RP.

  • Hot standby--After the original standby RP becomes the new active RP, load the new software image into the new standby RP. Doing so makes the standby RP a hot standby RP.

The figure below shows the ISSU states during the ISSU process.

Figure 1. ISSU States During the ISSU Process

ISSU Rollback Timer

Cisco IOS software maintains an ISSU rollback timer. The rollback timer provides a safeguard against an upgrade that may leave the new active RP in a state in which communication with the RP is severed.

Configuring the rollback timer to fewer than 45 minutes (the default) eliminates waiting in case the new software is not committed or the connection to the router is lost while it is in runversion mode. Configure the rollback timer to more than 45 minutes in order to have enough time to verify the operation of the new Cisco IOS software before committing the new image.

Fast Software Upgrade

When Cisco IOS software versions are not compatible and ISSU is not possible, the FSU procedure can be performed within the ISSU command context. Through the use of optional parameters in ISSU commands, the system reverts to RPR mode rather than the SSO mode required for ISSU.

FSU using the ISSU command context works only with ISSU-aware Cisco software versions. If you want to downgrade to a pre-ISSU version, you must use the manual FSU method.

Enhanced Fast Software Upgrade

Enhanced Fast Software Upgrade (eFSU) is an improvement over FSU, reducing the downtime during a Cisco software upgrade.

At the linecard level, an enhanced Fast Software Upgrade (eFSU) process minimizes linecard downtime during upgrades to between 30 and 90 seconds, by pre-loading the new linecard image before the ISSU switchover occurs from the active to the standby Route Processor.

See the Enhanced Fast Software Upgrade on the Cisco 7600 Series Routers for more information.

Versioning Capability in Cisco Software to Support ISSU

Before the introduction of the ISSU capability, the SSO mode of operation required each RP to be running the same versions of Cisco software. The operating mode of the system in a redundant HA configuration is determined by exchanging version strings when the standby RP registers with the active RP.

The system entered SSO mode only if the versions running on both RPs were the same. If not, the redundancy mode was reduced to ensure compatibility. With ISSU capability, the implementation allows two different but compatible release levels of Cisco software images to interoperate in SSO mode and enables software upgrades while packet forwarding continues. Version checking done before ISSU capability was introduced is no longer sufficient to allow the system to determine the operating mode.

ISSU requires additional information to determine compatibility between software versions. Therefore, a compatibility matrix is defined that contains information about other images with respect to the one in question. This compatibility matrix represents the compatibility of two software versions, one running on the active and the other on the standby RP, and to allow the system to determine the highest operating mode it can achieve. Incompatible versions will not be able to progress to SSO operational mode.

The Cisco software infrastructure has been internally modified and redesigned to accommodate subsystem versioning with ISSU. Cisco software subsystems correspond to feature sets and software component groupings. Features or subsystems that maintain state information across RPs are HA-aware or SSO clients. A mechanism called ISSU Framework, or ISSU protocol, allows subsystems within Cisco software to communicate RP to RP and to negotiate the message version for communication between RPs. Internally, all NSF- and SSO-compliant applications or subsystems that are HA-aware must follow this protocol to establish communication with their peer across different versions of software.

Compatibility Matrix

You can perform the ISSU process when the Cisco software on both the active and the standby RP is capable of ISSU and the old and new images are compatible. The compatibility matrix information stores the compatibility among releases as follows:

  • Compatible--The base-level system infrastructure and all optional HA-aware subsystems are compatible. An in-service upgrade or downgrade between these versions will succeed with minimal service impact. The matrix entry designates the images to be compatible (C).

  • Base-level compatible--One or more of the optional HA-aware subsystems is not compatible. An in-service upgrade or downgrade between these versions will succeed; however, some subsystems will not be able to maintain state during the transition. The matrix entry designates the images to be base-level compatible (B).

  • Incompatible--A core set of system infrastructure exists that must be able to interoperate in a stateful manner for SSO to function correctly. If any of these required features or protocols is not interoperable, then the two versions of the Cisco software images are declared to be incompatible. An in-service upgrade or downgrade between these versions is not possible. The matrix entry designates the images to be incompatible (I).

