Catalyst 2950 and Catalyst 2955 Switch Command Reference Cisco IOS Release 12.1(12c)EA1 February 2003 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
C O N T E N T S Preface xi Audience Purpose xi xi Organization xii Conventions xii Related Publications xiii Obtaining Documentation xiv World Wide Web xiv Documentation CD-ROM xiv Ordering Documentation xiv Documentation Feedback xv Obtaining Technical Assistance xv Cisco.
Contents access-list (IP standard) auto qos voip 2-6 2-8 boot private-config-file channel-group 2-12 channel-protocol class 2-11 2-15 2-17 class-map 2-19 clear interface clear lacp 2-21 2-22 clear mac address-table clear pagp 2-23 2-25 clear port-security dynamic clear port-security sticky 2-26 2-27 clear spanning-tree detected-protocols clear vmps statistics clear vtp counters 2-30 2-31 cluster commander-address 2-32 cluster discovery hop-count 2-34 cluster enable 2-35 cluster h
Contents dot1x timeout quiet-period 2-60 dot1x timeout re-authperiod dot1x timeout tx-period duplex 2-61 2-62 2-63 errdisable detect 2-65 errdisable recovery flowcontrol 2-67 2-69 interface 2-73 interface port-channel interface range 2-76 ip access-group 2-78 ip access-list ip address 2-75 2-80 2-82 ip igmp snooping 2-83 ip igmp snooping source-only-learning ip igmp snooping vlan 2-86 ip igmp snooping vlan immediate-leave ip igmp snooping vlan mrouter ip igmp snooping vlan static la
Contents pagp learn-method 2-125 pagp port-priority 2-127 permit (access-list configuration) 2-128 permit (MAC access-list configuration) police 2-133 policy-map 2-135 port-channel load-balance rcommand 2-137 2-139 remote-span 2-141 rmon collection stats service-policy set 2-131 2-143 2-145 2-147 show access-lists show auto qos show boot 2-149 2-151 2-153 show class-map show cluster 2-155 2-157 show cluster candidates show cluster members show dot1x show env 2-159 2-161 2-163 2-
Contents show mls qos interface show mls qos maps show monitor show mvr 2-204 2-206 2-208 2-210 show mvr interface 2-212 show mvr members 2-214 show pagp 2-216 show policy-map 2-218 show port-security show rps 2-220 2-223 show running-config vlan 2-225 show spanning-tree 2-227 show storm-control 2-232 show system mtu show udld 2-236 show version show vlan show vmps show vtp 2-235 2-239 2-240 2-244 2-247 show wrr-queue bandwidth 2-252 show wrr-queue cos-map shutdown 2-253 2-2
Contents spanning-tree mst configuration spanning-tree mst cost 2-278 2-280 spanning-tree mst forward-time spanning-tree mst hello-time 2-282 2-283 spanning-tree mst max-age 2-285 spanning-tree mst max-hops 2-287 spanning-tree mst port-priority spanning-tree mst priority spanning-tree mst root 2-289 2-291 2-292 spanning-tree port-priority 2-294 spanning-tree portfast (global configuration) spanning-tree portfast (interface configuration) spanning-tree stack-port 2-300 spanning-tree uplinkfa
Contents vmps reconfirm (global configuration) vmps reconfirm (privileged EXEC) vmps retry 2-360 vtp (global configuration) vtp (privileged EXEC) 2-362 2-366 vtp (VLAN configuration) wrr-queue bandwidth 2-368 2-372 wrr-queue cos-map A 2-358 2-359 vmps server APPENDIX 2-374 Catalyst 2955-Specific Alarm Commands alarm facility fcs-hysteresis A-2 alarm facility power-supply A-3 alarm facility temperature alarm profile (interface configuration) fcs-threshold show alarm profile show alarm set
Contents debug spanning-tree bpdu-opt debug spanning-tree mstp debug spanning-tree switch B-13 B-14 B-16 debug spanning-tree uplinkfast debug sw-vlan B-19 debug sw-vlan ifs B-21 debug sw-vlan notification debug sw-vlan vtp debug udld B-18 B-22 B-23 B-25 INDEX Catalyst 2950 and Catalyst 2955 Switch Command Reference x 78-15304-01
Preface Audience This guide is for the networking professional using the Cisco IOS command-line interface (CLI) to manage the Catalyst 2950 and Catalyst 2955 switches, hereafter referred to as the switch. Before using this guide, you should have experience working with the Cisco IOS and be familiar with the concepts and terminology of Ethernet and local area networking. Purpose The Catalyst 2950 switch is supported by either the standard software image (SI) or the enhanced software image (EI).
Preface Organization Note This software release does not support the Catalyst 2950 LRE switches. For information about these switches, refer to the Catalyst 2950 LRE switch release notes. This guide provides the information you need about the CLI commands that have been created or changed for use with the Catalyst 2950 family of switches. For information about the standard IOS Release 12.1 commands, refer to the IOS documentation set available from the Cisco.
Preface Related Publications Interactive examples use these conventions: • Terminal sessions and system displays are in screen font. • Information you enter is in boldface • Nonprinting characters, such as passwords or tabs, are in angle brackets (< >). screen font. Notes, cautions, and tips use these conventions and symbols: Note Caution Timesaver Means reader take note. Notes contain helpful suggestions or references to materials not contained in this manual. Means reader be careful.
Preface Obtaining Documentation Note For information about the Catalyst 2950 LRE switches, refer to these documents: Catalyst 2950 Desktop Switch Software Configuration Guide, Cisco IOS Release 12.1(11)EA1 and Release 12.1(11)YJ (order number DOC-7814982=) Catalyst 2950 Desktop Switch Command Reference, Cisco IOS Release 12.1(11)EA1 and Release 12.1(11)YJ (order number DOC-7814984=) Catalyst 2950 Desktop Switch System Message Guide, Cisco IOS Release 12.1(11)EA1 and Release 12.
Preface Obtaining Technical Assistance • Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco corporate headquarters (California, USA) at 408 526-7208 or, in North America, by calling 800 553-NETS(6387). Documentation Feedback If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation.
Preface Obtaining Technical Assistance Contacting TAC by Using the Cisco TAC Website If you have a priority level 3 (P3) or priority level 4 (P4) problem, contact TAC by going to the TAC website: http://www.cisco.com/tac P3 and P4 level problems are defined as follows: • P3—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.
C H A P T E R 1 Using the Command-Line Interface The Catalyst 2950 and Catalyst 2955 switches are supported by Cisco IOS software. This chapter describes how to use the switch command-line interface (CLI) to configure the software features. For a complete description of the commands that support these features, see Chapter 2, “Cisco IOS Commands.” For Catalyst 2955-specific commands for setting alarms, refer to Appendix A, “Catalyst 2955-Specific Alarm Commands.
Chapter 1 Using the Command-Line Interface CLI Command Modes CLI Command Modes This section describes the CLI command mode structure. Command modes support specific Cisco IOS commands. For example, the interface type_number command works only when entered in global configuration mode.
Chapter 1 Using the Command-Line Interface CLI Command Modes Table 1-1 Command Modes Summary (continued) Command Mode Access Method Prompt Exit or Access Next Mode VLAN configuration From privileged EXEC mode, enter the vlan database command. Switch(vlan)# To exit to privileged EXEC mode, enter the exit command. Line configuration From global configuration mode, specify a line by entering the line command. Switch(config-line)# To exit to global configuration mode, enter the exit command.
Chapter 1 Using the Command-Line Interface CLI Command Modes Global Configuration Mode Global configuration commands apply to features that affect the device as a whole. Use the configure privileged EXEC command to enter global configuration mode. The default is to enter commands from the management console.
Chapter 1 Using the Command-Line Interface CLI Command Modes Enter the vlan vlan-id global configuration command to access config-vlan mode: Switch(config)# vlan 2000 Switch(config-vlan)# The supported keywords can vary but are similar to the commands available in VLAN configuration mode. To view a comprehensive list of commands, enter a question mark (?) at the prompt. Switch(config-vlan)# ? For extended-range VLANs, all characteristics except MTU size must remain at the default setting.
Chapter 1 Using the Command-Line Interface Command Summary Command Summary Table 1-2 lists and describes commands for the Catalyst 2950 switch that have the same function but different syntax in software releases earlier than Release 12.1(6)EA2 and in Release 12.1(6)EA2 or later. It lists the commands supported in releases earlier than Release 12.1(6)EA2, the equivalent commands in Release 12.1(6)EA2 or later, and command descriptions. If you are running Release 12.
Chapter 1 Using the Command-Line Interface Command Summary Table 1-2 Command Comparison (continued) Command in IOS releases earlier than Release 12.1(6)EA2 Command in Release 12.1(6)EA2 or later show port group show etherchannel Displays EtherChannel information for a channel. show port monitor show monitor Displays SPAN session information. show port protected show interfaces switchport Displays the port protection settings of a port.
Chapter 1 Using the Command-Line Interface Command Summary Catalyst 2950 and Catalyst 2955 Switch Command Reference 1-8 78-15304-01
C H A P T E R 2 Cisco IOS Commands aaa authentication dot1x Use the aaa authentication dot1x global configuration command to specify one or more authentication, authorization, and accounting (AAA) methods for use on interfaces running IEEE 802.1X. Use the no form of this command to disable authentication. aaa authentication dot1x {default} method1 [method2...] no aaa authentication dot1x {default} method1 [method2...
Chapter 2 Cisco IOS Commands aaa authentication dot1x Usage Guidelines The method argument identifies the list of methods that the authentication algorithm tries in the given sequence to validate the password provided by the client. The only method that is truly 802.1X-compliant is the group radius method, in which the client data is validated against a RADIUS authentication server. The remaining methods enable AAA to authenticate the client by using locally configured data.
Chapter 2 Cisco IOS Commands access-list (IP extended) access-list (IP extended) Use the extended version of the access-list global configuration command to configure an extended IP access control list (ACL). Use the no form of this command to remove an extended IP ACL.
Chapter 2 Cisco IOS Commands access-list (IP extended) operator port (Optional) Define a source or destination port. The operator can be only eq (equal). If operator is after the source IP address and wildcard, conditions match when the source port matches the defined port. If operator is after the destination IP address and wildcard, conditions match when the destination port matches the defined port.
Chapter 2 Cisco IOS Commands access-list (IP extended) Examples This example shows how to configure an extended IP ACL that allows only TCP traffic to the destination IP address 128.88.1.2 with a TCP port number of 25 and how to apply it to an interface: Switch(config)# access-list 102 permit tcp any host 128.88.1.2 eq 25 Switch(config)# interface fastethernet0/8 Switch(config-if)# ip access-group 102 in This is an example of an extended ACL that allows TCP traffic only from two specified networks.
Chapter 2 Cisco IOS Commands access-list (IP standard) access-list (IP standard) Use the standard version of the access-list global configuration command to configure a standard IP access control list (ACL). Use the no form of this command to remove a standard IP ACL.
Chapter 2 Cisco IOS Commands access-list (IP standard) Use the show ip access-lists command to display the contents of IP ACLs. Use the show access-lists command to display the contents of all ACLs. Note Examples For more information about configuring IP ACLs, refer to the “Configuring Network Security with ACLs” chapter in the Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide for this release.
Chapter 2 Cisco IOS Commands auto qos voip auto qos voip Use the auto qos voip interface configuration command to configure automatic quality of service (auto-QoS) for voice over IP (VoIP) within a QoS domain. Use the no form of this command to change the auto-QoS configuration settings to the standard-QoS defaults. auto qos voip {cisco-phone | trust} no auto qos voip This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands auto qos voip Table 2-2 lists the auto-QoS configuration for the egress queues. Table 2-2 Auto-QoS Configuration for the Egress Queues Egress Queue Queue Number CoS-to-Queue Map Queue Weight Expedite 4 5 – 80% WRR 3 3, 6, 7 80% 20% WRR 1 0, 1, 2, 4 20% Command Modes Interface configuration Command History Release Modification 12.1(12c)EA1 This command was first introduced.
Chapter 2 Cisco IOS Commands auto qos voip Examples This example shows how to enable auto-QoS and to trust the QoS labels received in incoming packets when the switch or router connected to Gigabit Ethernet interface 0/1 is a trusted device: Switch(config)# interface gigabitethernet0/1 Switch(config-if)# auto qos voip trust This example shows how to enable auto-QoS and to trust the QoS labels received in incoming packets when the device connected to Fast Ethernet interface 0/1 is detected as a Cisco IP
Chapter 2 Cisco IOS Commands boot private-config-file boot private-config-file Use the boot private-config-file global configuration command to specify the filename that IOS uses to read and write a nonvolatile copy of the private configuration. Use the no form of this command to return to the default setting. boot private-config-file filename no boot private-config-file Syntax Description filename Defaults The default configuration file is private-config.text.
Chapter 2 Cisco IOS Commands channel-group channel-group Use the channel-group interface configuration command to assign an Ethernet interface to an EtherChannel group. Use the no form of this command to remove an Ethernet interface from an EtherChannel group. channel-group channel-group-number mode {auto [non-silent] | desirable [non-silent] | on | active | passive} no channel-group Syntax Description channel-group-number Specify the channel group number. The range is 1 to 6.
Chapter 2 Cisco IOS Commands channel-group Defaults No channel groups are assigned. There is no default mode. Command Modes Interface configuration Command History Release Modification 12.1(6)EA2 This command was first introduced. It replaced the port group command. 12.1(12c)EA1 The active and passive keywords were added. Usage Guidelines You must specify the mode when entering this command.
Chapter 2 Cisco IOS Commands channel-group Examples This example shows how to add an interface to the EtherChannel group specified as channel group 1: Switch(config)# interface gigabitethernet0/1 Switch(config-if)# channel-group 1 mode on This example shows how to set an Etherchannel into PAgP mode: Switch(config-if)# channel-group 1 mode auto Creating a port-channel interface Port-channel 1 This example shows how to set an Etherchannel into LACP mode: Switch(config-if)# channel-group 1 mode passive C
Chapter 2 Cisco IOS Commands channel-protocol channel-protocol Use the channel-protocol interface configuration command to configure an EtherChannel for Port Aggregation Control Protocol (PAgP) or Link Aggregation Control Protocol (LACP). Use the no form of this command to disable PAgP or LACP on the EtherChannel. channel-protocol {lacp | pagp} no channel-protocol Syntax Description lacp Configure an EtherChannel with the LACP protocol. pagp Configure an EtherChannel with the PAgP protocol.
Chapter 2 Cisco IOS Commands channel-protocol Related Commands Command Description show lacp Display LACP information. show pagp Display PAgP information. show running-config Displays the current operating configuration. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.1 > Cisco IOS File Management Commands > Configuration File Commands.
Chapter 2 Cisco IOS Commands class class Use the class policy-map configuration command to define a traffic classification for the policy to act on using the class-map name or access group. Use the no form of this command to delete an existing class map. class class-map-name [access-group name acl-index-or-name] no class class-map-name This command is available only if your switch is running the enhanced software image (EI). Syntax Description class-map-name Name of the class map.
Chapter 2 Cisco IOS Commands class After entering the class command, you enter policy-map class configuration mode. These configuration commands are available: • default: sets a command to its default. • exit: exits policy-map class configuration mode and returns to policy-map configuration mode. • no: returns a command to its default setting. • set: specifies a Differentiated Services Code Point (DSCP) value to be assigned to the classified traffic. For more information, see the set command.
Chapter 2 Cisco IOS Commands class-map class-map Use the class-map global configuration command to create a class map to be used for matching packets to the class whose name you specify and to enter class-map configuration mode. Use the no form of this command to delete an existing class map and to return to global configuration mode. class-map class-map-name [match-all] no class-map class-map-name [match-all] This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands class-map Note Examples For more information about configuring ACLs, refer to the “Configuring Network Security with ACLs” chapter in the Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide for this release. This example shows how to configure the class map named class1. class1 has one match criteria, which is a numbered ACL.
Chapter 2 Cisco IOS Commands clear interface clear interface Use the clear interface privileged EXEC command to clear the hardware logic on an interface or a VLAN. clear interface {interface-id | vlan vlan-id} Syntax Description interface-id ID of the interface. vlan-id VLAN ID. Valid VLAN IDs are from 1 to 4094 when the enhanced software image (EI) is installed and 1 to 1001 when the standard software image (SI) is installed. Do not enter leading zeros. Defaults No default is defined.
Chapter 2 Cisco IOS Commands clear lacp clear lacp Use the clear lacp privileged EXEC command to clear Link Aggregration Control Protocol (LACP) channel-group information. clear lacp {channel-group-number | counters} Syntax Description channel-group-number Channel group number. The range is 1 to 6. counters Clear traffic counters. Defaults This command has no default setting. Command Modes Privileged EXEC Command History Release Modification 12.1(12c)EA1 This command was first introduced.
Chapter 2 Cisco IOS Commands clear mac address-table clear mac address-table Use the clear mac address-table privileged EXEC command to delete from the MAC address table a specific dynamic address, all dynamic addresses on a particular interface, or all dynamic addresses on a particular VLAN. This command also clears the MAC address notification global counters.
Chapter 2 Cisco IOS Commands clear mac address-table Related Commands Command Description mac address-table notification Enables the MAC address notification feature. show mac address-table Displays the MAC address table static and dynamic entries. show mac address-table notification Displays the MAC address notification settings for all interfaces or the specified interface.
Chapter 2 Cisco IOS Commands clear pagp clear pagp Use the clear pagp privileged EXEC command to clear Port Aggregation Protocol (PAgP) channel-group information. clear pagp {channel-group-number [counters] | counters} Syntax Description channel-group-number Channel group number. The range is 1 to 6. counters Clear traffic counters. Defaults This command has no default setting. Command Modes Privileged EXEC Command History Release Modification 12.1(6)EA2 This command was first introduced.
Chapter 2 Cisco IOS Commands clear port-security dynamic clear port-security dynamic Use the clear port-security dynamic privileged EXEC command to delete from the MAC address table a specific dynamic secure address or all the dynamic secure addresses on an interface. clear port-security dynamic [address mac-addr | interface interface-id] Syntax Description address mac-addr (Optional) Delete the specified dynamic secure MAC address.
Chapter 2 Cisco IOS Commands clear port-security sticky clear port-security sticky Use the clear port-security sticky privileged EXEC command to delete from the secure MAC address table a specific sticky secure address, all the sticky secure addresses on an interface, or all the sticky secure addresses on the switch. clear port-security sticky [address mac-addr | interface interface-id] Syntax Description address mac-addr (Optional) Delete the specified sticky secure MAC address.