If you attempt to perform ISSU with a peer that does not support ISSU, the system automatically uses Fast Software Upgrade (FSU) instead.

The compatibility matrix represents the compatibility relationship a Cisco software image has with all of the other Cisco software versions within the designated support window (for example, all of those software versions the image “knows” about) and is populated and released with every image. The matrix stores compatibility information between its own release and prior releases. It is always the newest release that contains the latest information about compatibility with existing releases in the field. The compatibility matrix is available within the Cisco software image and on Cisco.com so that users can determine in advance whether an upgrade can be done using the ISSU process.

SNMP Support for ISSU

ISSU - SNMP for SSO provides a mechanism for synchronizing the Simple Network Management Protocol (SNMP) configurations and the MIBs that support SSO from the active RP to the standby RP, assuming that both RPs are running the same version of Cisco software. This assumption is not valid for ISSU.

ISSU - SNMP provides an SNMP client that can handle ISSU transformations for the MIBs. An SNMP client (SIC) handles ISSU for all MIBs and handles the transmit and receive functions required for ISSU. During SNMP, a MIB is completely synchronized from the active RP to the standby RP only if the versions of the MIB on both Cisco software releases are the same.

Virtual Template Manager for ISSU

The virtual template manager feature for ISSU provides virtual access interfaces for sessions that are not HA-capable and are not synchronized to the standby router. The virtual template manager uses a redundancy facility (RF) client to allow the synchronization of virtual access interfaces as they are created.

The virtual databases have instances of distributed FIB entries on line cards. Line cards require synchronization of content and timing in all interfaces to the standby processor to avoid incorrect forwarding. If the virtual access interface is not created on the standby processor, the interface indexes will be corrupted on the standby router and line cards, which will cause problems with forwarding.

Compatibility Verification Using Cisco Feature Navigator

The ISSU application on Cisco Feature Navigator allows you to:

  • Select an ISSU-capable image

  • Identify which images are compatible with that image

  • Compare two images and understand the compatibility level of the images (that is, compatible, base-level compatible, and incompatible)

  • Compare two images and see the client compatibility for each ISSU client

  • Provide links to release notes for the image

ISSU-Capable Protocols and Applications

The following protocols and applications support ISSU:

  • FHRP - HSRP Group Shutdown--FHRP - HSRP group shutdown is supported in ISSU.

  • ISSU - ARP--Address Resolution Protocol (ARP) is supported in ISSU.

  • ISSU - ATM--Asynchronous Transfer Mode (ATM) is supported in ISSU. The application requirements for ISSU are as follows:
    • Identify the ATM client as nonbase
    • Support message versioning of ATM HA event synchronous messages
    • Provide capability exchange between peers
  • ISSU - Dynamic Host Configuration Protocol (DHCP) on-demand address pool (ODAP) client/server--This feature is supported in ISSU.

  • ISSU - DHCP proxy client--The DHCP proxy client feature is supported in ISSU.

  • ISSU - DHCP relay on unnumbered interface--The DHCP relay on unnumbered interface feature is supported in ISSU.

  • ISSU - DHCP server--The DHCP server feature is supported in ISSU.

  • ISSU - DHCP snooping--DHCP snooping is supported in ISSU.

  • ISSU - EtherChannel - Port Aggregation Protocol (PagP) and Link Aggregate Control Protocol (LACP) support ISSU.

  • ISSU - First Hop Routing Protocol (FHRP) - Gateway Load Balancing Protocol (GLBP) is supported in ISSU.

  • ISSU - FHRP/HSRP--The Hot Standby Router Protocol (HSRP) is supported in ISSU.

  • ISSU - Frame Relay--The Frame Relay protocol is supported in ISSU.

  • ISSU - HDLC--The High-Level Data Link Control (HDLC) protocol is supported in ISSU.

  • ISSU - IEEE 802.1x--The IEEE 802.1x protocol is supported in ISSU.

  • ISSU - IEEE 802.3af--IEEE 802.3af is supported in ISSU.

  • ISSU - Internet Group Management Protocol (IGMP) snooping--IGMP snooping is supported in ISSU.

  • ISSU - IP host--The IP host is supported in ISSU.

  • ISSU - IPv4 Multicast - IPv4 multicast is supported in ISSU.

  • ISSU - IS-IS--The Intermediate System-to-Intermediate System (IS-IS) protocol is supported in ISSU.

  • ISSU - MTR--Multitopology routing (MTR) is supported in ISSU.

  • ISSU - MPLS L3VPN--Multiprotocol Label Switching (MPLS) is supported in ISSU. For information about upgrading ISSU MPLS-related applications through ISSUt.

  • ISSU - Port security--Port security is supported in ISSU.

  • ISSU - PPP/MLP--multilink PPP (MLP) support ISSU.

  • ISSU - PPP over ATM (PPPoA) and PPP over Ethernet (PPPoE) support ISSU.

  • ISSU - QoS support--The quality of service (QoS) feature is supported in ISSU.

  • ISSU - RIB/VRF - The RIB/VRF feature is supported in ISSU.

  • ISSU - SNMP--SNMP is supported in ISSU.

  • ISSU - Spanning-Tree Protocol (STP)--STP is supported in ISSU.

How to Perform an ISSU

Displaying ISSU Compatibility Matrix Information

SUMMARY STEPS

    1.    enable

    2.    show issu comp-matrix {negotiated | stored}


DETAILED STEPS
     Command or ActionPurpose
    Step 1 enable


    Example:
    Device> enable
     

    Enables privileged EXEC mode.

    • Enter your password if prompted.

     
    Step 2 show issu comp-matrix {negotiated | stored}


    Example:
    Device# show issu comp-matrix negotiated
     

    Displays information about the the compatibility of the two software versions, one running on the active and the other on the standby RP.

     

    Loading Cisco IOS Software on the Standby RP

    SUMMARY STEPS

      1.    enable

      2.    issu loadversion image-name

      3.    show issu state [detail]


    DETAILED STEPS
       Command or ActionPurpose
      Step 1 enable


      Example:
      Device> enable
       

      Enables privileged EXEC mode.

      • Enter your password if prompted.

       
      Step 2 issu loadversion image-name


      Example:
      Device# issu loadversion a disk0:c10k2-p11-mz.2.20040830 b stby-disk0:c10k2-p11-mz.2.20040830
       

      Starts the ISSU process.

      Note   

      The active and standby slots are optional for this command. You must provide the same image-name for both the active and standby slots. Active slot number is not available for this command.

      It may take several seconds after the issu loadversion command is entered for Cisco IOS software to load onto the standby RP and for the standby RP to transition to SSO mode.

       
      Step 3 show issu state [detail]


      Example:
      Device# show issu state
       

      Displays the state of the device during the ISSU process.

      • Confirm that the standby RP is loaded and is in SSO mode.

       

      Switching to the Standby RP

      SUMMARY STEPS

        1.    enable

        2.    issu runversion


      DETAILED STEPS
         Command or ActionPurpose
        Step 1 enable


        Example:
        Device> enable
         

        Enables privileged EXEC mode.

        • Enter your password if prompted.

         
        Step 2 issu runversion


        Example:
        Device# issu runversion b stby-disk0:c10k2-p11-mz.2.20040830
         

        Forces a switchover of the active to the standby processor and causes the newly active processor to run the new image.

        Note    The slot image parameter is optional for this command.
         

        Stopping the ISSU Rollback Timer

        SUMMARY STEPS

          1.    enable

          2.    show issu rollback-timer

          3.    issu acceptversion


        DETAILED STEPS
           Command or ActionPurpose
          Step 1 enable


          Example:
          Device> enable
           

          Enables privileged EXEC mode.

          • Enter your password if prompted.

           
          Step 2 show issu rollback-timer


          Example:
          Device# show issu rollback-timer 
           

          Displays amount of time left before an automatic rollback will occur.

           
          Step 3 issu acceptversion


          Example:
          Device# issu acceptversion b disk0:c10k2-p11-mz.2.20040830 
           

          Halts the rollback timer and ensures the new Cisco IOS software image is not automatically aborted during the ISSU process.

          • You must enter this command within the time period specified by the rollback timer displayed in the previous step.

          • The active slot-number and slot-name parameters are optional for this command.