Chapter 2 Cisco IOS Commands clear port-security sticky Related Commands Command Description show port-security address Displays the port security settings defined for an interface or for the switch. switchport port-security Enables port security on an interface. switchport port-security mac-address sticky Enables the interface for sticky learning.
Chapter 2 Cisco IOS Commands clear spanning-tree detected-protocols clear spanning-tree detected-protocols Use the clear spanning-tree detected-protocols privileged EXEC command to restart the protocol migration process (force the renegotiation with neighboring switches) on all interfaces or on the specified interface. clear spanning-tree detected-protocols [interface interface-id] This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands clear vmps statistics clear vmps statistics Use the clear vmps statistics privileged EXEC command to clear the statistics maintained by the VLAN Query Protocol (VQP) client. clear vmps statistics Syntax Description This command has no arguments or keywords. Defaults No default is defined. Command Modes Privileged EXEC Command History Release Modification 12.1(6)EA2 This command was first introduced.
Chapter 2 Cisco IOS Commands clear vtp counters clear vtp counters Use the clear vtp counters privileged EXEC command to clear the VLAN Trunking Protocol (VTP) and pruning counters. clear vtp counters Syntax Description This command has no arguments or keywords. Defaults No default is defined. Command Modes Privileged EXEC Command History Release Modification 12.0(5.2)WC(1) This command was first introduced.
Chapter 2 Cisco IOS Commands cluster commander-address cluster commander-address You do not need to enter this command. The command switch automatically provides its MAC address to member switches when these switches join the cluster. The member switch adds this information and other cluster information to its running configuration file. Enter the no form of this global configuration command from the member switch console port to remove it from a cluster only during debugging or recovery procedures.
Chapter 2 Cisco IOS Commands cluster commander-address This example shows how to remove a member from the cluster by using the cluster member console: Switch# configure terminal Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# no cluster commander-address You can verify your settings by entering the show cluster privileged EXEC command. Related Commands Command Description show cluster Displays the cluster status and a summary of the cluster to which the switch belongs.
Chapter 2 Cisco IOS Commands cluster discovery hop-count cluster discovery hop-count Use the cluster discovery hop-count global configuration command on the command switch to set the hop-count limit for extended discovery of candidate switches. Use the no form of this command to set the hop count to the default value. cluster discovery hop-count number no cluster discovery hop-count Syntax Description number Defaults The hop count is set to 3.
Chapter 2 Cisco IOS Commands cluster enable cluster enable Use the cluster enable global configuration command on a command-capable switch to enable it as the cluster command switch, assign a cluster name, and optionally assign a member number to it. Use the no form of this command to remove all members and make the command switch a candidate switch. cluster enable name [command-switch-member-number] no cluster enable Syntax Description Defaults name Name of the cluster up to 31 characters.
Chapter 2 Cisco IOS Commands cluster holdtime cluster holdtime Use the cluster holdtime global configuration command on the command switch to set the duration in seconds before a switch (either the command or member switch) declares the other switch down after not receiving heartbeat messages. Use the no form of this command to set the duration to the default value. cluster holdtime holdtime-in-secs no cluster holdtime Syntax Description holdtime-in-secs Defaults The holdtime is 80 seconds.
Chapter 2 Cisco IOS Commands cluster management-vlan cluster management-vlan Use the cluster management-vlan global configuration command on the command switch to change the management VLAN for the entire cluster. Use the no form of this command to change the management VLAN to VLAN 1. cluster management-vlan n no cluster management-vlan Syntax Description n Defaults The default management VLAN is VLAN 1. Command Modes Global configuration Command History Release Modification 12.0(5.
Chapter 2 Cisco IOS Commands cluster member cluster member Use the cluster member global configuration command on the command switch to add members to a cluster. Use the no form of this command to remove members from the cluster. cluster member [n] mac-address H.H.H [password enable-password] [vlan vlan-id] no cluster member n Syntax Description n (Optional) The number that identifies a cluster member. The range is from 0 to 15. mac-address H.H.
Chapter 2 Cisco IOS Commands cluster member Examples This example shows how to add a switch as member 2 with MAC address 00E0.1E00.2222 and the password key to a cluster. The command switch adds the candidate to the cluster through VLAN 3. Switch(config)# cluster member 2 mac-address 00E0.1E00.2222 password key vlan 3 This example shows how to add a switch with MAC address 00E0.1E00.3333 to the cluster. This switch does not have a password.
Chapter 2 Cisco IOS Commands cluster run cluster run Use the cluster run global configuration command to enable clustering on a switch. Use the no form of this command to disable clustering on a switch. cluster run no cluster run Defaults Clustering is enabled on all switches. Command Modes Global configuration Command History Release Modification 12.0(5.2)WC(1) This command was first introduced.
Chapter 2 Cisco IOS Commands cluster standby-group cluster standby-group Use the cluster standby-group global configuration command to enable command switch redundancy by binding the Hot Standby Router Protocol (HSRP) standby group to the cluster. Use the no form of this command to unbind the cluster from the HSRP standby group. cluster standby-group HSRP-group-name no cluster standby-group Syntax Description HSRP-group-name Defaults The cluster is not bound to any HSRP group.
Chapter 2 Cisco IOS Commands cluster standby-group This example shows the error message when this command is entered on a member switch: Switch(config)# cluster standby-group my_hsrp %ERROR:This command runs on a cluster command switch You can verify your settings by entering the show cluster privileged EXEC command. Related Commands Command Description show cluster Displays the cluster status and a summary of the cluster to which the switch belongs.
Chapter 2 Cisco IOS Commands cluster timer cluster timer Use the cluster timer global configuration command on the command switch to set the interval in seconds between heartbeat messages. Use the no form of this command to set the interval to the default value. cluster timer interval-in-secs no cluster timer Syntax Description interval-in-secs Defaults The interval is 8 seconds. Command Modes Global configuration Command History Release Modification 12.0(5.
Chapter 2 Cisco IOS Commands define interface-range define interface-range Use the define interface-range global configuration command to create an interface-range macro. Use the no form of this command to delete the defined macro. define interface-range macro-name interface-range no define interface-range macro-name interface-range Syntax Description macro-name Name of the interface-range macro; up to 32 characters.
Chapter 2 Cisco IOS Commands define interface-range For physical interfaces, the interface-id is defined as a slot/number (where slot is always 0 for the switch), and the range can be entered as type 0/number - number (for example, gigabitethernet0/1 - 2). You can also enter multiple ranges.
Chapter 2 Cisco IOS Commands delete delete Use the delete privileged EXEC command to delete a file or directory on the Flash memory device. delete [/force] [/recursive] filesystem:/file-url Syntax Description /force (Optional) Suppress the prompt that confirms the deletion. /recursive (Optional) Delete the named directory and all subdirectories and the files contained in it. filesystem: Alias for a Flash file system. Use flash: for the system board Flash device.
Chapter 2 Cisco IOS Commands deny (access-list configuration) deny (access-list configuration) Use the deny access-list configuration command to configure conditions for a named or numbered IP access control list (ACL). Use the no form of this command to remove a deny condition from the IP ACL.
Chapter 2 Cisco IOS Commands deny (access-list configuration) operator port (Optional) Define a source or destination port. The operator can be only eq (equal). If operator is after the source IP address and wildcard, conditions match when the source port matches the defined port. If operator is after the destination IP address and wildcard, conditions match when the destination port matches the defined port.
Chapter 2 Cisco IOS Commands deny (access-list configuration) Examples This example shows how to create an extended IP ACL and to configure deny conditions for it: Switch(config)# ip access-list extended Internetfilter Switch(config-ext-nacl)# deny tcp host 190.5.88.10 any Switch(config-ext-nacl)# deny tcp host 192.1.10.10 any This is an example of a standard ACL that sets a deny condition: ip access-list standard Acclist1 deny 192.5.34.0 0.0.0.255 deny 128.88.10.0 0.0.0.255 deny 36.1.1.0 0.0.0.
Chapter 2 Cisco IOS Commands deny (MAC access-list configuration) deny (MAC access-list configuration) Use the deny MAC access-list configuration command to prevent Layer 2 traffic from being forwarded if the conditions are matched. Use the no form of this command to remove a deny condition from the MAC named access control list (ACL).
Chapter 2 Cisco IOS Commands deny (MAC access-list configuration) netbios Select EtherType DEC-Network Basic Input/Output System (NETBIOS). vines-echo Select EtherType Virtual Integrated Network Service (VINES) Echo from Banyan Systems. vines-ip Select EtherType VINES IP. xns-idp Select EtherType Xerox Network Systems (XNS) protocol suite (from 0 to 65535), an arbitrary Ethertype in decimal, hexadecimal, or octal. Defaults This command has no defaults.
Chapter 2 Cisco IOS Commands deny (MAC access-list configuration) Related Commands Command Description mac access-list extended Creates an ACL based on MAC addresses for non-IP traffic. permit (MAC access-list configuration) Permits Layer 2 traffic to be forwarded if conditions are matched. show access-lists Displays ACLs configured on a switch.
Chapter 2 Cisco IOS Commands dot1x default dot1x default Use the dot1x default global configuration command to reset the global 802.1X parameters to their default values. dot1x default Syntax Description This command has no arguments or keywords. Defaults This command has no default setting. Command Modes Global configuration Command History Release Modification 12.1(6)EA2 This command was first introduced. Examples This example shows how to reset the global 802.
Chapter 2 Cisco IOS Commands dot1x max-req dot1x max-req Use the dot1x max-req global configuration command to set the maximum number of times that the switch sends an Extensible Authentication Protocol (EAP)-request/identity frame (assuming that no response is received) before restarting the authentication process. Use the no form of this command to return to the default setting. dot1x max-req count no dot1x max-req Syntax Description count Defaults The default is 2 times.
Chapter 2 Cisco IOS Commands dot1x multiple-hosts dot1x multiple-hosts Use the dot1x multiple-hosts interface configuration command to allow multiple hosts (clients) on an 802.1X-authorized port that has the dot1x port-control interface configuration command set to auto. Use the no form of this command to return to the default setting. dot1x multiple-hosts no dot1x multiple-hosts Syntax Description This command has no arguments or keywords. Defaults Multiple hosts are disabled.
Chapter 2 Cisco IOS Commands dot1x port-control dot1x port-control Use the dot1x port-control interface configuration command to enable manual control of the authorization state of the port. Use the no form of this command to return to the default setting. dot1x port-control {auto | force-authorized | force-unauthorized} no dot1x port-control Syntax Description auto Enable 802.1X authentication on the interface and cause the port to transition to the authorized or unauthorized state based on the 802.
Chapter 2 Cisco IOS Commands dot1x port-control • Secure port—For switches running the EI, if you try to enable 802.1X on a secure port without enabling the multiple-hosts mode, the switch returns an error message, and 802.1X is not enabled. If you try to change an 802.1X-enabled port to a secure port without enabling the multiple-hosts mode, the switch returns an error message, and the security settings are not changed. • Switched Port Analyzer (SPAN) destination port—You can enable 802.
Chapter 2 Cisco IOS Commands dot1x re-authenticate dot1x re-authenticate Use the dot1x re-authenticate privileged EXEC command to manually initiate a re-authentication of all 802.1X-enabled ports or the specified 802.1X-enabled port. dot1x re-authenticate [interface interface-id] Syntax Description interface interface-id Defaults There is no default setting. Command Modes Privileged EXEC Command History Release Modification 12.1(6)EA2 This command was first introduced.
Chapter 2 Cisco IOS Commands dot1x re-authentication dot1x re-authentication Use the dot1x re-authentication global configuration command to enable periodic re-authentication of the client. Use the no form of this command to return to the default setting. dot1x re-authentication no dot1x re-authentication Syntax Description This command has no arguments or keywords. Defaults Periodic re-authentication is disabled. Command Modes Global configuration Command History Release Modification 12.
Chapter 2 Cisco IOS Commands dot1x timeout quiet-period dot1x timeout quiet-period Use the dot1x timeout quiet-period global configuration command to set the number of seconds that the switch remains in the quiet state following a failed authentication exchange (for example, the client provided an invalid password). Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands dot1x timeout re-authperiod dot1x timeout re-authperiod Use the dot1x timeout re-authperiod global configuration command to set the number of seconds between re-authentication attempts. Use the no form of this command to return to the default setting. dot1x timeout re-authperiod seconds no dot1x timeout re-authperiod Syntax Description seconds Defaults The default is 3600 seconds. Command Modes Global configuration Command History Release Modification 12.
Chapter 2 Cisco IOS Commands dot1x timeout tx-period dot1x timeout tx-period Use the dot1x timeout tx-period global configuration command to set the number of seconds that the switch waits for a response to an Extensible Authentication Protocol (EAP)-request /identity frame from the client before retransmitting the request. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands duplex duplex Use the duplex interface configuration command to specify the duplex mode of operation for switch ports. Use the no form of this command to return the port to its default value. duplex {auto | full | half} no duplex Syntax Description Defaults auto Port automatically detects whether it should run in full- or half-duplex mode. full Port is in full-duplex mode. half Port is in half-duplex mode. For Fast Ethernet and 10/100/1000 ports, the default is auto.
Chapter 2 Cisco IOS Commands duplex Examples This example shows how to set a Fast Ethernet port to half duplex: Switch(config)# interface fastethernet0/11 Switch(config-if)# duplex half This example shows how to set a Gigabit Ethernet port to full duplex: Switch(config)# interface gigabitethernet0/1 Switch(config-if)# duplex full You can verify your settings by entering the show running-config privileged EXEC command.
Chapter 2 Cisco IOS Commands errdisable detect errdisable detect Use the errdisable detect global configuration command to enable error disable detection. Use the no form of this command to disable this feature. errdisable detect cause {all | dtp-flap | gbic-invalid | link-flap | pagp-flap} no errdisable detect cause {all | dtp-flap | gbic-invalid | link-flap | pagp-flap} Syntax Description all Enable detection for all error disable causes.
Chapter 2 Cisco IOS Commands errdisable detect Related Commands Command Description errdisable recovery Configures the recovery mechanism variables. show errdisable detect Displays errdisable detection status. show interfaces trunk Displays interface status or a list of interfaces in error-disabled state.
Chapter 2 Cisco IOS Commands errdisable recovery errdisable recovery Use the errdisable recovery global configuration command to configure the recover mechanism variables. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands errdisable recovery Command History Usage Guidelines Release Modification 12.1(4)EA1 This command was first introduced. 12.1(8)EA1 The channel-misconfig keyword was added. The rootguard keyword was removed. 12.1(9)EA1 The gbic-invalid, l2ptguard, and psecure-violation keywords were added. 12.1(6)EA2 This command was first introduced. 12.1(9)EA1 The gbic-invalid and psecure-violation keywords were added. The rootguard keyword was removed.
Chapter 2 Cisco IOS Commands flowcontrol flowcontrol Use the flowcontrol interface configuration command to set the receive or send flow-control value for an interface. When flow control send is on for a device and it detects any congestion at its end, it notifies the link partner or the remote device of the congestion by sending a pause frame. When flow control receive is on for the remote device and it receives a pause frame, it stops sending any data packets.
Chapter 2 Cisco IOS Commands flowcontrol Usage Guidelines Use the flowcontrol command only on 10/100/1000 and GBIC-module ports. We strongly recommend that you do not configure IEEE 802.3X flowcontrol when quality of service (QoS) is configured on the switch. Before configuring flowcontrol on an interface, make sure to disable QoS on the switch. Note that when used with receive, the on and desired keywords have the same result.
Chapter 2 Cisco IOS Commands flowcontrol Table 2-3 Flow Control Settings and Local and Remote Port Flow Control Resolution (continued) Flow Control Settings Flow Control Resolution Local Device Remote Device Local Device Remote Device send desired/receive on send on/receive on Sends and receives Sends and receives send on/receive off Receives only Sends only send desired/receive on Sends and receives Sends and receives send desired/receive off Receives only Sends only send off/receive
Chapter 2 Cisco IOS Commands flowcontrol Related Commands Command Description show interfaces counters Displays the interface settings on a switch, including input and output flow control.
Chapter 2 Cisco IOS Commands interface interface Use the interface global configuration command to configure an interface type, create a switch virtual interface to be used as the management VLAN interface, and to enter interface configuration mode. interface {interface-id | vlan number} no interface {interface-id | vlan number} Syntax Description interface-id Specify the interface type (Fast Ethernet or Gigabit Ethernet) and number.
Chapter 2 Cisco IOS Commands interface You can verify your settings by entering the show interfaces and show interfaces vlan vlan-id privileged EXEC commands. Related Commands Command Description show interfaces Displays the administrative and operational status of a switching (nonrouting) port. shutdown Disables a port and shuts down the management VLAN.
Chapter 2 Cisco IOS Commands interface port-channel interface port-channel Use the interface port-channel global configuration command to access or create the port-channel logical interface for Layer 2 interfaces. Use the no form of this command to remove the port channel. interface port-channel port-channel-number no interface port-channel port-channel-number Syntax Description port-channel-number Defaults No port-channel logical interfaces are defined.
Chapter 2 Cisco IOS Commands interface range interface range Use the interface range global configuration command to enter interface range configuration mode and to execute a command on multiple ports at the same time. Use the no form of this command to remove an interface range. interface range {port-range | macro name} no interface range {port-range | macro name} Syntax Description port-range Port range. For a list of valid values for port-range, see the “Usage Guidelines” section.
Chapter 2 Cisco IOS Commands interface range These are the valid values for port-range type and interface: • vlan vlan-id, where vlan-id is from 1 to 4094 when the enhanced software image (EI) is installed and 1 to 1001 when the standard software image (SI) is installed.
Chapter 2 Cisco IOS Commands ip access-group ip access-group Use the ip access-group interface configuration command to control access to an interface. Use the no form of this command to remove an access group from an interface. ip access-group {access-list-number | name} in no ip access-group {access-list-number | name} in This command is available on physical interfaces only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands ip access-group Examples This example shows how to apply a numbered ACL to an interface: Switch(config)# interface fastethernet0/1 Switch(config-if)# ip access-group 101 in You can verify your settings by entering the show access-lists or show ip access-lists privileged EXEC command. Related Commands Command Description access-list (IP extended) Defines an extended IP ACL. access-list (IP standard) Defines a standard IP ACL.
Chapter 2 Cisco IOS Commands ip access-list ip access-list Use the ip access-list global configuration command to create an IP access control list (ACL) to be used for matching packets to an ACL whose name or number you specify and to enter access-list configuration mode. Use the no form of this command to delete an existing IP ACL and return to global configuration mode.
Chapter 2 Cisco IOS Commands ip access-list Examples This example shows how to configure a standard ACL named Internetfilter1: Switch(config)# ip access-list standard Internetfilter1 Switch(config-std-nacl)# permit 192.5.34.0 0.0.0.255 Switch(config-std-nacl)# permit 192.5.32.0 0.0.0.255 Switch(config-std-nacl)# exit This example shows how to configure an extended ACL named Internetfilter2: Switch(config)# ip access-list extended Internetfilter2 Switch(config-ext-nacl)# permit any 128.8.10.0 0.0.0.
Chapter 2 Cisco IOS Commands ip address ip address Use the ip address interface configuration command to set an IP address for a switch. Use the no form of this command to remove an IP address or to disable IP processing. ip address ip-address subnet-mask no ip address ip-address subnet-mask Syntax Description ip-address IP address. subnet-mask Mask for the associated IP subnet. Defaults No IP address is defined for the switch.
Chapter 2 Cisco IOS Commands ip igmp snooping ip igmp snooping Use the ip igmp snooping global configuration command to globally enable Internet Group Management Protocol (IGMP) snooping. Use the no form of this command to disable IGMP snooping. ip igmp snooping no ip igmp snooping Syntax Description This command has no arguments or keywords. Defaults IGMP snooping is globally enabled. Command Modes Global configuration Command History Release Modification 12.0(5.
Chapter 2 Cisco IOS Commands ip igmp snooping source-only-learning ip igmp snooping source-only-learning Use the ip igmp snooping source-only-learning global configuration command to enable IP multicast-source-only learning on the switch. Use the no form of this command to disable IP multicast-source-only learning. ip igmp snooping source-only-learning no ip igmp snooping source-only-learning Syntax Description This command has no arguments or keywords.
Chapter 2 Cisco IOS Commands ip igmp snooping source-only-learning Related Commands Command Description ip igmp snooping Globally enables IGMP snooping. IGMP snooping must be globally enabled in order to be enabled on a VLAN. show running-config | include Displays the configuration information running on the switch. For source-only-learning syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.
Chapter 2 Cisco IOS Commands ip igmp snooping vlan ip igmp snooping vlan Use the ip igmp snooping vlan global configuration command to enable Internet Group Management Protocol (IGMP) snooping on a specific VLAN. Use the no form of this command to disable IGMP snooping on a VLAN interface. ip igmp snooping vlan vlan-id no ip igmp snooping vlan vlan-id Syntax Description vlan-id Defaults IGMP snooping is enabled when each VLAN is created.
Chapter 2 Cisco IOS Commands ip igmp snooping vlan immediate-leave ip igmp snooping vlan immediate-leave Use the ip igmp snooping vlan immediate-leave global configuration command to enable Internet Group Management Protocol (IGMP) Immediate-Leave processing on a VLAN interface. Use the no form of this command to disable Immediate-Leave processing on the VLAN interface.
Chapter 2 Cisco IOS Commands ip igmp snooping vlan mrouter ip igmp snooping vlan mrouter Use the ip igmp snooping vlan mrouter global configuration command to add a multicast router port and to configure the multicast router learning method. Use the no form of this command to remove the configuration.
Chapter 2 Cisco IOS Commands ip igmp snooping vlan mrouter You can verify your settings by entering the show ip igmp snooping mrouter privileged EXEC command. Related Commands Command Description ip igmp snooping Globally enables Internet Group Management Protocol (IGMP) snooping. ip igmp snooping vlan Enables IGMP snooping on the VLAN interface. ip igmp snooping vlan immediate-leave Configures IGMP Immediate-Leave processing.
Chapter 2 Cisco IOS Commands ip igmp snooping vlan static ip igmp snooping vlan static Use the ip igmp snooping vlan vlan-id static global configuration command to add a Layer 2 port as a member of a multicast group. Use the no form of this command to remove the configuration. ip igmp snooping vlan vlan-id static mac-address interface interface-id no ip igmp snooping vlan vlan-id static mac-address interface interface-id Syntax Description vlan vlan-id Specify the VLAN ID.
Chapter 2 Cisco IOS Commands ip igmp snooping vlan static Related Commands Command Description ip igmp snooping Enables Internet Group Management Protocol (IGMP) snooping. ip igmp snooping vlan Enables IGMP snooping on the VLAN interface. ip igmp snooping vlan immediate-leave Configures IGMP Immediate-Leave processing. ip igmp snooping vlan mrouter Configures a Layer 2 port as a multicast router port. show mac address-table multicast Displays the Layer 2 multicast entries for a VLAN.
Chapter 2 Cisco IOS Commands lacp port-priority lacp port-priority Use the lacp port-priority interface configuration command to set the port priority for Link Aggregration Control Procol (LACP). Use the no form of this command to reset the LACP port priority. lacp port-priority priority-value no lacp port-priority Syntax Description priority-value Defaults The default priority value is 32768. Command Modes Interface configuration Command History Release Modification 12.
Chapter 2 Cisco IOS Commands lacp system-priority lacp system-priority Use the lacp system-priority global configuration command to set the system priority for Link Aggregration Control Procol (LACP). Use the no form of this command to reset the LACP system priority. lacp system-priority priority-value no lacp system-priority Syntax Description priority-value Defaults The default priority value is 32768. Command Modes Global configuration Command History Release Modification 12.
Chapter 2 Cisco IOS Commands mac access-group mac access-group Use the mac access-group interface configuration command to apply a named extended MAC access control list (ACL) to an interface. Use the no form of this command to remove a MAC ACL from an interface. mac access-group name in no mac access-group name in This command is available only if your switch is running the enhanced software image (EI). Syntax Description name Defaults No MAC ACL is applied to the interface.
Chapter 2 Cisco IOS Commands mac access-group Related Commands Command Description {deny (MAC access-list configuration) | permit (MAC access-list configuration)} Configures a MAC ACL. show access-lists Displays the ACLs configured on the switch. show mac access-group Displays the MAC ACLs configured on the switch.
Chapter 2 Cisco IOS Commands mac access-list extended mac access-list extended Use the mac access-list extended global configuration command to create an access control list (ACL) based on MAC addresses. Using this command changes the mode to extended MAC access-list configuration mode. Use the no form of this command to return to the default setting. mac access-list extended name no mac access-list extended name This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands mac access-list extended Related Commands Command Description class-map Creates a class map to be used for matching packets to the class whose name you specify and to enter class-map configuration mode. {deny (MAC access-list configuration) | permit (MAC access-list configuration)} Configures a MAC ACL. mac access-group Applies a MAC ACL to an interface. show access-lists Displays the ACLs configured on the switch.
Chapter 2 Cisco IOS Commands mac address-table aging-time mac address-table aging-time Use the mac address-table aging-time global configuration command to set the length of time that a dynamic entry remains in the MAC address table after the entry is used or updated. Use the no form of this command to return to the default setting. The aging time applies to all VLANs.
Chapter 2 Cisco IOS Commands mac address-table aging-time This example shows how to set aging time to 450 seconds for all VLANs for which the user did not specify aging time. Switch(config)# mac address-table aging-time 450 You can verify your settings by entering the show mac address-table privileged EXEC command. Related Commands Command Description clear mac address-table Deletes dynamic entries from the MAC address table. show mac address-table Displays the MAC address table.
Chapter 2 Cisco IOS Commands mac address-table notification mac address-table notification Use the mac address-table notification global configuration command to enable the MAC notification feature and configure the notification-trap interval or history table. Use the no form of this command to disable this feature.
Chapter 2 Cisco IOS Commands mac address-table notification Examples This example shows how to enable the MAC notification feature: Switch(config)# mac address-table notification This example shows how to set the notification-trap interval to 60 seconds: Switch(config)# mac address-table notification interval 60 This example shows how to set the number of entries in the history table to 32: Switch(config)# mac address-table notification history-size 32 You can verify your settings by entering the show
Chapter 2 Cisco IOS Commands mac address-table static mac address-table static Use the mac address-table static global configuration command to add static addresses to the MAC address table. Use the no form of this command to remove static entries from the MAC address table. mac address-table static mac-addr vlan vlan-id interface interface-id no mac address-table static mac-addr vlan vlan-id interface interface-id Note Syntax Description Beginning with Release 12.
Chapter 2 Cisco IOS Commands mac address-table static Examples This example shows how to add the static address 0004.5600.67ab to the MAC address table: Switch(config)# mac address-table static 0004.5600.67ab vlan 1 interface fastethernet0/2 This example shows how to add the static address c2f3.220a.12f4 to the MAC address table. When a packet is received in VLAN 4 with this MAC address as its destination, the packet is forwarded to the specified interface: Switch(config)# mac address-table static c2f3.
Chapter 2 Cisco IOS Commands match match Use the match class-map configuration command to define the match criteria to classify traffic. Use the no form of this command to remove the match criteria. match {access-group acl-index | access-group name acl-name | ip dscp dscp-list} no match {access-group acl-index | access-group name acl-name | ip dscp} This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands match Examples This example shows how to classify traffic on an interface by using the access group named acl2: Switch(config)# class-map class2 Switch(config-cmap)# match access-group name acl2 Switch(config-cmap)# exit You can verify your settings by entering the show class-map privileged EXEC command. Related Commands Command Description class Defines a traffic classification for a policy to act on using the class-map name or access group.
Chapter 2 Cisco IOS Commands mls qos cos mls qos cos Use the mls qos cos interface configuration command to define the default class of service (CoS) value of a port or to assign the default CoS to all incoming packets on the port. Use the no form of this command to return to the default setting. mls qos cos {default-cos | override} no mls qos cos {default-cos | override} Syntax Description Defaults default-cos Assign a default CoS value to a port.
Chapter 2 Cisco IOS Commands mls qos cos This example shows how to assign all the packets entering a port to the default port CoS value of 4: Switch(config)# interface gigabitethernet0/1 Switch(config-if)# mls qos cos 4 Switch(config-if)# mls qos cos override You can verify your settings by entering the show mls qos interface privileged EXEC command. Related Commands Command Description mls qos map Defines the CoS-to-DSCP map or the DSCP-to-CoS map. mls qos trust Configures the port trust state.
Chapter 2 Cisco IOS Commands mls qos map mls qos map Use the mls qos map global configuration command to define the class of service (CoS)-to-Differentiated Services Code Point (DSCP) map or DSCP-to-CoS map. Use the no form of this command to return to the default map. mls qos map {cos-dscp dscp1...dscp8 | dscp-cos dscp-list to cos} no mls qos map {cos-dscp | dscp-cos} This command is available only if your switch is running the enhanced software image (EI). Syntax Description cos-dscp dscp1...
Chapter 2 Cisco IOS Commands mls qos map Usage Guidelines All the maps are globally defined. You apply all maps to all ports. If you enter the mls qos trust cos command, the default CoS-to-DSCP map is applied. If you enter the mls qos trust dscp command, the default DSCP-to-CoS map is applied. After a default map is applied, you can define the CoS-to-DSCP or DSCP-to-CoS map by entering consecutive mls qos map commands. The supported DSCP values are 0, 8, 10, 16, 18, 24, 26, 32, 34, 40, 46, 48, and 56.
Chapter 2 Cisco IOS Commands mls qos trust mls qos trust Use the mls qos trust interface configuration command to configure the port trust state. Ingress traffic can be trusted, and classification is performed by examining the class of service (CoS) or the Differentiated Services Code Point (DSCP) value. Use the no form of this command to return a port to its untrusted state.
Chapter 2 Cisco IOS Commands mls qos trust If DSCP is trusted, the DSCP field of the IP packet is not modified. However, it is still possible that the CoS value of the packet is modified (according to the DSCP-to-CoS map). If CoS is trusted, the CoS of the packet is not modified, but DSCP can be modified (according to the CoS-to-DSCP map) if it is an IP packet. To return a port to the untrusted state, use the no mls qos trust interface configuration command.
Chapter 2 Cisco IOS Commands mls qos trust Related Commands Command Description mls qos cos Defines the default CoS value of a port or assigns the default CoS to all incoming packets on the port. mls qos map Defines the CoS-to-DSCP map or the DSCP-to-CoS map. show mls qos interface Displays QoS information.
Chapter 2 Cisco IOS Commands monitor session monitor session Use the monitor session global configuration command to start a new Switched Port Analyzer (SPAN) or Remote SPAN (RSPAN) session, to add or delete interfaces or VLANs to or from an existing SPAN or RSPAN session, and to limit (filter) SPAN source traffic to specific source VLANs. Use the no form of this command to remove the SPAN or the RSPAN session or to remove source or destination interfaces or filters from the SPAN or RSPAN session.
Chapter 2 Cisco IOS Commands monitor session both, rx, tx (Optional) Specify the traffic direction to monitor. If you do not specify a traffic direction, the source interface sends both transmitted and received traffic. Transmitted (tx) traffic can be monitored on only one source port. source remote vlan vlan-id Specify the source RSPAN VLAN for an RSPAN destination session. source vlan vlan-id rx Specify the SPAN or RSPAN source interface as a VLAN ID.
Chapter 2 Cisco IOS Commands monitor session You can enable 802.1X on a port that is a SPAN or RSPAN destination port; however, 802.1X is disabled until the port is removed as a SPAN destination. (If 802.1X is not available on the port, the switch will return an error message.) You can enable 802.1X on a SPAN or RSPAN source port. VLAN monitoring and VLAN filtering are mutually exclusive. If a VLAN is a source, VLAN filtering cannot be enabled.
Chapter 2 Cisco IOS Commands mvr mvr Use the mvr global configuration command without keywords to enable the multicast VLAN registration (MVR) feature on the switch. Use the no form of this command to disable MVR and its options. Use the command with keywords to set the MVR mode for a switch, to configure the MVR IP multicast address, to set the maximum time to wait for a query reply before removing a port from group membership, and to specify the MVR multicast VLAN.
Chapter 2 Cisco IOS Commands mvr The default query response time is 5 tenths of or one-half second. The default multicast VLAN for MVR is VLAN 1. Command Modes Global configuration Command History Release Modification 12.1(6)EA2 This command was first introduced. Usage Guidelines A maximum of 256 MVR multicast groups can be configured on a switch. Use the mvr group command to statically configure all the IP multicast addresses that will take part in MVR.
Chapter 2 Cisco IOS Commands mvr This example shows how to delete the previously configured ten IP multicast addresses: Switch(config)# no mvr group 228.1.23.
Chapter 2 Cisco IOS Commands mvr immediate mvr immediate Use the mvr immediate interface configuration command to enable the Immediate-Leave feature on an interface. Use the no form of this command to disable the feature on the interface. mvr immediate no mvr immediate Syntax Description This command has no keywords or arguments. Defaults The Immediate-Leave feature is disabled. Command Modes Interface configuration Command History Release Modification 12.
Chapter 2 Cisco IOS Commands mvr immediate Related Commands Command Description mvr Enables multicast VLAN registration (MVR). mvr type Configures a port as a receiver or source port. mvr vlan group Configures a receiver port as a member of an MVR group. show mvr Displays MVR global parameters or port parameters.
Chapter 2 Cisco IOS Commands mvr type mvr type Use the mvr type interface configuration command to configure a port as a multicast VLAN registration (MVR) receiver or source port. Use the no form of this command to return the port to the default settings. mvr type {receiver | source} no mvr type {receiver | source} Syntax Description receiver Port that receives multicast data and cannot send multicast data to multicast groups. source Port that can send and receive multicast data to multicast groups.
Chapter 2 Cisco IOS Commands mvr type Examples This example shows how to configure a port as an MVR receiver port: Switch(config)# interface fastethernet0/1 Switch(config-if)# mvr type receiver This example shows how to configure a port as an MVR source port: Switch(config)# interface fastethernet0/3 Switch(config-if)# mvr type source This example shows how to return a port to the default setting: Switch(config)# interface fastethernet0/5 Switch(config-if)# no mvr type receiver You can verify your se
Chapter 2 Cisco IOS Commands mvr vlan group mvr vlan group Use the mvr vlan group interface configuration command to statically configure a receiver port as a member of a multicast VLAN registration (MVR) group in a particular VLAN. Use the no form of this command to remove the port from the MVR group. mvr vlan vlan-id group ip-address no mvr vlan vlan-id group ip-address Syntax Description vlan vlan-id Specify the VLAN ID to which the receiver port belongs.
Chapter 2 Cisco IOS Commands mvr vlan group Related Commands Command Description mvr Enables MVR. mvr immediate Enables the Immediate-Leave feature on an interface. mvr type Configures a port as a receiver or source port. show mvr Displays MVR global parameters or port parameters.
Chapter 2 Cisco IOS Commands pagp learn-method pagp learn-method Use the pagp learn-method interface configuration command to set the source-address learning method of incoming packets received from an EtherChannel port. Use the no form of this command to return to the default setting. pagp learn-method aggregation-port no pagp learn-method Syntax Description Note aggregation-port Specify address learning on the logical port-channel.
Chapter 2 Cisco IOS Commands pagp learn-method Examples This example shows how to set the learning method to aggregation-port (the default): Switch(config-if)# pagp learn-method aggregation-port You can verify your settings by entering the show running-config or show pagp channel-group-number internal privileged EXEC command. Related Commands Command Description channel-group Assigns an Ethernet interface to an EtherChannel group.
Chapter 2 Cisco IOS Commands pagp port-priority pagp port-priority You do not need to enter this command. It is documented for informational purposes only. Though visible in the command-line help strings, the switch does not support the pagp port-priority command. Use the pagp port-priority interface configuration command to select an interface through which all Port Aggregation Protocol (PAgP) traffic through the EtherChannel is sent. Use the no form of this command to return to the default value.
Chapter 2 Cisco IOS Commands permit (access-list configuration) permit (access-list configuration) Use the permit access-list configuration command to configure conditions for a named or numbered IP access control list (ACL). Use the no form of this command to remove a permit condition from the IP ACL.
Chapter 2 Cisco IOS Commands permit (access-list configuration) destination Define a destination IP address and wildcard. destination-wildcard | host The destination is the destination address of the network or host to which destination | any the packet is being sent, specified in one of these ways: operator port • The 32-bit quantity in dotted-decimal format. The destination-wildcard applies wildcard bits to the destination.