           

          Verifying the ISSU Software Installation

          SUMMARY STEPS

            1.    enable

            2.    show issu state [detail]

            3.    show redundancy [clients | counters | debug-log | handover | history | states | inter-device]


          DETAILED STEPS
             Command or ActionPurpose
            Step 1 enable


            Example:
            Device> enable
             

            Enables privileged EXEC mode.

            • Enter your password if prompted.

             
            Step 2 show issu state [detail]


            Example:
            Device# show issu state
             

            Displays the state of the RPs during the ISSU process.

             
            Step 3 show redundancy [clients | counters | debug-log | handover | history | states | inter-device]


            Example:
            Device# show redundancy
             

            Displays current or historical status, mode, and related redundancy information about the device.

             

            Enabling the New Standby RP to Use New Software Version

            SUMMARY STEPS

              1.    enable

              2.    issu commitversion


            DETAILED STEPS
               Command or ActionPurpose
              Step 1 enable


              Example:
              Device> enable
               

              Enables privileged EXEC mode.

              • Enter your password if prompted.

               
              Step 2 issu commitversion


              Example:
              Device# issu commitversion a stby-disk0:c10k2-p11-mz.2.20040830
               

              Allows the new Cisco IOS software image to be loaded into the standby RP.

              Note    The slot active-image parameter is optional for this command.
               

              Aborting a Software Upgrade Using ISSU

              If you abort the process after you load a new version on the standby RP and before switching to the standby RP, the standby RP is reset and reloaded with the original software.

              If you abort the process after switching to the standby RP or stopping an automatic rollback, a second switchover is performed to the new standby RP that is still running the original software version. The RP that had been running the new software is reset and reloaded with the original software version.

              SUMMARY STEPS

                1.    enable

                2.    issu abortversion slot image


              DETAILED STEPS
                 Command or ActionPurpose
                Step 1 enable


                Example:
                Device> enable
                 

                Enables privileged EXEC mode.

                • Enter your password if prompted.

                 
                Step 2 issu abortversion slot image


                Example:
                Device# issu abortversion b disk0:c10k2-p11-mz.2.20040830
                 

                Aborts the ISSU upgrade or downgrade process in progress and restores the router to its state before the process had started.

                 

                Configuring the Rollback Timer to Safeguard Against Upgrades

                Before You Begin

                The Route Processors (RPs) must be in the init state.

                SUMMARY STEPS

                  1.    enable

                  2.    configure terminal

                  3.    configure issu set rollback timer seconds

                  4.    exit

                  5.    show issu rollback timer


                DETAILED STEPS
                   Command or ActionPurpose
                  Step 1 enable


                  Example:
                  Device> enable
                   

                  Enables privileged EXEC mode.

                  • Enter your password if prompted.

                   
                  Step 2 configure terminal


                  Example:
                  Device# configure terminal
                   

                  Enters global configuration mode.

                   
                  Step 3 configure issu set rollback timer seconds


                  Example:
                  Device(config)# configure issu set rollback timer 3600
                   

                  Configures the rollback timer value.

                   
                  Step 4 exit


                  Example:
                  Device(config)# exit
                   

                  Returns the user to privileged EXEC mode.

                   
                  Step 5 show issu rollback timer


                  Example:
                  Device# show issu rollback timer
                   

                  Displays the current setting of the ISSU rollback timer.

                   

                  Configuration Examples for Performing an ISSU

                  Example Verifying Redundancy Mode Before Beginning the ISSU Process

                  Before you begin the ISSU process, verify the redundancy mode for the system. NSF and SSO must be configured before attempting an ISSU. The following example displays verification that the system is in SSO mode and that slot A--RP A is the active R, and slot B--RP B is the standby RP. Both RPs are running the same Cisco software image.