Chapter 2 Cisco IOS Commands permit (access-list configuration) Usage Guidelines Note Examples Use this command after the ip access-list global configuration command to specify permit conditions for a named or numbered IP ACL. You can specify a source IP address, destination IP address, IP protocol, TCP port, or UDP port. Specify the TCP and UDP port numbers only if protocol is tcp or udp and operator is eq.
Chapter 2 Cisco IOS Commands permit (MAC access-list configuration) permit (MAC access-list configuration) Use the permit MAC access-list configuration command to allow Layer 2 traffic to be forwarded if the conditions are matched. Use the no form of this command to remove a permit condition from the named MAC access control list (ACL).
Chapter 2 Cisco IOS Commands permit (MAC access-list configuration) vines-ip Select EtherType VINES IP. xns-idp Select EtherType Xerox Network Systems (XNS) protocol suite (from 0 to 65535), an arbitrary Ethertype in decimal, hexadecimal, or octal. Defaults This command has no defaults. However, the default action for a MAC-named ACL is to deny. Command Modes MAC access-list configuration Command History Release Modification 12.1(6)EA2 This command was first introduced.
Chapter 2 Cisco IOS Commands police police Use the police policy-map class configuration command to define a policer for classified traffic. Use the no form of this command to remove an existing policer. police rate-bps burst-byte [exceed-action {drop | dscp dscp-value}] no police rate-bps burst-byte [exceed-action {drop | dscp dscp-value}] This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands police Note Examples For more information about configuring access control lists (ACLs), refer to the “Configuring Network Security with ACLs” chapter in the Catalyst 2950 and Catalyst 2955 Switch Software Configuration Guide for this release.
Chapter 2 Cisco IOS Commands policy-map policy-map Use the policy-map global configuration command to create or modify a policy map that can be attached to multiple interfaces and to enter policy-map configuration mode. Use the no form of this command to delete an existing policy map and return to global configuration mode. policy-map policy-map-name no policy-map policy-map-name This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands policy-map You can configure class policies in a policy map only if the classes have match criteria defined for them. Use the class-map and match commands to configure the match criteria for a class. Only one match command per class map is supported. Only one policy map per interface per direction is supported. You can apply the same policy map to multiple interfaces but only in the ingress direction.
Chapter 2 Cisco IOS Commands port-channel load-balance port-channel load-balance Use the port-channel load-balance global configuration command to set the load distribution method among the ports in the EtherChannel. Use the no form of this command to reset the load distribution to the default. port-channel load-balance method no port-channel load-balance Syntax Description method Load distribution method.
Chapter 2 Cisco IOS Commands port-channel load-balance Related Commands Command Description channel-group Assigns an Ethernet interface to an EtherChannel group. show etherchannel Displays EtherChannel information for a channel. show running-config Displays the configuration information running on the switch. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.1 > Cisco IOS File Management Commands > Configuration File Commands.
Chapter 2 Cisco IOS Commands rcommand rcommand Use the rcommand user EXEC command to start a Telnet session and to enter commands from the command switch for a member switch. To end the session, enter the exit command. rcommand {n | commander | mac-address hw-addr} Syntax Description n Provide the number that identifies a cluster member. The range is from 0 to 15. commander Provide access to the command switch from a member switch. mac-address hw-addr MAC address of the member switch.
Chapter 2 Cisco IOS Commands rcommand Examples This example shows how to start a session with member 3. All subsequent commands are directed to member 3 until you enter the exit command or close the session. Switch# rcommand 3 Switch-3# show version Cisco Internet Operating System Software ... ... Switch-3# exit Switch# Related Commands Command Description show cluster members Displays information about the cluster members.
Chapter 2 Cisco IOS Commands remote-span remote-span Use the remote-span VLAN configuration command to add the Remote Switched Port Analyzer (RSPAN) feature to a VLAN. Use the no form of this command to remove the RSPAN feature from the VLAN. remote-span no remote-span This command is available only if your switch is running the enhanced software image (EI). Syntax Description This command has no arguments or keywords. Defaults No RSPAN VLANs are defined.
Chapter 2 Cisco IOS Commands remote-span Related Commands Command Description monitor session Enables SPAN and RSPAN monitoring on a port and configures a port as a source or destination port. vlan (global configuration) Changes to config-vlan mode where you can configure VLANs 1 to 1005. Do not enter leading zeros.
Chapter 2 Cisco IOS Commands rmon collection stats rmon collection stats Use the rmon collection stats interface configuration command to collect Ethernet group statistics. The Ethernet group statistics include utilization statistics about broadcast and multicast packets and error statistics about Cyclic Redundancy Check (CRC) alignment errors and collisions. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands rmon collection stats Related Commands Command Description show rmon statistics Displays RMON statistics. For more information on this command, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.1 > Cisco IOS System Management Commands > RMON Commands.
2 Chapter 2 Cisco IOS Commands service-policy service-policy Use the service-policy interface configuration command to apply a policy map defined by the policy-map command to the input of a particular interface. Use the no form of this command to remove the policy map and interface association. service-policy input policy-map-name no service-policy input policy-map-name This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands service-policy Related Commands Command Description policy-map Creates or modifies a policy map that can be attached to multiple interfaces to specify a service policy. show policy-map Displays quality of service (QoS) policy maps.
Chapter 2 Cisco IOS Commands set set Use the set policy-map class configuration command to classify IP traffic by setting a Differentiated Services Code Point (DSCP) value. Use the no form of this command to remove traffic classification. set ip dscp new-dscp no set ip dscp new-dscp This command is available only if your switch is running the enhanced software image (EI). Syntax Description new-dscp New DSCP value assigned to the classified traffic.
Chapter 2 Cisco IOS Commands set Examples This example shows how to assign a DSCP value of 10 to all FTP traffic without any policers: Switch(config)# policy-map policy_ftp Switch(config-pmap)# class ftp_class Switch(config-pmap-c)# set ip dscp 10 Switch(config-pmap)# exit You can verify your settings by entering the show policy-map privileged EXEC command. Related Commands Command Description police Defines a policer for classified traffic.
Chapter 2 Cisco IOS Commands show access-lists show access-lists Use the show access-lists privileged EXEC command to display access control lists (ACLs) configured on the switch. show access-lists [name | number] [ | {begin | exclude | include} expression] Syntax Description name (Optional) Name of the ACL. number (Optional) ACL number. The range is from 1 to 2699. | begin (Optional) Display begins with the line that matches the expression.
Chapter 2 Cisco IOS Commands show access-lists Related Commands Command Description access-list (IP extended) Configures an extended IP ACL on the switch. access-list (IP standard) Configures a standard IP ACL on the switch. ip access-list Configures an IP ACL on the switch. mac access-list extended Creates an ACL based on MAC addresses. show ip access-lists Displays the IP ACLs configured on a switch.
Chapter 2 Cisco IOS Commands show auto qos show auto qos Use the show auto qos user EXEC command to display the automatic quality of service (auto-QoS) configuration that is applied. show auto qos [interface [interface-id]] [ | {begin | exclude | include} expression] This command is available only if your switch is running the enhanced software image (EI). Syntax Description interface [interface-id] (Optional) Display auto-QoS information for the specified interface or for all interfaces.
Chapter 2 Cisco IOS Commands show auto qos Examples This is an example of output from the show auto qos command when auto-QoS is enabled: Switch# show auto qos Initial configuration applied by AutoQoS: wrr-queue bandwidth 20 1 80 0 no wrr-queue cos-map wrr-queue cos 1 0 1 2 4 wrr-queue cos 3 3 6 7 wrr-queue cos 4 5 mls qos map cos-dscp 0 8 16 26 32 46 48 56 ! interface FastEthernet0/3 mls qos trust device cisco-phone mls qos trust cos This is an example of output from the show auto qos interface command
Chapter 2 Cisco IOS Commands show boot show boot Use the show boot privileged EXEC command to display the settings of the boot environment variables. show boot [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the expression. | exclude (Optional) Display excludes lines that match the expression. | include (Optional) Display includes lines that match the specified expression.
Chapter 2 Cisco IOS Commands show boot Table 2-6 show boot Field Descriptions Field Description BOOT path-list Displays a semicolon-separated list of executable files to load and to execute when automatically booting. If the BOOT environment variable is not set, the system attempts to load and execute the first executable image it can find by using a recursive, depth-first search through the Flash file system.
Chapter 2 Cisco IOS Commands show class-map show class-map Use the show class-map user EXEC command to display quality of service (QoS) class maps, which define the match criteria to classify traffic. show class-map [class-map-name] [ | {begin | exclude | include} expression] This command is available only if your switch is running the enhanced software image (EI). Syntax Description class-map-name (Optional) Display the contents of the specified class map.
Chapter 2 Cisco IOS Commands show class-map Related Commands Command Description class-map Creates a class map to be used for matching packets to the class whose name you specify. match Defines the match criteria to classify traffic.
Chapter 2 Cisco IOS Commands show cluster show cluster Use the show cluster privileged EXEC command to display the cluster status and a summary of the cluster to which the switch belongs. This command can be entered on command and member switches. show cluster [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the specified expression. | exclude (Optional) Display excludes lines that match the specified expression.
Chapter 2 Cisco IOS Commands show cluster This is an example of output when this command is entered on a member switch: Switch# show cluster Member switch for cluster "commander" Member number: Management IP address: Command switch mac address: Heartbeat interval: Heartbeat hold-time: 3 192.192.192.192 0000.0c07.
Chapter 2 Cisco IOS Commands show cluster candidates show cluster candidates Use the show cluster candidates privileged EXEC command on the command switch to display a list of candidate switches. show cluster candidates [detail | mac-address H.H.H.] [ | {begin | exclude | include} expression] Syntax Description detail (Optional) Display detailed information for all candidates. mac-address H.H.H. (Optional) Hexadecimal MAC address of the cluster candidate.
Chapter 2 Cisco IOS Commands show cluster candidates This is an example of output from the show cluster candidates command that uses the MAC address of a member switch directly connected to the command switch: Switch# show cluster candidates mac-address 00d0.7961.c4c0 Device 'c2950-12' with mac address number 00d0.7961.c4c0 Device type: cisco WS-C2950-12 Upstream MAC address: 00d0.796d.
Chapter 2 Cisco IOS Commands show cluster members show cluster members Use the show cluster members privileged EXEC command on the command switch to display information about the cluster members. show cluster members [n | detail] [ | {begin | exclude | include} expression] Syntax Description n (Optional) Number that identifies a cluster member. The range is from 0 to 15. detail (Optional) Display detailed information for all cluster members.
Chapter 2 Cisco IOS Commands show cluster members This is an example of output from the show cluster members detail command: Switch# show cluster members detail Device 'StLouis1' with member number 0 (Command Switch) Device type: cisco WS-C3550-12T MAC address: 0002.4b29.2e00 Upstream MAC address: Local port: FEC number: Upstream port: FEC Number: Hops from command device: 0 Device 'tal-switch-14' with member number 1 Device type: cisco WS-C3548-XL MAC address: 0030.946c.d740 Upstream MAC address: 0002.
Chapter 2 Cisco IOS Commands show dot1x show dot1x Use the show dot1x privileged EXEC command to display the 802.1X statistics, administrative status, and operational status for the switch or for the specified interface. show dot1x [interface interface-id] | [statistics [interface interface-id]] [ | {begin | exclude | include} expression] Syntax Description interface interface-id (Optional) Display the 802.1X status for the specified port. statistics [interface interface-id] (Optional) Display 802.
Chapter 2 Cisco IOS Commands show dot1x 802.1X Port Summary Port Name Gi0/1 Gi0/2 Status disabled enabled Mode n/a Auto (negotiate) Authorized n/a no 802.1X Port Details 802.1X is disabled on GigabitEthernet0/1 802.1X is enabled on GigabitEthernet0/2 Status Unauthorized Port-control Auto Supplicant 0060.b0f8.
Chapter 2 Cisco IOS Commands show dot1x Authenticator State Machine State AUTHENTICATED Reauth Count 0 Backend State Machine State IDLE Request Count 0 Identifier (Server) 2 Reauthentication State Machine State INITIALIZE Table 2-7 show dot1x interface Field Description Field Description 802.1X is enabled on GigabitEthernet0/2 Status Status of the port (authorized or unauthorized).
Chapter 2 Cisco IOS Commands show dot1x Table 2-8 show dot1x statistics Field Descriptions Field Description 1 RX EAPOL Start Number of valid EAPOL-start frames that have been received RX EAPOL Logoff Number of EAPOL-logoff frames that have been received RX EAPOL Invalid Number of EAPOL frames that have been received and have an unrecognized frame type RX EAPOL Total Number of valid EAPOL frames of any type that have been received RX EAP2 Resp/ID Number of EAP-response/identity frames that hav
Chapter 2 Cisco IOS Commands show env show env Use the show env user EXEC command to display fan information for the switch. show env {all | fan | power | rps} [ | {begin | exclude | include} expression] Syntax Description all Display both fan and temperature environmental status. fan Display the switch fan status (only available in privileged EXEC mode). power Display the internal power supply status. rps Display the Redundant Power System (RPS) status.
Chapter 2 Cisco IOS Commands show errdisable recovery show errdisable recovery Use the show errdisable recovery user EXEC command to display the error-disable recovery timer information. show errdisable recovery [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the expression. | exclude (Optional) Display excludes lines that match the expression. | include (Optional) Display includes lines that match the specified expression.
Chapter 2 Cisco IOS Commands show errdisable recovery Related Commands Command Description errdisable recovery Configures the recover mechanism variables. show interfaces trunk Displays interface status or a list of interfaces in error-disabled state.
Chapter 2 Cisco IOS Commands show etherchannel show etherchannel Use the show etherchannel user EXEC command to display EtherChannel information for a channel. show etherchannel [channel-group-number] {brief | detail | load-balance | port | port-channel | summary} [ | {begin | exclude | include} expression] Syntax Description channel-group-number (Optional) Number of the channel group. Valid numbers range from 1 to 6. brief Display a summary of EtherChannel information.
Chapter 2 Cisco IOS Commands show etherchannel Examples This is an example of output from the show etherchannel 1 detail command: Switch> show etherchannel 1 detail Group state = L2 Ports: 1 Maxports = 8 Port-channels: 1 Max Port-channels = 1 Ports in the group: ------------------Port: Fa0/3 -----------Port state Channel group Port-channel Port index Flags: S A d Timers: H S - = = = = Down Not-in-Bndl 1 Mode = Automatic-Sl null GC = 0x00000000 0 Load = 0x00 Device is sending Slow hello.
Chapter 2 Cisco IOS Commands show etherchannel This is an example of output from the show etherchannel 1 port command: Switch> show etherchannel 1 port Ports in the group: ------------------Port: Fa0/3 -----------Port state Channel group Port-channel Port index Flags: S A d Timers: H S - = = = = Down Not-in-Bndl 1 Mode = Automatic-Sl null GC = 0x00000000 0 Load = 0x00 Device is sending Slow hello. Device is in Auto mode. PAgP is down. Hello timer is running. Switching timer is running.
Chapter 2 Cisco IOS Commands show file show file Use the show file privileged EXEC command to display a list of open file descriptors, file information, and file system information. show file {descriptors | information {device:}filename | systems} [ | {begin | exclude | include} expression] Syntax Description descriptors Display a list of open file descriptors. information Display file information. device: Device containing the file. Valid devices include the switch Flash memory.
Chapter 2 Cisco IOS Commands show file Table 2-9 describes the fields in the show file descriptors command output. Table 2-9 show file descriptors Field Descriptions Field Description FD File descriptor. The file descriptor is a small integer used to specify the file once it has been opened. Position Byte offset from the start of the file. Open Flags supplied when opening the file. PID Process ID of the process that opened the file. Path Location of the file.
Chapter 2 Cisco IOS Commands show file For this example, Table 2-11 describes the fields in the show file systems command output. Table 2-12 lists the file system types. Table 2-13 lists the file system flags. Table 2-11 show file systems Field Descriptions Field Description Size(b) Amount of memory in the file system, in bytes. Free(b) Amount of free memory in the file system, in bytes. Type Type of file system. Flags Permissions for file system. Prefixes Alias for file system.
Chapter 2 Cisco IOS Commands show interfaces show interfaces Use the show interfaces privileged EXEC command to display the administrative and operational status of all interfaces or a specified interface.
Chapter 2 Cisco IOS Commands show interfaces Command History Release Modification 12.0(5.2)WC(1) This command was first introduced. 12.1(12c)EA1 The capabilities keyword was added. Usage Guidelines Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not appear, but the lines that contain Output appear.
Chapter 2 Cisco IOS Commands show interfaces This is an example of output from the show interfaces gigabitethernet0/1 command: Switch# show interfaces gigabitethernet0/1 FastEthernet0/1 is up, line protocol is down Hardware is Fast Ethernet, address is 0005.7428.09c1 (bia 0005.7428.
Chapter 2 Cisco IOS Commands show interfaces This is an example of output from the show interfaces status command. It displays the status of all interfaces.
Chapter 2 Cisco IOS Commands show interfaces This is an example of output from the show interfaces switchport command for a single interface. Table 2-14 describes the fields in the output.
Chapter 2 Cisco IOS Commands show interfaces This is an example of output from the show interfaces trunk command: Switch# show interfaces trunk Port Fa0/4 Fa0/6 Mode on on Encapsulation 802.1q 802.
Chapter 2 Cisco IOS Commands show interfaces counters show interfaces counters Use the show interfaces counters privileged EXEC command to display various counters for a specific interface or for all interfaces. show interfaces [interface-id | vlan vlan-id] counters [broadcast | errors | multicast | trunk | unicast] [ | {begin | exclude | include} expression] Syntax Description interface-id (Optional) ID of the physical interface, including type and slot and port number.
Chapter 2 Cisco IOS Commands show interfaces counters Examples This is an example of output from the show interfaces counters command. It displays all the counters for the switch. Switch# show interfaces counters Port InOctets InUcastPkts Gi0/1 23324617 10376 Gi0/2 0 0 Port Gi0/1 Gi0/2 OutOctets 4990607 1621568 OutUcastPkts 28079 25337 InMcastPkts 185709 0 InBcastPkts 126020 0 OutMcastPkts 21122 0 OutBcastPkts 10 0 This is an example of output from the show interfaces counters broadcast command.
Chapter 2 Cisco IOS Commands show interfaces counters This is an example of output from the show interfaces counters unicast command. It displays the dropped unicast traffic for all interfaces. Switch# show interfaces counters unicast Port Gi0/1 Gi0/2 Related Commands UcastSuppDiscards 6872 0 Command Description show interfaces Displays interface characteristics. storm-control Configures broadcast, multicast, and unicast storm control for an interface.
Chapter 2 Cisco IOS Commands show ip access-lists show ip access-lists Use the show ip access-lists privileged EXEC command to display IP access control lists (ACLs) configured on the switch. show ip access-lists [name | number] [ | {begin | exclude | include} expression] Syntax Description name (Optional) ACL name. number (Optional) ACL number. The range is from 1 to 199 and from 1300 to 2699. | begin (Optional) Display begins with the line that matches the expression.
Chapter 2 Cisco IOS Commands show ip access-lists This is an example of output from the show ip access-lists 103 command: Switch# show ip access-lists 103 Extended IP access list 103 permit tcp any any eq www Related Commands Command Description access-list (IP extended) Configures an extended IP ACL on the switch. access-list (IP standard) Configures a standard IP ACL on the switch. ip access-list Configures an IP ACL on the switch. show access-lists Displays ACLs configured on a switch.
Chapter 2 Cisco IOS Commands show ip igmp snooping show ip igmp snooping Use the show ip igmp snooping privileged EXEC command to display the Internet Group Management Protocol (IGMP) snooping configuration of the switch or the VLAN.
Chapter 2 Cisco IOS Commands show ip igmp snooping vlan 3 ---------IGMP snooping IGMP snooping IGMP snooping IGMP snooping vlan 4 ---------IGMP snooping IGMP snooping IGMP snooping IGMP snooping vlan 5 ---------IGMP snooping IGMP snooping IGMP snooping IGMP snooping vlan 33 ---------IGMP snooping IGMP snooping IGMP snooping IGMP snooping is globally enabled is enabled on this Vlan immediate-leave is disabled on this Vlan mrouter learn mode is cgmp on this Vlan is globally enabled is enabled on this Vlan
Chapter 2 Cisco IOS Commands show ip igmp snooping mrouter show ip igmp snooping mrouter Use the show ip igmp snooping mrouter privileged EXEC command to display information on dynamically learned and manually configured multicast router ports.
Chapter 2 Cisco IOS Commands show ip igmp snooping mrouter Related Commands Command Description ip igmp snooping Enables IGMP snooping. ip igmp snooping vlan Enables IGMP snooping on the VLAN interface. ip igmp snooping vlan immediate-leave Configures IGMP Immediate-Leave processing. ip igmp snooping vlan mrouter Configures a Layer 2 port as a multicast router port. show mac address-table multicast Displays the Layer 2 multicast entries for a VLAN.
Chapter 2 Cisco IOS Commands show lacp show lacp Use the show lacp user EXEC command to display Link Aggregation Control Protocol (LACP) channel-group information. show lacp {channel-group-number {counters | internal | neighbor} | {counters | internal | neighbor | sys-id }} [ | {begin | exclude | include} expression] Syntax Description channel-group-number (Optional) Number of the channel group. Valid numbers range from 1 to 6. counters Display traffic information.
Chapter 2 Cisco IOS Commands show lacp This is an example of output from the show lacp 1 internal command: Switch> show lacp internal Flags: S - Device is sending Slow LACPDUs F - Device is sending Fast LACPDUs A - Device is in Active mode P - Device is in Passive mode Channel group 1 Port Fa0/5 Fa0/6 Fa0/7 Flags SP SP SP LACP port Priority 32768 32768 32768 State indep indep down Admin Key 0x1 0x1 0x1 Oper Key 0x1 0x1 0x1 Port Number 0x4 0x5 0x6 Port State 0x7C 0x7C 0xC This is an example of outpu
Chapter 2 Cisco IOS Commands show mac access-group show mac access-group Use the show mac access-group user EXEC command to display the MAC access control lists (ACLs) configured for an interface or a switch. show mac access-group [interface interface-id] [ | {begin | exclude | include} expression] This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands show mac access-group Interface GigabitEthernet0/2: Inbound access-list is 101 This is an example of output from the show mac access-group interface gigabitethernet 0/2 command: Switch# show mac access-group interface gigabitethernet 0/2 Interface GigabitEthernet0/2: Inbound access-list is 101 Related Commands Command Description mac access-group Applies a MAC ACL to an interface.
Chapter 2 Cisco IOS Commands show mac address-table show mac address-table Use the show mac address-table user EXEC command to display the MAC address table. show mac address-table [aging-time | count | dynamic | static] [address hw-addr] [interface interface-id] [vlan vlan-id] [ | {begin | exclude | include} expression] Note Syntax Description Beginning with Release 12.1(11)EA1, the show mac address-table command replaces the show mac-address-table command (with the hyphen).
Chapter 2 Cisco IOS Commands show mac address-table Usage Guidelines This command displays the MAC address table for the switch. Specific views can be defined by using the optional keywords and values. If more than one optional keyword is used, all of the conditions must be true in order for that entry to appear. Expressions are case sensitive. For example, if you enter | exclude output, the lines that contain output do not appear, but the lines that contain Output appear.
Chapter 2 Cisco IOS Commands show mac address-table This is an example of output from the show mac address-table aging-time vlan 1 command: Switch> show mac address-table aging-time vlan 1 Vlan Aging Time ---- ---------1 450 Related Commands Command Description clear mac address-table dynamic Deletes from the MAC address table a specific dynamic address, all dynamic addresses on a particular interface, or all dynamic addresses on a particular VLAN.
Chapter 2 Cisco IOS Commands show mac address-table multicast show mac address-table multicast Use the show mac address-table multicast user EXEC command to display the Layer 2 multicast entries for the switch or for the VLAN. show mac address-table multicast [vlan vlan-id] [count] [igmp-snooping | user] [ | {begin | exclude | include} expression] Note Syntax Description Beginning with Release 12.
Chapter 2 Cisco IOS Commands show mac address-table multicast Examples This is an example of output from the show mac address-table multicast vlan 1 command: Switch# show Vlan ---1 1 mac address-table multicast vlan 1 Mac Address ----------0100.5e00.0128 0100.5e01.
Chapter 2 Cisco IOS Commands show mac address-table notification show mac address-table notification Use the show mac address-table notification user EXEC command to display parameters for the MAC notification feature. show mac address-table notification [interface interface-id] [ | {begin | exclude | include} expression] Note Syntax Description Beginning with Release 12.1(11)EA1, the show mac address-table notification command replaces the show mac-address-table notification command (with the hyphen).
Chapter 2 Cisco IOS Commands show mac address-table notification Related Commands Command Description clear mac address-table notification Clears the MAC address notification global counters. mac address-table notification Enables the MAC notification feature. snmp trap mac-notification Enables MAC-notification traps on a port.
Chapter 2 Cisco IOS Commands show mls masks show mls masks Use the show mls masks user EXEC command to display the details of the Access Control Parameters (ACPs) used for quality of service (QoS) and security access control lists (ACLs). show mls masks [qos | security] [ | {begin | exclude | include} expression] This command is available only if your switch is running the enhanced software image (EI). Syntax Description Note qos (Optional) Display ACPs used for QoS ACLs.
Chapter 2 Cisco IOS Commands show mls masks Examples This is an example of output from the show mls masks command: Switch> show mls masks Mask1 Type : qos Fields : ip-sa(0.0.0.
Chapter 2 Cisco IOS Commands show mls qos interface show mls qos interface Use the show mls qos interface user EXEC command to display quality of service (QoS) information at the interface level. show mls qos interface [interface-id] [policers] [ | {begin | exclude | include} expression] Syntax Description Note interface-id (Optional) Display QoS information for the specified interface.
Chapter 2 Cisco IOS Commands show mls qos interface This is an example of output from the show mls qos interface command when pass-through mode is configured on an interface: Switch> show mls qos interface fastethernet0/2 FastEthernet0/2 trust state:not trusted trust mode:not trusted COS override:dis default COS:0 pass-through:dscp Related Commands Command Description mls qos cos Defines the default class of service (CoS) value of a port or assigns the default CoS to all incoming packets on the port.
Chapter 2 Cisco IOS Commands show mls qos maps show mls qos maps Use the show mls qos maps user EXEC command to display quality of service (QoS) mapping information. Maps are used to generate an internal Differentiated Services Code Point (DSCP) value, which represents the priority of the traffic. show mls qos maps [cos-dscp | dscp-cos] [ | {begin | exclude | include} expression] This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands show mls qos maps This is an example of output from the show mls qos maps dscp-cos command: Switch> show mls qos maps dscp-cos Dscp-cos map: dscp: 0 8 10 16 18 24 26 32 34 40 46 48 56 ----------------------------------------------cos: 0 1 1 1 2 2 3 3 4 4 5 6 7 This is an example of output from the show mls qos maps command: Switch> show mls qos maps Dscp-cos map: dscp: 0 8 10 16 18 24 26 32 34 40 46 48 56 ----------------------------------------------cos: 0 1 1 2 2 3 7 4 4 5 5
Chapter 2 Cisco IOS Commands show monitor show monitor Use the show monitor user EXEC command to display Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) session information.3 show monitor [session {session_number | all | local | remote}] [ | {begin | exclude | include} expression] Syntax Description session session_number (Optional) Specify the number of the SPAN or RSPAN session. Valid values are 1 and 2. all Specify all sessions. local Specify local sessions.
Chapter 2 Cisco IOS Commands show monitor Examples This is an example of output for the show monitor privileged EXEC command for RSPAN source session 1: Switch# show monitor session 1 Session 1 --------Type: Remote Source Session Source Ports: RX Only: Fa0/3 TX Only: None Both: None Source VLANs: RX Only: None TX Only: None Both: None Source RSPAN VLAN: None Destination Ports: None Encapsulation: Native Reflector Port: Fa0/4 Filter VLANs: None Dest RSPAN VLAN: 901 Related Commands Command Description
Chapter 2 Cisco IOS Commands show mvr show mvr Use the show mvr privileged EXEC command without keywords to display the Multicast VLAN Registration (MVR) global parameter values, including whether or not MVR is enabled, the MVR multicast VLAN, the maximum query response time, the number of multicast groups, and the MVR mode (dynamic or compatible). show mvr [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the expression.
Chapter 2 Cisco IOS Commands show mvr Related Commands Command Description mvr Enables and configures multicast VLAN registration on the switch. mvr type Configures an MVR port as a receiver or a source port. show mvr interface Displays the configured MVR interfaces, status of the specified interface, or all multicast groups to which the interface belongs. show mvr members Displays all ports that are members of an MVR multicast group.
Chapter 2 Cisco IOS Commands show mvr interface show mvr interface Use the show mvr interface privileged EXEC command without keywords to display the Multicast VLAN Registration (MVR) receiver and source ports. Use the command with keywords to display MVR parameters for a specific receiver port.
Chapter 2 Cisco IOS Commands show mvr interface This is an example of output from the show mvr interface gigabitethernet0/2 command: Switch# show mvr interface gigabitethernet0/2 Type: RECEIVER Status: ACTIVE Immediate Leave: DISABLED This is an example of output from the show mvr interface fastethernet0/6 member command: Switch# show mvr interface fastethernet0/6 member 239.255.0.0 DYNAMIC ACTIVE 239.255.0.1 DYNAMIC ACTIVE 239.255.0.2 DYNAMIC ACTIVE 239.255.0.3 DYNAMIC ACTIVE 239.255.0.
Chapter 2 Cisco IOS Commands show mvr members show mvr members Use the show mvr members privileged EXEC command to display all receiver ports that are members of an IP multicast group. show mvr members [ip-address] [ | {begin | exclude | include} expression] Syntax Description ip-address (Optional) The IP multicast address. If the address is entered, all receiver ports that are members of the multicast group appear.
Chapter 2 Cisco IOS Commands show mvr members This is an example of output from the show mvr members 239.255.0.2 command. It shows how to view the members of the IP multicast group 239.255.0.2. Switch# show mvr member 239.255.0.2 239.255.0.2 ACTIVE Gi0/1(d), Gi0/2(d) Related Commands Command Description mvr Enables and configures multicast VLAN registration on the switch. mvr type Configures an MVR port as a receiver or a source port. show mvr Displays the global MVR configuration on the switch.
Chapter 2 Cisco IOS Commands show pagp show pagp Use the show pagp user EXEC command to display Port Aggregation Protocol (PAgP) channel-group information. show pagp [channel-group-number] {counters | internal | neighbor} [ | {begin | exclude | include} expression] Syntax Description channel-group-number (Optional) Number of the channel group. Valid numbers range from 1 to 6. counters Display traffic information. internal Display internal information. neighbor Display neighbor information.
Chapter 2 Cisco IOS Commands show pagp This is an example of output from the show pagp 1 internal command: Switch> show pagp 1 internal Flags: S - Device is sending Slow hello. A - Device is in Auto mode. Timers: H - Hello timer is running. S - Switching timer is running. C - Device is in Consistent state. Q - Quit timer is running. I - Interface timer is running.
Chapter 2 Cisco IOS Commands show policy-map show policy-map Use the show policy-map user EXEC command to display quality of service (QoS) policy maps, which define classification criteria for incoming traffic. Policy maps can include policers that specify the bandwidth limitations and the action to take if the limits are exceeded.
Chapter 2 Cisco IOS Commands show policy-map Policy Map test Policy Map policytest class classtest set ip dscp 20 police 10000000 8192 exceed-action drop This is an example of output from the show policy-map policytest command: Switch> show policy-map policytest Policy Map policytest class classtest set ip dscp 20 police 10000000 8192 exceed-action drop This is an example of output from the show policy-map policytest class classtest command: Switch> show policy-map policytest class classtest set ip dscp
Chapter 2 Cisco IOS Commands show port-security show port-security Use the show port-security privileged EXEC command to display the port security settings defined for an interface or for the switch. show port-security [interface interface-id] [address] [ | {begin | exclude | include} expression] Syntax Description interface interface-id (Optional) Display the port security settings for the specified interface. address (Optional) Display all the secure addresses on all ports.
Chapter 2 Cisco IOS Commands show port-security Examples This is an example of output from the show port-security command: Switch# show port-security Secure Port MaxSecureAddr CurrentAddr SecurityViolation Security Action (Count) (Count) (Count) -----------------------------------------------------------------------------Fa0/1 11 11 0 Shutdown Fa0/5 15 5 0 Restrict Fa0/11 5 4 0 Protect -----------------------------------------------------------------------------Total Addresses in System :21 Max Addresses
Chapter 2 Cisco IOS Commands show port-security This is an example of output from the show port-security interface fastethernet0/5 address command: Switch# show port-security interface fastethernet0/5 address Secure Mac Address Table ------------------------------------------------------------------Vlan Mac Address Type Ports Remaining Age (mins) --------------------------------1 0005.0005.0001 SecureConfigured Fa0/5 19 (I) 1 0005.0005.0002 SecureConfigured Fa0/5 19 (I) 1 0005.0005.
Chapter 2 Cisco IOS Commands show rps show rps Use the show rps privileged EXEC command to display the status of the Cisco Redundant Power System (RPS). The show rps command does not apply to the Catalyst 2955. show rps [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the specified expression. | exclude (Optional) Display excludes lines that match the specified expression.
Chapter 2 Cisco IOS Commands show rps Table 2-15 show rps Output Description (continued) Display Description ALT_AMBER_BLACK The internal power supply in the switch has failed, and the RPS is providing power to the switch (redundancy has been allocated to this device). AMBER The RPS is in standby mode, or the RPS has detected a failure. Press the Standby/Active button on the RPS to put the RPS in active mode. If the RPS LED on the switch remains amber, the RPS has detected a failure.
Chapter 2 Cisco IOS Commands show running-config vlan show running-config vlan Use the show running-config vlan privileged EXEC command to display all or a range of VLAN-related configurations on the switch. show running-config vlan [vlan-ids] [ | {begin | exclude | include} expression] Syntax Description vlan-ids (Optional) Display configuration information for a single VLAN identified by VLAN ID number or a range of VLANs separated by a hyphen.
Chapter 2 Cisco IOS Commands show running-config vlan Related Commands Command Description show running-config Displays the running configuration on the switch. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.1 > Cisco IOS File Management Commands > Configuration File Commands. vlan (global configuration) Enters config-vlan mode for creating and editing VLANs.
Chapter 2 Cisco IOS Commands show spanning-tree show spanning-tree Use the show spanning-tree user EXEC command to display spanning-tree state information.
Chapter 2 Cisco IOS Commands show spanning-tree These keywords and options are available only if your switch is running the EI. mst [configuration | instance-id] [detail | interface interface-id [detail]] (Optional) Display the multiple spanning-tree (MST) region configuration and status (all options only available in privileged EXEC mode). Valid interfaces include physical ports, VLANs, and port channels. The valid VLAN range is 1 to 4094; do not enter leading zeros.
Chapter 2 Cisco IOS Commands show spanning-tree VLAN0001 Spanning tree enabled protocol ieee Root ID Priority 32768 Address 0001.4297.e000 Cost 57 Port 1 (GigabitEthernet0/1) Hello Time 2 sec Max Age 20 sec Bridge ID Forward Delay 15 sec Priority 32769 (priority 32768 sys-id-ext 1) Address 0002.4b29.7a00 Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec Aging Time 300 Interface Name ---------------Gi0/1 Gi0/2 Po1 Port ID Designated Port ID Prio.Nbr Cost Sts Cost Bridge ID Prio.
Chapter 2 Cisco IOS Commands show spanning-tree This is an example of output from the show spanning-tree summary command: Switch> show spanning-tree summary Root bridge for: none.
Chapter 2 Cisco IOS Commands show spanning-tree Related Commands Command Description spanning-tree backbonefast Enables the BackboneFast feature. spanning-tree bpdufilter Prevents a port from sending or receiving bridge protocol data units (BPDUs). spanning-tree bpduguard Puts a port in the error-disabled state when it receives a BPDU. spanning-tree cost Sets the path cost for spanning-tree calculations. spanning-tree extend system-id Enables the extended system ID feature.
Chapter 2 Cisco IOS Commands show storm-control show storm-control Use the show storm-control user EXEC command to display the packet-storm control information. This command also displays the action that the switch takes when the thresholds are reached. show storm-control [interface-id] [{broadcast | history | multicast | unicast }] [ | {begin | exclude | include} expression] Syntax Description interface-id (Optional) Port for which information is to be displayed.