                  Device# show redundancy states
                          my state = 13 -ACTIVE 
                        peer state = 8  -STANDBY HOT 
                             Mode = Duplex
                             Unit = Primary
                          Unit ID = 0
                  Redundancy Mode (Operational) = SSO
                  Redundancy Mode (Configured)  = SSO
                       Split Mode = Disabled
                     Manual Swact = Enabled
                   Communications = Up
                     client count = 31
                   client_notification_TMR = 30000 milliseconds
                             RF debug mask = 0x0   
                  Device# show redundancy
                  Redundant System Information :
                  ------------------------------
                         Available system uptime = 9 minutes
                  Switchovers system experienced = 0
                                Standby failures = 0
                          Last switchover reason = none
                                   Hardware Mode = Duplex
                      Configured Redundancy Mode = SSO
                       Operating Redundancy Mode = SSO
                                Maintenance Mode = Disabled
                                  Communications = Up
                  Current Processor Information :
                  -------------------------------
                                 Active Location = slot A
                          Current Software state = ACTIVE
                         Uptime in current state = 9 minutes
                  Image Version = Cisco IOS Software, 10000 Software (C10K2-P11-M), Experimental Version 12.2(20040825:224856) [wgrupp-c10k_bba_122s_work 102] Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Mon 30-Aug-04 10:29 by wgrupp
                                            BOOT = disk0:c10k2-p11-mz.1.20040830,1;
                                     CONFIG_FILE = 
                                         BOOTLDR = 
                          Configuration register = 0x102
                  Peer Processor Information :
                  ----------------------------
                                Standby Location = slot B
                          Current Software state = STANDBY HOT
                         Uptime in current state = 8 minutes
                                   Image Version = Cisco IOS Software, 10000 Software (C10K2-P11-M), Experimental Version 12.2(20040825:224856) [wgrupp-c10k_bba_122s_work 102] Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Mon 30-Aug-04 10:29 by wgrupp
                                            BOOT = disk0:c10k2-p11-mz.1.20040830,1;
                                     CONFIG_FILE = 
                                         BOOTLDR = 
                          Configuration register = 0x102

                  Example Verifying the ISSU State

                  The following sample output displays and verifies the ISSU state:

                  Device# show issu state detail
                   
                                            Slot = A
                                        RP State = Active
                                      ISSU State = Init
                                   Boot Variable = N/A
                                  Operating Mode = SSO
                                 Primary Version = N/A
                               Secondary Version = N/A
                                 Current Version = disk0:c10k2-p11-mz.1.20040830
                                            Slot = B
                                        RP State = Standby
                                      ISSU State = Init
                                   Boot Variable = N/A
                                  Operating Mode = SSO
                                 Primary Version = N/A
                               Secondary Version = N/A
                                 Current Version = disk0:c10k2-p11-mz.1.20040830
                  

                  The new version of the Cisco IOS software must be present on both of the RPs. The directory information displayed for each of the RPs shows that the new version is present.

                  Device# directory disk0:
                  Directory of disk0:/
                      1  -rw-    16864340  Jul 16 2004 01:59:42 -04:00  c10k2-p11-mz.122-16.BX1.bin
                      2  -rw-     2530912  Jul 16 2004 02:00:04 -04:00  c10k2-eboot-mz.122-16.BX1.bin
                      3  -rw-    20172208  Aug 30 2004 16:25:56 -04:00  c10k2-p11-mz.1.20040830
                      4  -rw-    20171492  Aug 31 2004 12:25:34 -04:00  c10k2-p11-mz.2.20040830
                  64253952 bytes total (4509696 bytes free)
                  Device# directory stby-disk0:
                  Directory of stby-disk0:/

                  Example Performing the ISSU Process

                  The following examples show how to verify the ISSU software installation by entering show commands that provide information on the state of theduring the ISSU process.

                  Initiating the ISSU Process

                  To initiate the ISSU process, enter the issu loadversion command as shown in the following example:

                  Device# issu loadversion a disk0:c10k2-p11-mz.2.20040830 b stby-disk0:c10k2-p11-mz.2.20040830
                  

                  The following two examples display the ISSU state and redundancy state after ISSU process initiation:

                  Device# show issu state
                                            Slot = A
                                        RP State = Active
                                      ISSU State = Load Version
                                   Boot Variable = disk0:c10k2-p11-mz.1.20040830,1;
                                            Slot = B
                                        RP State = Standby
                                      ISSU State = Load Version
                                   Boot Variable = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                  Device# show redundancy state
                         my state = 13 -ACTIVE 
                       peer state = 8  -STANDBY HOT 
                             Mode = Duplex
                             Unit = Primary
                          Unit ID = 0
                  Redundancy Mode (Operational) = SSO
                  Redundancy Mode (Configured)  = SSO
                       Split Mode = Disabled
                     Manual Swact = Enabled
                   Communications = Up
                     client count = 31
                   client_notification_TMR = 30000 milliseconds
                             RF debug mask = 0x0 

                  Forcing a Switchover from the Active RP to the Standby RP

                  At this point, the system is ready to switch over and run the new version of Cisco software that has been loaded onto the standby RP. When you enter the issu runversion command, an SSO switchover will be performed, and NSF procedures will be invoked if so configured.

                  Device# issu runversion b stby-disk0:c10k2-p11-mz.2.20040830
                  

                  Once the ISSU process has been completed, the system will be running the new version of software and the previously active RP will now become the standby RP. The standby will be reset and reloaded, but it will remain on the previous version of software and come back online in STANDBY-HOT status. The following example shows how to connect to the newly active RP and verify these conditions.

                  Device# show redundancy
                  Redundant System Information :
                  ------------------------------
                         Available system uptime = 24 minutes
                  Switchovers system experienced = 1
                                Standby failures = 0
                          Last switchover reason = user initiated
                                   Hardware Mode = Duplex
                      Configured Redundancy Mode = SSO
                       Operating Redundancy Mode = SSO
                                Maintenance Mode = Disabled
                                  Communications = Up
                  Current Processor Information :
                  -------------------------------
                                 Active Location = slot B
                          Current Software state = ACTIVE
                         Uptime in current state = 8 minutes
                                   Image Version = Cisco IOS Software, 10000 Software (C10K2-P11-M), Experimental Version 12.2(20040825:224856) [wgrupp-c10k_bba_122s_work 103] Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Mon 30-Aug-04 11:50 by wgrupp
                                            BOOT = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                     CONFIG_FILE = 
                                         BOOTLDR = 
                          Configuration register = 0x102
                  Peer Processor Information :
                  ----------------------------
                                Standby Location = slot A
                          Current Software state = STANDBY HOT
                         Uptime in current state = 6 minutes
                                   Image Version = Cisco IOS Software, 10000 Software (C10K2-P11-M), Experimental Version 12.2(20040825:224856) [wgrupp-c10k_bba_122s_work 102] Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Mon 30-Aug-04 10:29 by wgrupp 
                                            BOOT = disk0:c10k2-p11-mz.1.20040830,1;
                                     CONFIG_FILE = 
                                         BOOTLDR = 
                          Configuration register = 0x102
                  Device# show issu state
                                            Slot = B
                                        RP State = Active
                                      ISSU State = Run Version
                                   Boot Variable = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                            Slot = A
                                        RP State = Standby
                                      ISSU State = Run Version
                                   Boot Variable = disk0:c10k2-p11-mz.1.20040830,1;
                  Device# show issu state detail
                                             Slot = B
                                        RP State = Active
                                      ISSU State = Run Version
                                   Boot Variable = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                  Operating Mode = SSO
                                 Primary Version = disk0:c10k2-p11-mz.2.20040830
                               Secondary Version = disk0:c10k2-p11-mz.1.20040830
                                 Current Version = disk0:c10k2-p11-mz.2.20040830
                                            Slot = A
                                        RP State = Standby
                                      ISSU State = Run Version
                                   Boot Variable = disk0:c10k2-p11-mz.1.20040830,1;
                                  Operating Mode = SSO
                                 Primary Version = disk0:c10k2-p11-mz.2.20040830
                               Secondary Version = disk0:c10k2-p11-mz.1.20040830
                                 Current Version = disk0:c10k2-p11-mz.1.20040830
                  

                  The new active RP is now running the new version of software, and the standby RP is running the old version of software and is in the STANDBY-HOT state.

                  Stopping the Rollback Process

                  In the following example, the “Automatic Rollback Time” information indicates the amount of time left before an automatic rollback will occur. Enter the issu acceptversion command within the time period specified by the rollback timer to acknowledge that the RP has achieved connectivity to the outside world; otherwise, the ISSU process is terminated, and the system reverts to the previous version of Cisco software by switching to the standby RP.