Chapter 2 Cisco IOS Commands show storm-control Examples This is an example of output from the show storm-control broadcast command: Switch> show storm-control broadcast Interface --------Fa0/1 Fa0/2 Fa0/3 Fa0/4 . . . . Filter State ------------ Forwarding Trap State ------------ Below rising Upper ------100.00% 100.00% 100.00% 30.00% Lower Current ------- ------100.00% 0.00% 100.00% 0.00% 100.00% 0.00% 20.00% 20.
Chapter 2 Cisco IOS Commands show storm-control This is an example of output from the show storm-control fastethernet0/4 history command, which displays the ten most recent storm events for an interface.
Chapter 2 Cisco IOS Commands show system mtu show system mtu Use the show system mtu privileged EXEC command to display the global maximum packet size or maximum transmission unit (MTU) set for the switch. show system mtu [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the expression. | exclude (Optional) Display excludes lines that match the expression.
Chapter 2 Cisco IOS Commands show udld show udld Use the show udld user EXEC command to display UniDirectional Link Detection (UDLD) status for all ports or the specified port. show udld [interface-id] [ | {begin | exclude | include} expression] Syntax Description interface-id (Optional) ID of the interface and port number. Valid interfaces include physical ports and VLANs.
Chapter 2 Cisco IOS Commands show udld Neighbor echo 1 device: SAD03160954 Neighbor echo 1 port: Gi0/1 Message interval: 5 CDP Device name: 066527791 Table 2-17 show udld Field Descriptions Field Description Interface The interface on the local device configured for UDLD. Port enable administrative configuration setting How UDLD is configured on the port. If UDLD is enabled or disabled, the port enable configuration setting is the same as the operational enable state.
Chapter 2 Cisco IOS Commands show udld This is an example of output from the show udld interface configuration command when the aggressive mode is configured: Switch# show udld gi0/1 Interface Gi0/1 --Port enable administrative configuration setting:Enabled / in aggressive mode Port enable operational state:Enabled / in aggressive mode Current bidirectional state:Unknown Current operational state:Link down Message interval:7 Time out interval:5 No neighbor cache information stored Related Commands Comman
Chapter 2 Cisco IOS Commands show version show version Use the show version user EXEC command to display version information for the hardware and firmware. show version [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the specified expression. | exclude (Optional) Display excludes lines that match the specified expression. | include (Optional) Display includes lines that match the specified expression.
Chapter 2 Cisco IOS Commands show vlan show vlan Use the show vlan user EXEC command to display the parameters for all configured VLANs or one VLAN (if the VLAN ID or name is specified) on the switch. show vlan [brief | id vlan-id | name vlan-name | remote-span | summary] [ | {begin | exclude | include} expression] Syntax Description Note brief (Optional) Display one line for each VLAN with the VLAN name, status, and its ports.
Chapter 2 Cisco IOS Commands show vlan Examples This is an example of output from the show vlan command. Table 2-18 describes each field in the display.
Chapter 2 Cisco IOS Commands show vlan Table 2-18 show vlan Command Output Fields (continued) Field Description BrdgNo Bridge number for the VLAN, if applicable. Stp Spanning Tree Protocol type used on the VLAN. BrdgMode Bridging mode for this VLAN—possible values are source-route bridging (SRB) and source-route transparent (SRT); the default is SRB. Trans1 Translation bridge 1. Trans2 Translation bridge 2.
Chapter 2 Cisco IOS Commands show vlan Related Commands Command Description switchport mode Configures the VLAN membership mode of a port. vlan (global configuration) Enables config-vlan mode where you can configure VLANs 1 to 4094 when the EI is installed and 1 to 1005 when the standard software image (SI) is installed. Do not enter leading zeros. vlan (VLAN configuration) Configures VLAN characteristics in the VLAN database. Only available for normal-range VLANs (VLAN IDs 1 to 1005).
Chapter 2 Cisco IOS Commands show vmps show vmps Use the show vmps user EXEC command without keywords to display the VLAN Query Protocol (VQP) version, reconfirmation interval, retry count, VLAN Membership Policy Server (VMPS) IP addresses, and the current and primary servers, or use the statistics keyword to display client-side statistics. show vmps [statistics] [ | {begin | exclude | include} expression] Syntax Description statistics (Optional) Display VQP client-side statistics and counters.
Chapter 2 Cisco IOS Commands show vmps This is an example of output from the show vmps statistics command. Table 2-19 describes each field in the example.
Chapter 2 Cisco IOS Commands show vmps Related Commands Command Description clear vmps statistics Clears the statistics maintained by the VQP client. vmps reconfirm (global configuration) Sends VQP queries to reconfirm all dynamic VLAN assignments with the VMPS. vmps retry Configures the per-server retry count for the VQP client. vmps server Configures the primary VMPS and up to three secondary servers.
Chapter 2 Cisco IOS Commands show vtp show vtp Use the show vtp user EXEC command to display general information about the VLAN Trunking Protocol (VTP) management domain, status, and counters. show vtp {counters | status} [ | {begin | exclude | include} expression] Syntax Description counters Display the VTP statistics for the switch. status Display general information about the VTP management domain status. | begin (Optional) Display begins with the line that matches the expression.
Chapter 2 Cisco IOS Commands show vtp Table 2-20 show vtp counters Field Descriptions Field Description Summary advertisements received Number of summary advertisements received by this switch on its trunk ports. Summary advertisements contain the management domain name, the configuration revision number, the update timestamp and identity, the authentication checksum, and the number of subset advertisements to follow.
Chapter 2 Cisco IOS Commands show vtp Table 2-20 show vtp counters Field Descriptions (continued) Field Description Number of configuration digest errors Number of MD5 digest errors. Digest errors increment whenever the MD5 digest in the summary packet and the MD5 digest of the received advertisement calculated by the switch do not match. This error usually means that the VTP password in the two switches is different. To solve this problem, make sure the VTP password on all switches is the same.
Chapter 2 Cisco IOS Commands show vtp Table 2-21 show vtp status Field Descriptions (continued) Field Description VTP Operating Mode Displays the VTP operating mode, which can be server, client, or transparent. Server: a switch in VTP server mode is enabled for VTP and sends advertisements. You can configure VLANs on it. The switch guarantees that it can recover all the VLAN information in the current VTP database from nonvolatile RAM (NVRAM) after reboot. By default, every switch is a VTP server.
Chapter 2 Cisco IOS Commands show vtp Related Commands Command Description clear vtp counters Clears the VTP and pruning counters. vtp (global configuration) Configures the VTP filename, interface name, domain name, and mode. You can save configuration resulting from this command in the switch configuration file. vtp (privileged EXEC) Configures the VTP password, pruning, and version. vtp (VLAN configuration) Configures the VTP domain name, password, pruning, and mode.
Chapter 2 Cisco IOS Commands show wrr-queue bandwidth show wrr-queue bandwidth Use the show wrr-queue bandwidth user EXEC command to display the weighted round-robin (WRR) bandwidth allocation for the four class of service (CoS) priority queues. show wrr-queue bandwidth [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the specified expression. | exclude (Optional) Display excludes lines that match the specified expression.
Chapter 2 Cisco IOS Commands show wrr-queue cos-map show wrr-queue cos-map Use the show wrr-queue cos-map user EXEC command to display the mapping of the class of service (CoS) priority queues. show wrr-queue cos-map [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the specified expression. | exclude (Optional) Display excludes lines that match the specified expression.
Chapter 2 Cisco IOS Commands shutdown shutdown Use the shutdown interface configuration command to disable a port and to shut down the management VLAN. Use the no form of this command to enable a disabled port or to activate the management VLAN. shutdown no shutdown Syntax Description This command has no arguments or keywords. Command Modes Interface configuration Command History Release Modification 12.0(5.2)WC(1) This command was first introduced.
Chapter 2 Cisco IOS Commands shutdown vlan shutdown vlan Use the shutdown vlan global configuration command to shut down (suspend) local traffic on the specified VLAN. Use the no form of this command to restart local traffic on the VLAN. shutdown vlan vlan-id no shutdown vlan vlan-id Syntax Description vlan-id Defaults No default is defined. Command Modes Global configuration ID of the VLAN to be locally shut down. Valid IDs are from 2 to 1001.
Chapter 2 Cisco IOS Commands snmp-server enable traps snmp-server enable traps Use the snmp-server enable traps global configuration command to enable the switch to send Simple Network Management Protocol (SNMP) notification for various trap types to the network management system (NMS). Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands snmp-server enable traps Command History Usage Guidelines Release Modification 12.1(6)EA2 This command was first introduced. 12.1(9)EA1 The vlan-membership keyword was added. 12.1(12c)EA1 The envmon, fan, shutdown, supply, temperature, and voltage keywords were added. The alarms keyword was added for Catalyst 2955 switches only. Specify the host (NMS) that receives the traps by using the snmp-server host global configuration command.
Chapter 2 Cisco IOS Commands snmp-server host snmp-server host Use the snmp-server host global configuration command to specify the recipient (host) of a Simple Network Management Protocol (SNMP) notification operation. Use the no form of this command to remove the specified host.
Chapter 2 Cisco IOS Commands snmp-server host Defaults tty (Optional) Send Transmission Control Protocol (TCP) connection traps. udp-port (Optional) Send notification host’s User Datagram Protocol (UDP) port number. vlan-membership (Optional) Send SNMP VLAN membership traps. vtp (Optional) Send VLAN Trunking Protocol (VTP) traps. This command is disabled. No notifications are sent. If you enter this command with no keywords, the default is to send all trap types to the host.
Chapter 2 Cisco IOS Commands snmp-server host If you do not enter an snmp-server host command, no notifications are sent. To configure the switch to send SNMP notifications, you must enter at least one snmp-server host command. If you enter the command with no keywords, all trap types are enabled for the host. To enable multiple hosts, you must enter a separate snmp-server host command for each host. You can specify multiple notification types in the command for each host.
Chapter 2 Cisco IOS Commands snmp trap mac-notification snmp trap mac-notification Use the snmp trap mac-notification interface configuration command to enable the MAC notification traps on a port. Use the no form of this command to disable the traps and to return the port to default settings. snmp trap mac-notification [added | removed] no snmp trap mac-notification [added | removed] Syntax Description added (Optional) Enable MAC notification traps when a MAC address is added to a port.
Chapter 2 Cisco IOS Commands snmp trap mac-notification Related Commands Command Description clear mac address-table notification Clears the MAC address notification global counters. mac address-table notification Enables the MAC notification feature on a switch. show mac address-table notification Displays MAC notification parameters. snmp-server enable traps Enables SNMP notification for various trap types.
Chapter 2 Cisco IOS Commands spanning-tree backbonefast spanning-tree backbonefast Use the spanning-tree backbonefast global configuration command to enable the BackboneFast feature. Use the no form of this command to return to the default setting. spanning-tree backbonefast no spanning-tree backbonefast Syntax Description This command has no arguments or keywords. Defaults BackboneFast is disabled. Command Modes Global configuration Command History Release Modification 12.
Chapter 2 Cisco IOS Commands spanning-tree bpdufilter spanning-tree bpdufilter Use the spanning-tree bpdufilter interface configuration command to prevent a port from sending or receiving bridge protocol data units (BPDUs). Use the no form of this command to return to the default setting. spanning-tree bpdufilter {disable | enable} no spanning-tree bpdufilter Syntax Description disable Disable BPDU filtering on the specified interface. enable Enable BPDU filtering on the specified interface.
Chapter 2 Cisco IOS Commands spanning-tree bpdufilter Examples This example shows how to enable the BPDU filtering feature on a port: Switch(config)# interface fastethernet0/1 Switch(config-if)# spanning-tree bpdufilter enable You can verify your setting by entering the show running-config privileged EXEC command. Related Commands Command Description show running-config Displays the current operating configuration.
Chapter 2 Cisco IOS Commands spanning-tree bpduguard spanning-tree bpduguard Use the spanning-tree bpduguard interface configuration command to put a port in the error-disabled state when it receives a bridge protocol data unit (BPDU). Use the no form of this command to return to the default setting. spanning-tree bpduguard {disable | enable} no spanning-tree bpduguard Syntax Description disable Disable BPDU guard on the specified interface. enable Enable BPDU guard on the specified interface.
Chapter 2 Cisco IOS Commands spanning-tree bpduguard Related Commands Command Description show running-config Displays the current operating configuration. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.1 > Cisco IOS File Management Commands > Configuration File Commands.
Chapter 2 Cisco IOS Commands spanning-tree cost spanning-tree cost Use the spanning-tree cost interface configuration command to set the path cost for spanning-tree calculations. If a loop occurs, spanning tree considers the path cost when selecting an interface to place in the forwarding state. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree cost Examples This example shows how to set a path cost of 250 on an interface: Switch(config)# interface fastethernet0/4 Switch(config-if)# spanning-tree cost 250 This example shows how to set a path cost of 300 for VLAN 10: Switch(config-if)# spanning-tree vlan 10 cost 300 You can verify your settings by entering the show spanning-tree interface interface-id privileged EXEC command.
Chapter 2 Cisco IOS Commands spanning-tree extend system-id spanning-tree extend system-id Use the spanning-tree extend system-id global configuration command to enable the extended system ID feature. spanning-tree extend system-id Note Though visible in the command-line help strings, the no version of this command is not supported. You cannot disable the extended system ID feature. Syntax Description This command has no arguments or keywords. Defaults The extended system ID is enabled.
Chapter 2 Cisco IOS Commands spanning-tree extend system-id Related Commands Command Description show spanning-tree summary Displays a summary of spanning-tree port states. spanning-tree mst root Configures the multiple spanning-tree (MST) root switch priority and timers based on the network diameter. spanning-tree vlan priority Sets the switch priority for the specified spanning-tree instance.
Chapter 2 Cisco IOS Commands spanning-tree guard spanning-tree guard Use the spanning-tree guard interface configuration command to enable root guard or loop guard on all the VLANs associated with the selected interface. Root guard restricts which interface is allowed to be the spanning-tree root port or the path-to-the root for the switch. Loop guard prevents alternate or root ports from becoming designated ports when a failure creates a unidirectional link.
Chapter 2 Cisco IOS Commands spanning-tree guard Do not enable root guard on interfaces that will be used by the UplinkFast feature. With UplinkFast, the backup interfaces (in the blocked state) replace the root port in the case of a failure. However, if root guard is also enabled, all the backup interfaces used by the UplinkFast feature are placed in the root-inconsistent state (blocked) and prevented from reaching the forwarding state.
Chapter 2 Cisco IOS Commands spanning-tree link-type spanning-tree link-type Use the spanning-tree link-type interface configuration command to override the default link-type setting, which is determined by the duplex mode of the port, and to enable Rapid Spanning-Tree Protocol (RSTP) transitions to the forwarding state. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree loopguard default spanning-tree loopguard default Use the spanning-tree loopguard default global configuration command to prevent alternate or root ports from becoming designated ports because of a failure that leads to a unidirectional link. Use the no form of this command to return to the default setting. spanning-tree loopguard default no spanning-tree loopguard default Syntax Description This command has no arguments or keywords.
Chapter 2 Cisco IOS Commands spanning-tree loopguard default Related Commands Command Description show running-config Displays the current operating configuration. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.1 > Cisco IOS File Management Commands > Configuration File Commands. spanning-tree guard loop Enables the loop guard feature on all the VLANs associated with the specified interface.
Chapter 2 Cisco IOS Commands spanning-tree mode spanning-tree mode Use the spanning-tree mode global configuration command to enable either per-VLAN spanning-tree (PVST) or multiple spanning tree (MST) on your switch. Use the no form of this command to return to the default setting. spanning-tree mode {mst | pvst} no spanning-tree mode Syntax Description mst Enable MST. This keyword is available only if your switch is running the enhanced software image (EI). pvst Enable PVST.
Chapter 2 Cisco IOS Commands spanning-tree mst configuration spanning-tree mst configuration Use the spanning-tree mst configuration global configuration command to enter multiple spanning-tree (MST) configuration mode through which you configure the MST region. Use the no form of this command to return to the default settings. spanning-tree mst configuration no spanning-tree mst configuration This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands spanning-tree mst configuration All VLANs that are not explicitly mapped to an MST instance are mapped to the common and internal spanning tree (CIST) instance (instance 0) and cannot be unmapped from the CIST by using the no form of the command. For two or more switches to be in the same MST region, they must have the same VLAN mapping, the same configuration revision number, and the same name.
Chapter 2 Cisco IOS Commands spanning-tree mst cost spanning-tree mst cost Use the spanning-tree mst cost interface configuration command to set the path cost for multiple spanning-tree (MST) calculations. If a loop occurs, spanning tree considers the path cost when selecting an interface to put in the forwarding state. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree mst cost Related Commands Command Description show spanning-tree mst interface interface-id Displays MST information for the specified interface. spanning-tree mst port-priority Configures an interface priority. spanning-tree mst priority Configures the switch priority for the specified spanning-tree instance.
Chapter 2 Cisco IOS Commands spanning-tree mst forward-time spanning-tree mst forward-time Use the spanning-tree mst forward-time global configuration command to set the forward-delay time for all multiple spanning-tree (MST) instances. The forwarding time determines how long each of the listening and learning states last before the interface begins forwarding. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree mst hello-time spanning-tree mst hello-time Use the spanning-tree mst hello-time global configuration command to set the interval between hello bridge protocol data units (BPDUs) sent by root switch configuration messages. Use the no form of this command to return to the default setting. spanning-tree mst hello-time seconds no spanning-tree mst hello-time This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands spanning-tree mst hello-time Related Commands Command Description show spanning-tree mst Displays multiple spanning-tree (MST) information. spanning-tree mst forward-time Sets the forward-delay time for all MST instances. spanning-tree mst max-age Sets the interval between messages that the spanning tree receives from the root switch. spanning-tree mst max-hops Sets the number of hops in a region before the BPDU is discarded.
Chapter 2 Cisco IOS Commands spanning-tree mst max-age spanning-tree mst max-age Use the spanning-tree mst max-age global configuration command to set the interval between messages that the spanning tree receives from the root switch. If a switch does not receive a bridge protocol data unit (BPDU) message from the root switch within this interval, it recomputes the spanning-tree topology. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree mst max-age Related Commands Command Description show spanning-tree mst Displays multiple spanning-tree (MST) information. spanning-tree mst forward-time Sets the forward-delay time for all MST instances. spanning-tree mst hello-time Sets the interval between hello BPDUs sent by root switch configuration messages. spanning-tree mst max-hops Sets the number of hops in a region before the BPDU is discarded.