                  Device# show issu rollback-timer
                   
                  Rollback Process State = In progress
                  Configured Rollback Time = 45:00
                  Automatic Rollback Time = 29:03
                  

                  Entering the issu acceptversion command stops the rollback timer:

                  Device# issu acceptversion b disk0:c10k2-p11-mz.2.20040830
                  

                  Committing the New Software to the Standby RP

                  The following example shows how to commit the new Cisco software image in the file system of the standby RP and ensure that both the active and the standby RPs are in the run version (RV) state. The standby RP is reset and reloaded with the new Cisco software and returned to STANDBY-HOT status.

                  Device# issu commitversion a stby-disk0:c10k2-p11-mz.2.20040830
                  Device# show redundancy states
                         my state = 13 -ACTIVE 
                       peer state = 8  -STANDBY HOT 
                             Mode = Duplex
                             Unit = Secondary
                          Unit ID = 1
                  Redundancy Mode (Operational) = SSO
                  Redundancy Mode (Configured)  = SSO
                       Split Mode = Disabled
                     Manual Swact = Enabled
                   Communications = Up
                     client count = 31
                   client_notification_TMR = 30000 milliseconds
                             RF debug mask = 0x0   
                  Device# show redundancy
                  Redundant System Information :
                  ------------------------------
                         Available system uptime = 35 minutes
                  Switchovers system experienced = 1
                                Standby failures = 1
                          Last switchover reason = user initiated
                                   Hardware Mode = Duplex
                  Configured Redundancy Mode = SSO
                       Operating Redundancy Mode = SSO
                                Maintenance Mode = Disabled
                                  Communications = Up
                  Current Processor Information :
                  -------------------------------
                                 Active Location = slot B
                          Current Software state = ACTIVE
                         Uptime in current state = 18 minutes
                                   Image Version = Cisco IOS Software, 10000 Software (C10K2-P11-M), Experimental Version 12.2(20040825:224856) [wgrupp-c10k_bba_122s_work 103] Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Mon 30-Aug-04 11:50 by wgrupp
                                            BOOT = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                     CONFIG_FILE = 
                                         BOOTLDR = 
                          Configuration register = 0x102
                  Peer Processor Information :
                  ----------------------------
                                Standby Location = slot A
                          Current Software state = STANDBY HOT
                         Uptime in current state = 4 minutes
                                   Image Version = Cisco IOS Software, 10000 Software (C10K2-P11-M), Experimental Version 12.2(20040825:224856) [wgrupp-c10k_bba_122s_work 103] Copyright (c) 1986-2004 by Cisco Systems, Inc. Compiled Mon 30-Aug-04 11:50 by wgrupp
                                            BOOT = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                     CONFIG_FILE = 
                                         BOOTLDR = 
                          Configuration register = 0x102
                  Device# show issu state
                                            Slot = B
                                        RP State = Active
                                      ISSU State = Init
                                   Boot Variable = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                            Slot = A
                                        RP State = Standby
                                      ISSU State = Init
                                   Boot Variable = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                  Device# show issu state detail
                                            Slot = B
                                        RP State = Active
                                      ISSU State = Init
                                   Boot Variable = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                  Operating Mode = SSO
                                 Primary Version = N/A
                               Secondary Version = N/A
                                 Current Version = disk0:c10k2-p11-mz.2.20040830
                                            Slot = A
                                        RP State = Standby
                                      ISSU State = Init
                                   Boot Variable = disk0:c10k2-p11-mz.2.20040830,12;disk0:c10k2-p11-mz.1.20040830,1;
                                  Operating Mode = SSO
                                 Primary Version = N/A
                               Secondary Version = N/A
                                 Current Version = disk0:c10k2-p11-mz.2.20040830 
                  

                  The ISSU process has been completed. At this stage, any further Cisco software version upgrades or downgrades will require that a new ISSU process be invoked.

                  Example Aborting the ISSU Process

                  The following example shows how to abort the ISSU process manually:

                  Device# issu abortversion
                   b disk0:c10k2-p11-mz.2.20040830
                  

                  If you abort the process after you have entered the issu loadversion command, the standby RP is reset and is reloaded with the original software version.

                  Example Verifying Rollback Timer Information

                  To display rollback timer information, enter the show issu rollback-timercommand:

                  Device# show issu rollback-timer
                   
                          Rollback Process State = In progress
                        Configured Rollback Time = 45:00
                         Automatic Rollback Time = 29:03

                  Additional References

                  Related Documents

                  Related Topic

                  Document Title

                  Cisco IOS master command list

                  Cisco IOS Master Command List , All Releases

                  Cisco IOS High Availability commands

                  Cisco IOS High Availability Command Reference

                  DHCP ODAP client/server

                  ISSU - DHCP ODAP Client and Server module in the Cisco IOS IP Addressing Services Configuration Guide

                  DHCP proxy client

                  ISSU - DHCP Proxy Client module in the Cisco IOS IP Addressing Services Configuration Guide

                  DHCP relay on unnumbered interface

                  ISSU - DHCP Relay on Unnumbered Interface module in the Cisco IOS IP Addressing Services Configuration Guide

                  DHCP server

                  ISSU - DHCP Server module in the Cisco IOS IP Addressing Services Configuration Guide

                  Enhanced Fast Software Upgrade (eFSU)

                  Enhanced Fast Software Upgrade on the Cisco 7600 Series Router

                  FHRP and HSRP group shutdown

                  FHRP - HSRP Group Shutdown module in the Cisco IOS IP Application Services Configuration Guide

                  ISSU - 802.3ah OAM

                  Using Ethernet Operations, Administration, and Maintenance module in the Cisco IOS Carrier Ethernet Configuration Guide

                  ISSU - AToM ATM Attachment Circuit

                  Any Transport over MPLS and AToM Graceful Restart module in the Cisco IOS Multiprotocol Label Switching Configuration Guide

                  ISSU and eFSU on Cisco 7600 series routers

                  ISSU and eFSU on Cisco 7600 Series Routers module in the Cisco 7600 Series Cisco IOS Software Configuration Guide

                  ISSU- E-LMI Support

                  Configuring Ethernet Local Management Interface at a Provider Edge module in the Cisco IOS Carrier Ethernet Configuration Guide

                  ISSU - IPv4 multicast

                  Monitoring and Maintaining Multicast HA Operations (NSF/SSO and ISSU) module in the Cisco IOS IP Multicast Configuration Guide

                  ISSU - PPoE

                  Cisco IOS Broadband High Availability In Service Software Upgrade module in the Cisco IOS Broadband Access Aggregation and DSL Configuration Guide

                  ISSU - VRRP

                  Configuring VRRP module in the Cisco IOS IP Application Services Configuration Guide

                  MPLS clients

                  ISSU MPLS Clients module in the Cisco IOS Multiprotocol Label Switching Configuration Guide

                  MTR

                  Cisco IOS Multi-Topology Routing Configuration Guide

                  Virtual Private LAN Services

                  NSF/SSO/ISSU Support for VPLS module in the Cisco IOS Multiprotocol Label Switching Configuration Guide

                  Standards

                  Standard

                  Title

                  No new or modified standards are supported, and support for existing standards has not been modified.

                  --

                  MIBs

                  MIB

                  MIBs Link

                  No new or modified MIBs are supported, and support for existing MIBs has not been modified.

                  To locate and download MIBs for selected platforms, Cisco IOS releases, and feature sets, use Cisco MIB Locator found at the following URL:

                  http:/​/​www.cisco.com/​go/​mibs

                  RFCs

                  RFC

                  Title

                  No new or modified RFCs are supported, and support for existing RFCs has not been modified.

                  --

                  Technical Assistance

                  Description

                  Link

                  The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password.

                  http:/​/​www.cisco.com/​cisco/​web/​support/​index.html

                  Feature Information for Performing an ISSU

                  The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.

                  Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to . An account on Cisco.com is not required.
                  Table 1 Feature Information for Performing an In Service Software Upgrade Process

                  Feature Name

                  Releases

                  Feature Information

                  ISSU

                  In Service Software Upgrade (ISSU) allows Cisco IOS software to be updated or otherwise modified while packet forwarding continues, increasing network availability and reducing downtime caused by planned software upgrades.