Chapter 2 Cisco IOS Commands spanning-tree mst max-hops spanning-tree mst max-hops Use the spanning-tree mst max-hops global configuration command to set the number of hops in a region before the bridge protocol data unit (BPDU) is discarded and the information held for a port is aged. Use the no form of this command to return to the default setting. spanning-tree mst max-hops hop-count no spanning-tree mst max-hops This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands spanning-tree mst max-hops Related Commands Command Description show spanning-tree mst Displays multiple spanning-tree (MST) information. spanning-tree mst forward-time Sets the forward-delay time for all MST instances. spanning-tree mst hello-time Sets the interval between hello BPDUs sent by root switch configuration messages. spanning-tree mst max-age Sets the interval between messages that the spanning tree receives from the root switch.
Chapter 2 Cisco IOS Commands spanning-tree mst port-priority spanning-tree mst port-priority Use the spanning-tree mst port-priority interface configuration command to configure an interface priority. If a loop occurs, the Multiple Spanning Tree Protocol (MSTP) can determine which interface to put in the forwarding state. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree mst port-priority Related Commands Command Description show spanning-tree mst interface interface-id Displays MST information for the specified interface. spanning-tree mst cost Sets the path cost for MST calculations. spanning-tree mst priority Sets the switch priority for the specified spanning-tree instance.
Chapter 2 Cisco IOS Commands spanning-tree mst priority spanning-tree mst priority Use the spanning-tree mst priority global configuration command to set the switch priority for the specified spanning-tree instance. Use the no form of this command to return to the default setting. spanning-tree mst instance-id priority priority no spanning-tree mst instance-id priority This command is available only if your switch is running the enhanced software image (EI).
Chapter 2 Cisco IOS Commands spanning-tree mst root spanning-tree mst root Use the spanning-tree mst root global configuration command to configure the multiple spanning-tree (MST) root switch priority and timers based on the network diameter. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree mst root Examples This example shows how to configure the switch as the root switch for instance 10 with a network diameter of 4: Switch(config)# spanning-tree mst 10 root primary diameter 4 This example shows how to configure the switch as the secondary root switch for instance 10 with a network diameter of 4: Switch(config)# spanning-tree mst 10 root secondary diameter 4 You can verify your settings by entering the show spanning-tree mst instance-id privilege
Chapter 2 Cisco IOS Commands spanning-tree port-priority spanning-tree port-priority Use the spanning-tree port-priority interface configuration command to configure an interface priority. If a loop occurs, spanning tree can determine which interface to put in the forwarding state. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree port-priority Related Commands Command Description show spanning-tree interface interface-id Displays spanning-tree information for the specified interface. spanning-tree cost Sets the path cost for spanning-tree calculations. spanning-tree vlan priority Sets the switch priority for the specified spanning-tree instance.
Chapter 2 Cisco IOS Commands spanning-tree portfast (global configuration) spanning-tree portfast (global configuration) Use the spanning-tree portfast global configuration command to globally enable bridge protocol data unit (BPDU) filtering on Port Fast-enabled ports, the BPDU guard feature on Port Fast-enabled ports, or the Port Fast feature on all nontrunking ports. The BPDU filtering feature prevents the switch port from sending or receiving BPDUs.
Chapter 2 Cisco IOS Commands spanning-tree portfast (global configuration) Caution Enabling BPDU filtering on an interface is the same as disabling spanning tree on it and can result in spanning-tree loops. Use the spanning-tree portfast bpduguard default global configuration command to globally enable BPDU guard on ports that are in a Port Fast-operational state. In a valid configuration, Port Fast-enabled ports do not receive BPDUs.
Chapter 2 Cisco IOS Commands spanning-tree portfast (interface configuration) spanning-tree portfast (interface configuration) Use the spanning-tree portfast interface configuration command to enable the Port Fast feature on an interface in all its associated VLANs. When the Port Fast feature is enabled, the interface changes directly from a blocking state to a forwarding state without making the intermediate spanning-tree state changes. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree portfast (interface configuration) Examples This example shows how to enable the Port Fast feature on an interface: Switch(config)# interface fastethernet0/2 Switch(config-if)# spanning-tree portfast You can verify your settings by entering the show running-config privileged EXEC command. Related Commands Command Description show running-config Displays the current operating configuration.
Chapter 2 Cisco IOS Commands spanning-tree stack-port spanning-tree stack-port Use the spanning-tree stack-port interface configuration command to enable cross-stack UplinkFast (CSUF) on an interface and to accelerate the choice of a new root port when a link or switch fails or when spanning tree reconfigures itself. Use the no form of this command to return to the default setting. spanning-tree stack-port no spanning-tree stack-port Syntax Description This command has no arguments or keywords.
Chapter 2 Cisco IOS Commands spanning-tree stack-port Related Commands Command Description show running-config Displays the current operating configuration. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.1 > Cisco IOS File Management Commands > Configuration File Commands. spanning-tree uplinkfast Accelerates the choice of a new root port when a link or switch fails or when spanning tree reconfigures itself.
Chapter 2 Cisco IOS Commands spanning-tree uplinkfast spanning-tree uplinkfast Use the spanning-tree uplinkfast global configuration command to accelerate the choice of a new root port when a link or switch fails or when the spanning tree reconfigures itself. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree uplinkfast If you set the max-update-rate to 0, station-learning frames are not generated, so the spanning-tree topology converges more slowly after a loss of connectivity. Examples This example shows how to enable UplinkFast: Switch(config)# spanning-tree uplinkfast You can verify your setting by entering the show spanning-tree summary privileged EXEC command.
Chapter 2 Cisco IOS Commands spanning-tree vlan spanning-tree vlan Use the spanning-tree vlan global configuration command to configure spanning tree on a per-VLAN basis. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands spanning-tree vlan Command History Usage Guidelines Release Modification 12.0(5.2)WC(1) This command was first introduced. 12.1(9)EA1 The priority priority range changed from 1 to 65535 to 1 to 61440 (in increments of 4096). Disabling the STP causes the VLAN to stop participating in the spanning-tree topology. Interfaces that are administratively down remain down. Received BPDUs are forwarded like other multicast frames.
Chapter 2 Cisco IOS Commands spanning-tree vlan This example shows how to set spanning-tree max-age to 30 seconds for VLAN 20: Switch(config)# spanning-tree vlan 20 max-age 30 This example shows how to reset the max-age parameter to the default value for spanning-tree instance 100: Switch(config)# no spanning-tree vlan 100 max-age This example shows how to set the spanning-tree priority to 8192 for VLAN 20: Switch(config)# spanning-tree vlan 20 priority 8192 This example shows how to configure the switc
Chapter 2 Cisco IOS Commands speed speed Use the speed interface configuration command to specify the speed of a port. Use the no form of this command to return the port to its default value.
Chapter 2 Cisco IOS Commands speed If the speed is set to auto, the switch negotiates with the device at the other end of the link for the speed setting and then forces the speed setting to the negotiated value. The duplex setting remains as configured on each end of the link, which could result in a duplex setting mismatch. If both the speed and duplex are set to specific values, autonegotiation is disabled.
Chapter 2 Cisco IOS Commands storm-control storm-control Use the storm-control interface configuration command to enable broadcast, multicast, or unicast storm control on a port and to specify the action taken when a storm occurs on a port. Use the no form of this command to disable storm control for broadcast, multicast, or unicast traffic and disable the specified storm-control action.
Chapter 2 Cisco IOS Commands storm-control Usage Guidelines Use the storm-control command to enable or disable broadcast, multicast, or unicast storm control on a port. After a port is disabled during a storm, use the no shutdown interface configuration command to enable the port. The suppression levels are entered as a percentage of total bandwidth. A suppression value of 100 percent means that no limit is placed on the specified traffic type.
Chapter 2 Cisco IOS Commands switchport access switchport access Use the switchport access interface configuration command to configure a port as a static-access or dynamic-access port. If the mode is set to access, the port operates as a member of the configured VLAN. If set to dynamic, the port starts discovery of its VLAN assignment based on the incoming packets it receives. Use the no form of this command to reset the access mode to the default VLAN for the switch.
Chapter 2 Cisco IOS Commands switchport access These restrictions apply to dynamic-access ports: • The software implements the VLAN Query Protocol (VQP) client, which can query a VMPS such as a Catalyst 6000 series switch. The Catalyst 3550 switches are not VMPS servers. The VMPS server must be configured before a port is configured as dynamic. • Use dynamic-access ports only to connect end stations. Connecting them to switches or routers that use bridging protocols can cause a loss of connectivity.
Chapter 2 Cisco IOS Commands switchport mode switchport mode Use the switchport mode interface configuration command to configure the VLAN membership mode of a port. Use the no form of this command to reset the mode to the appropriate default for the device.
Chapter 2 Cisco IOS Commands switchport mode The no switchport mode form resets the mode to dynamic desirable. Trunk ports cannot coexist on the same switch. To autonegotiate trunking, the interfaces must be in the same VTP domain. Trunk negotiation is managed by the Dynamic Trunking Protocol (DTP), which is a point-to-point protocol. However, some internetworking devices might forward DTP frames improperly, which could cause misconfigurations.
Chapter 2 Cisco IOS Commands switchport nonegotiate switchport nonegotiate Use the switchport nonegotiate interface configuration command to specify that Dynamic Trunking Protocol (DTP) negotiation packets are not sent on the Layer 2 interface. The switch does not engage in DTP negotiation on this interface. Use the no form of this command to return to the default setting. switchport nonegotiate no switchport nonegotiate Syntax Description This command has no arguments or keywords.
Chapter 2 Cisco IOS Commands switchport nonegotiate Examples This example shows how to cause an interface to refrain from negotiating trunking mode and to act as a trunk or access port (depending on the mode set): Switch(config-if)# switchport nonegotiate You can verify your setting by entering the show interfaces interface-id switchport privileged EXEC command.
Chapter 2 Cisco IOS Commands switchport port-security switchport port-security Use the switchport port-security interface configuration command without keywords to enable port security on an interface. Use the keywords to configure secure MAC addresses, a maximum number of secure MAC addresses, or the violation mode. Use the no form of this command to disable port security or to set the parameters to their default states.
Chapter 2 Cisco IOS Commands switchport port-security Defaults Port security is disabled. When port security is enabled, if no keywords are entered, the default maximum number of secure MAC addresses is 1. Sticky learning is disabled. The default violation mode is shutdown. Command Modes Interface configuration Command History Release Modification 12.1(6)EA2 This command was first introduced. It replaced the port security and mac-address-table secure commands. 12.
Chapter 2 Cisco IOS Commands switchport port-security When a secure port is in the error-disabled state, you can bring it out of this state by entering the errdisable recovery cause psecure-violation global configuration command, or you can manually re-enable it by entering the shutdown and no shut down interface configuration commands. A secure port has these limitations: Examples • Port security can only be configured on static access ports.
Chapter 2 Cisco IOS Commands switchport port-security aging switchport port-security aging Use the switchport port-security aging interface configuration command to set the aging time and type for secure address entries or to change the aging behavior for statically configured secure addresses on a particular port. Use the no form of this command to disable port security aging or to set the parameters to their default states.
Chapter 2 Cisco IOS Commands switchport port-security aging Examples This example sets the aging time as 2 hours for absolute aging for all the secure addresses on Fast Ethernet interface 0/1. Switch(config)# interface fastethernet0/1 Switch(config-if)# switchport port-security aging time 120 This example sets the aging time as 2 minutes for inactivity aging type for configured secure addresses on Fast Ethernet interface 0/2.
Chapter 2 Cisco IOS Commands switchport priority extend switchport priority extend Use the switchport priority extend interface configuration command to set a port priority for the incoming untagged frames or the priority of frames received by the IP phone connected to the specified port. Use the no form of this command to return to the default setting.
Chapter 2 Cisco IOS Commands switchport protected switchport protected Use the switchport protected interface configuration command to isolate unicast, multicast, and broadcast traffic at Layer 2 from other protected ports on the same switch. Use the no form of this command to return to the default setting. switchport protected no switchport protected Syntax Description This command has no keywords or arguments. Defaults No protected port is defined. All ports are nonprotected.
Chapter 2 Cisco IOS Commands switchport trunk switchport trunk Use the switchport trunk interface configuration command to set the trunk characteristics when the interface is in trunking mode. Use the no form of this command to reset all of the trunking characteristics to the defaults. Use the no form with keywords to reset those characteristics to the defaults.
Chapter 2 Cisco IOS Commands switchport trunk • except lists the VLANs that should be calculated by inverting the defined list of VLANs. (VLANs are added except the ones specified.) Valid IDs are from 2 to 1001. Separate nonconsecutive VLAN IDs with a comma; do not enter a space after the comma. Use a hyphen to designate a range of IDs; do not enter a space before or after the hyphen. Do not enter leading zeros.
Chapter 2 Cisco IOS Commands switchport trunk Trunk Pruning: Note Examples • The pruning-eligible list applies only to trunk ports. • Each trunk port has its own eligibility list. • If you do not want a VLAN to be pruned, remove it from the pruning-eligible list. VLANs that are pruning-ineligible receive flooded traffic. • VLAN 1, VLANs 1002 to 1005, and extended-range VLANs (VLANs 1006 to 4094) cannot be pruned. The switch does not support Inter-Switch Link (ISL) trunking.
Chapter 2 Cisco IOS Commands switchport voice vlan switchport voice vlan Use the switchport voice vlan interface configuration command to configure voice VLAN on the port. Use the no form of this command to return to the default setting. switchport voice vlan {vlan-id | dot1p | none | untagged} no switchport voice vlan Syntax Description Defaults vlan-id VLAN used for voice traffic.
Chapter 2 Cisco IOS Commands switchport voice vlan Examples This example shows how to configure VLAN 2 as the voice VLAN: Switch(config-if)# switchport voice vlan 2 You can verify your settings by entering the show interfaces interface-id switchport privileged EXEC command. Related Commands Command Description show interfaces interface-id switchport Displays the administrative and operational status of a switching (nonrouting) port.
Chapter 2 Cisco IOS Commands system mtu system mtu Use the system mtu global configuration command to set the maximum packet size or maximum transmission unit (MTU) size for the switch. Use the no form of this command to restore the global MTU value to its original default value. system mtu bytes no system mtu Syntax Description bytes Defaults The default MTU size is 1500 bytes. Command Modes Global configuration Command History Release Modification 12.1(6)EA2 This command was first introduced.
Chapter 2 Cisco IOS Commands system mtu Examples This example shows how to set the maximum packet size to 1528 bytes: Switch(config)# system mtu 1528 Switch(config)# exit This example shows the response when you try to set a switch to an out-of-range number: Switch(config)# system mtu 2000 ^ % Invalid input detected at '^' marker. You can verify your settings by entering the show system mtu privileged EXEC command.
2 Chapter 2 Cisco IOS Commands traceroute mac traceroute mac Use the traceroute mac privileged EXEC command to display the Layer 2 path taken by the packets from the specified source MAC address to the specified destination MAC address. tracetroute mac [interface interface-id] {source-mac-address} [interface interface-id] {destination-mac-address} [vlan vlan-id] [detail] Syntax Description interface interface-id (Optional) Specify an interface on the source or destination switch.
Chapter 2 Cisco IOS Commands traceroute mac Layer 2 traceroute supports only unicast source and destination MAC addresses. If you specify a multicast source or destination MAC address, the physical path is not identified, and an error message appears. The traceroute mac command output shows the Layer 2 path when the specified source and destination addresses belong to the same VLAN.
Chapter 2 Cisco IOS Commands traceroute mac This example shows the Layer 2 path when the switch is not connected to the source switch: Switch# traceroute mac 0000.0201.0501 0000.0201.0201 detail Source not directly connected, tracing source ..... Source 0000.0201.0501 found on con5[WS-C2950G-24-EI] (2.2.5.5) con5 / WS-C2950G-24-EI / 2.2.5.5 : Fa0/1 [auto, auto] => Gi0/1 [auto, auto] con1 / WS-C3550-12G / 2.2.1.1 : Gi0/1 [auto, auto] => Gi0/2 [auto, auto] con2 / WS-C3550-24 / 2.2.2.
Chapter 2 Cisco IOS Commands traceroute mac ip traceroute mac ip Use the traceroute mac privileged EXEC command to display the Layer 2 path taken by the packets from the specified source IP address or hostname to the specified destination IP address or hostname. tracetroute mac ip {source-ip-address | source-hostname} {destination-ip-address | destination-hostname} [detail] Syntax Description source-ip-address Specify the IP address of the source switch as a 32-bit quantity in dotted-decimal format.
Chapter 2 Cisco IOS Commands traceroute mac ip The traceroute mac ip command output shows the Layer 2 path when the specified source and destination IP addresses are in the same subnet. When you specify the IP addresses, the switch uses Address Resolution Protocol (ARP) to associate the IP addresses with the corresponding MAC addresses and the VLAN IDs. • If an ARP entry exists for the specified IP address, the switch uses the associated MAC address and identifies the physical path.
Chapter 2 Cisco IOS Commands traceroute mac ip Related Commands Command Description traceroute mac Displays the Layer 2 path taken by the packets from the specified source MAC address to the specified destination MAC address.
Chapter 2 Cisco IOS Commands udld (global configuration) udld (global configuration) Use the udld global configuration command to enable aggressive or normal mode in the UniDirectional Link Detection (UDLD) and to set the configurable message timer. Use the no form of this command to disable aggressive or normal mode UDLD on all fiber-optic ports.
Chapter 2 Cisco IOS Commands udld (global configuration) Examples This example shows how to enable UDLD on all fiber-optic interfaces: Switch(config)# udld enable You can verify your settings by entering the show udld privileged EXEC command. Related Commands Command Description show running-config Displays the running configuration on the switch. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference for Release 12.
Chapter 2 Cisco IOS Commands udld (interface configuration) udld (interface configuration) Use the udld interface configuration command to enable UniDirectional Link Detection (UDLD) on an individual interface or to prevent a fiber-optic interface from being enabled by the udld global configuration command. Use the no form of this command to return to the udld global configuration command setting or disable UDLD if entered on a nonfiber-optic port.
Chapter 2 Cisco IOS Commands udld (interface configuration) Use the no udld enable command on fiber-optic ports to return control of UDLD to the udld enable global configuration command or to disable UDLD on nonfiber-optic ports. Use the udld aggressive command on fiber-optic ports to override the settings of the udld enable or udld aggressive global configuration command.
Chapter 2 Cisco IOS Commands udld reset udld reset Use the udld reset privileged EXEC command to reset all interfaces shut down by UniDirectional Link Detection (UDLD) and to permit traffic to again pass through. Other features, such as spanning tree, Port Aggregation Protocol (PAgP), and Dynamic Trunking Protocol (DTP), still have their normal effects, if enabled. udld reset Syntax Description This command has no keywords or arguments.
Chapter 2 Cisco IOS Commands vlan (global configuration) vlan (global configuration) Use the vlan global configuration command to add a VLAN and enter the config-vlan mode. Use the no form of this command to delete the VLAN. Configuration information for normal-range VLANs (VLAN IDs 1 to 1005) is always saved in the VLAN database.
Chapter 2 Cisco IOS Commands vlan (global configuration) When you save the VLAN and VTP configurations in the startup configuration file and reboot the switch, the configuration is determined in these ways: • If both the VLAN database and the configuration file show the VTP mode as transparent and the VTP domain names match, the VLAN database is ignored. The VTP and VLAN configurations in the startup configuration file are used. The VLAN database revision number remains unchanged in the VLAN database.
Chapter 2 Cisco IOS Commands vlan (global configuration) • Note media: defines the VLAN media type. See Table 2-22 for valid commands and syntax for different media types. The switch supports only Ethernet ports. You configure only FDDI and Token Ring media-specific characteristics for VLAN Trunking Protocol (VTP) global advertisements to other switches. These VLANs are locally suspended. – ethernet is Ethernet media type (the default). – fddi is FDDI media type.
Chapter 2 Cisco IOS Commands vlan (global configuration) • stp type: defines the spanning-tree type for FDDI-NET, Token Ring-NET, or TrBRF VLANs. For FDDI-NET VLANs, the default STP type is ieee. For Token Ring-NET VLANs, the default STP type is ibm. For FDDI and Token Ring VLANs, the default is no type specified. – ieee for IEEE Ethernet STP running source-route transparent (SRT) bridging. – ibm for IBM STP running source-route bridging (SRB).
Chapter 2 Cisco IOS Commands vlan (global configuration) Table 2-23 describes the rules for configuring VLANs. Table 2-23 VLAN Configuration Rules Configuration Rule VTP v2 mode is enabled, and you Specify a parent VLAN ID of a TrBRF that already exists in the are configuring a TrCRF VLAN database. media type. Specify a ring number. Do not leave this field blank. Specify unique ring numbers when TrCRF VLANs have the same parent VLAN ID. Only one backup concentrator relay function (CRF) can be enabled.
Chapter 2 Cisco IOS Commands vlan (global configuration) This example shows how to create a new extended-range VLAN (when the EI is installed) with all the default characteristics, to enter config-vlan mode, and to save the new VLAN in the switch startup configuration file: Switch(config)# vtp mode transparent Switch(config)# vlan 2000 Switch(config-vlan)# end Switch# copy running-config startup config You can verify your setting by entering the show vlan privileged EXEC command.
Chapter 2 Cisco IOS Commands vlan (VLAN configuration) vlan (VLAN configuration) Use the vlan VLAN configuration command to configure VLAN characteristics for a normal-range VLAN (VLAN IDs 1 to 1005) in the VLAN database. You access VLAN configuration mode by entering the vlan database privileged EXEC command. Use the no form of this command without additional parameters to delete a VLAN. Use the no form with parameters to change its configured characteristics.
Chapter 2 Cisco IOS Commands vlan (VLAN configuration) media {ethernet | fddi | fd-net | tokenring | tr-net} (Optional) Specify the VLAN media type. Table 2-24 lists the valid syntax for each media type. • ethernet is Ethernet media type (the default). • fddi is FDDI media type. • fd-net is FDDI network entity title (NET) media type. • tokenring is Token Ring media type if the VTP v2 mode is disabled, or TrCRF if the VTP v2 mode is enabled.
Chapter 2 Cisco IOS Commands vlan (VLAN configuration) Table 2-24 shows the valid syntax options for different media types.
Chapter 2 Cisco IOS Commands vlan (VLAN configuration) Table 2-25 VLAN Configuration Rules (continued) Configuration Rule VTP v2 mode is enabled, and you Specify a bridge number. Do not leave this field blank. are configuring a TrBRF VLAN media type. VTP v1 mode is enabled. No VLAN can have an STP type set to auto. This rule applies to Ethernet, FDDI, FDDI-NET, Token Ring, and Token Ring-NET VLANs. Add a VLAN that requires translational bridging (values are not set to zero).
Chapter 2 Cisco IOS Commands vlan (VLAN configuration) Command Modes VLAN configuration Command History Release Modification 12.0(5.2)WC(1) This command was first introduced. Usage Guidelines Note You can only use this command mode for configuring normal-range VLANs, that is, VLAN IDs 1 to 1005. To configure extended-range VLANs (VLAN IDs 1006 to 4094), use the vlan global configuration command. VLAN configuration is always saved in the VLAN database.
Chapter 2 Cisco IOS Commands vlan (VLAN configuration) Examples • When the no vlan vlan-id parent form is used, the parent VLAN returns to the default (0). The parent VLAN resets to the default if the parent VLAN is deleted or if the media keyword changes the VLAN type or the VLAN type of the parent VLAN. • When the no vlan vlan-id ring form is used, the VLAN logical ring number returns to the default (0).
Chapter 2 Cisco IOS Commands vlan database vlan database Use the vlan database privileged EXEC command to enter VLAN configuration mode. From this mode, you can add, delete, and modify VLAN configurations for normal-range VLANs and globally propagate these changes by using the VLAN Trunking Protocol (VTP). Configuration information is saved in the VLAN database. vlan database Note VLAN configuration mode is only valid for VLAN IDs 1 to 1005. Syntax Description This command has no arguments or keywords.
Chapter 2 Cisco IOS Commands vlan database When you have modified VLAN or VTP parameters, you can use these editing buffer manipulation commands: • abort: exits the mode without applying the changes. The VLAN configuration that was running before you entered VLAN configuration mode continues to be used. • apply: applies current changes to the VLAN database, increments the database configuration revision number, propagates it throughout the administrative domain, and remains in VLAN configuration mode.
Chapter 2 Cisco IOS Commands vlan database MTU: 1500 Bridge Type: SRB Ring Number: 0 Translational Bridged VLAN: 1 Translational Bridged VLAN: 1003
Chapter 2 Cisco IOS Commands vmps reconfirm (global configuration) vmps reconfirm (global configuration) Use the vmps reconfirm global configuration command to change the reconfirmation interval for the VLAN Query Protocol (VQP) client. vmps reconfirm interval Syntax Description interval Defaults The default reconfirmation interval is 60 minutes. Command Modes Global configuration Command History Release Modification 12.1(6)EA2 This command was first introduced.
Chapter 2 Cisco IOS Commands vmps reconfirm (privileged EXEC) vmps reconfirm (privileged EXEC) Use the vmps reconfirm privileged EXEC command to immediately send VLAN Query Protocol (VQP) queries to reconfirm all dynamic VLAN assignments with the VLAN Membership Policy Server (VMPS). vmps reconfirm Syntax Description This command has no arguments or keywords. Defaults No default is defined. Command Modes Privileged EXEC Command History Release Modification 12.
Chapter 2 Cisco IOS Commands vmps retry vmps retry Use the vmps retry global configuration command to configure the per-server retry count for the VLAN Query Protocol (VQP) client. vmps retry count Syntax Description count Defaults The default retry count is 3. Command Modes Global configuration Command History Release Modification 12.1(6)EA2 This command was first introduced.
Chapter 2 Cisco IOS Commands vmps server vmps server Use the vmps server global configuration command to configure the primary VLAN Membership Policy Server (VMPS) and up to three secondary servers. Use the no form of this command to remove a VMPS server. vmps server ipaddress [primary] no vmps server [ipaddress] Syntax Description ipaddress IP address or host name of the primary or secondary VMPS servers. If you specify a host name, the Domain Name System (DNS) server must be configured.
Chapter 2 Cisco IOS Commands vmps server This example shows how to delete the server with IP address 191.10.49.21: Switch(config)# no vmps server 191.10.49.21 You can verify your settings by entering the show vmps privileged EXEC command and examining information in the VMPS Domain Server row. Related Commands Command Description show vmps Displays VQP and VMPS information.
Chapter 2 Cisco IOS Commands vtp (global configuration) vtp (global configuration) Use the vtp global configuration command to set or modify the VLAN Trunking Protocol (VTP) configuration characteristics. Use the no form of this command to remove the settings or to return to the default settings.
Chapter 2 Cisco IOS Commands vtp (global configuration) Defaults The default filename is flash:vlan.dat. The default mode is server mode. No domain name or password is defined. No password is configured. Pruning is disabled. The default version is version 1. Command Modes Global configuration Command History Release Modification 12.1(9)EA1 The domain and mode keywords were added. The if-id keyword was replaced by the interface keyword. 12.
Chapter 2 Cisco IOS Commands vtp (global configuration) Follow these guidelines when setting VTP mode: • The no vtp mode command returns the switch to VTP server mode. • The vtp mode server command is the same as no vtp mode except that it does not return an error if the switch is not in client or transparent mode. • If the receiving switch is in client mode, the client switch changes its configuration to duplicate the configuration of the server.
Chapter 2 Cisco IOS Commands vtp (global configuration) You cannot save password, pruning, and version configurations in the switch configuration file. Examples This example shows how to rename the filename for VTP configuration storage to vtpfilename: Switch(config)# vtp file vtpfilename This example shows how to clear the device storage filename: Switch(config)# no vtp file vtpconfig Clearing device storage filename.
Chapter 2 Cisco IOS Commands vtp (privileged EXEC) vtp (privileged EXEC) Use the vtp privileged EXEC command to configure the VLAN Trunking Protocol (VTP) password, pruning, and version. Use the no form of this command to return to the default settings. vtp {password password | pruning | version number} no vtp {password | pruning | version} Note Syntax Description Defaults Beginning with release 12.1(11)EA1, these keywords are available in the vtp global configuration command.
Chapter 2 Cisco IOS Commands vtp (privileged EXEC) Each VTP switch automatically detects the capabilities of all the other VTP devices. To use version 2, all VTP switches in the network must support version 2; otherwise, you must configure them to operate in VTP version 1 mode. If all switches in a domain are VTP version 2-capable, you need only to configure version 2 on one switch; the version number is then propagated to the other version-2 capable switches in the VTP domain.
Chapter 2 Cisco IOS Commands vtp (VLAN configuration) vtp (VLAN configuration) Use the vtp VLAN configuration command to configure VLAN Trunking Protocol (VTP) characteristics. You access VLAN configuration mode by entering the vlan database privileged EXEC command. Use the no form of this command to return to the default settings, disable the characteristic, or remove the password.
Chapter 2 Cisco IOS Commands vtp (VLAN configuration) Pruning is disabled. VTP version 2 (v2 mode) is disabled. Command Modes VLAN configuration Command History Release Modification 12.0(5.2)WC(1) This command was first introduced. Usage Guidelines If VTP mode is transparent, the mode and domain name are saved in the switch running configuration file, and you can save the configuration in the switch startup configuration file by using the copy running-config startup-config privileged EXEC command.
Chapter 2 Cisco IOS Commands vtp (VLAN configuration) • Domain names are case sensitive. • After you configure a domain name, it cannot be removed. You can reassign it only to a different domain. Follow these guidelines when configuring a VTP password: • Passwords are case sensitive. Passwords should match on all switches in the same domain. • When the no vtp password form of the command is used, the switch returns to the no-password state.
Chapter 2 Cisco IOS Commands vtp (VLAN configuration) Related Commands Command Description show vtp status Displays the VTP statistics for the switch and general information about the VTP management domain status. switchport trunk pruning Configures the VLAN pruning-eligible list for ports in trunking mode. vtp (global configuration) Configures the VTP filename, interface, domain-name, and mode.
Chapter 2 Cisco IOS Commands wrr-queue bandwidth wrr-queue bandwidth Use the wrr-queue bandwidth global configuration command to assign weighted round-robin (WRR) weights to the four class of service (CoS) priority queues. Use the no form of this command to disable the WRR scheduler and enable the strict priority scheduler. wrr-queue bandwidth weight1...weight4 no wrr-queue bandwidth Syntax Description weight1...weight4 Defaults WRR is disabled. The strict priority is the default scheduler.
Chapter 2 Cisco IOS Commands wrr-queue bandwidth This example shows how to configure queue 4 as the expedite queue and to assign WRR weights of 10, 20, and 30 to the queues 1, 2, and 3: Switch(config)# wrr-queue bandwidth 10 20 30 0 You can verify your settings by entering the show wrr-queue bandwidth privileged EXEC command. Related Commands Command Description wrr-queue cos-map Assigns CoS values to the CoS priority queues.
Chapter 2 Cisco IOS Commands wrr-queue cos-map wrr-queue cos-map Use the wrr-queue cos-map global configuration command to assign class of service (CoS) values to the CoS priority queues. Use the no form of this command to set the CoS map to default setting. wrr-queue cos-map quid cos1...cosn no wrr-queue cos-map [queue-id [cos1 ... cosn]] Syntax Description Defaults quid The queue id of the CoS priority queue. Ranges are 1 to 4 where 1 is the lowest CoS priority queue. cos1...
Chapter 2 Cisco IOS Commands wrr-queue cos-map After entering the wrr-queue cos-map 2 0 1 2 3 command, if all other priority queues use their default setting, this is the new mapping: CoS Value CoS Priority Queue Not applied 1 0, 1, 2, 3 2 4, 5 3 6, 7 4 In the previous example, CoS priority queue 1 is no longer used because no CoS value is assigned to the queue. You can set the CoS values to the default values by entering the no wrr-queue cos-map global configuration command.
Chapter 2 Cisco IOS Commands wrr-queue cos-map Catalyst 2950 and Catalyst 2955 Switch Command Reference 2-376 78-15304-01
A P P E N D I X A Catalyst 2955-Specific Alarm Commands This appendix describes the commands used to monitor switch conditions on the Catalyst 2955 switch. These commands are not supported on the Catalyst 2950 switch. Note For more information about how to use the commands, refer to the chapter on “Configuring Catalyst 2955 Switch Alarms” in the software configuration guide for this release.
Appendix A Catalyst 2955-Specific Alarm Commands alarm facility fcs-hysteresis alarm facility fcs-hysteresis Use the alarm facility fcs-hysteresis global configuration command to set the frame check sequence (FCS) error hysteresis threshold as a percentage of fluctuation from the FCS bit error rate. Use the no form of this command to set the FCS error hysteresis threshold to its default value.
Appendix A Catalyst 2955-Specific Alarm Commands alarm facility power-supply alarm facility power-supply Use the alarm facility power-supply global configuration command to set the alarm options for a missing or failing power supply when the system is operating in dual power-supply mode. Use the no form of the command to disable the specified setting.
Appendix A Catalyst 2955-Specific Alarm Commands alarm facility temperature alarm facility temperature Use the alarm facility temperature global configuration command to configure a primary temperature monitoring alarm or to configure a secondary temperature alarm threshold with a lower maximum temperature threshold. Use the no form of this command to delete the temperature monitoring alarm configuration or to disable the secondary temperature alarm.
Appendix A Catalyst 2955-Specific Alarm Commands alarm facility temperature Examples This example sets the secondary temperature with a high threshold value of 45 0C with alarms and traps sent to the minor relay circuitry, syslog, and an SNMP server.
Appendix A Catalyst 2955-Specific Alarm Commands alarm profile (global configuration) alarm profile (global configuration) Use the alarm profile global configuration command to create an alarm profile and to enter alarm profile configuration mode. Use the no form of this command to delete an alarm profile. alarm profile name no alarm profile name Syntax Description name Defaults No alarm profiles are created. Alarm profile name When a profile is created, none of the alarms are enabled.
Appendix A Catalyst 2955-Specific Alarm Commands alarm profile (global configuration) Table A-1 lists the alarm IDs and their corresponding alarm descriptions. Table A-1 AlarmList ID Numbers and Alarm Descriptions AlarmList ID Alarm Description 1 Link Fault 2 Port not Forwarding 3 Port not Operating 4 FCS Error Rate exceeds threshold After you have created an alarm profile, you can attach the profile to an interface by using the alarm-profile interface configuration command.
Appendix A Catalyst 2955-Specific Alarm Commands alarm profile (interface configuration) alarm profile (interface configuration) Use the alarm profile interface configuration command to attach an alarm profile to a port. Use the no form of this command to detach the profile from the port. alarm profile name no alarm profile Syntax Description name Defaults The alarm profile defaultPort is applied to all interfaces. In this profile, only the Port is not Operating alarm is enabled.
Appendix A Catalyst 2955-Specific Alarm Commands fcs-threshold fcs-threshold Use the fcs-threshold interface configuration command to set the frame check sequence (FCS) bit error rate. Use the no form of the command to return to the default setting. fcs-threshold value no fcs-threshold value Value ranges from 6 to 11, representing a bit error rate from 10-6 to 10 -11. Syntax Description value Defaults The default for this bit error rate is 8, which is the bit error rate for Ethernet standard 10-8.
Appendix A Catalyst 2955-Specific Alarm Commands power-supply dual power-supply dual Use the power-supply dual global configuration command to set the dual power-supply mode of operation. Use the no form of this command to return to the default single power-supply mode. power-supply dual no power-supply dual Syntax Description This command has no keywords or arguments. Defaults By default, the system operates in single-power mode.
Appendix A Catalyst 2955-Specific Alarm Commands show alarm description port show alarm description port Use the show alarm description port user EXEC command to display the alarm numbers with the text description. show alarm description port [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the expression. | exclude (Optional) Display excludes lines that match the expression.
Appendix A Catalyst 2955-Specific Alarm Commands show alarm profile show alarm profile Use the show alarm profile user EXEC command to display all alarm profiles configured in the system or the specified profile and the interfaces to which each profile is attached. show alarm profile [name] [ | {begin | exclude | include} expression] Syntax Description name (Optional) Display only the profile with the specified name. | begin (Optional) Display begins with the line that matches the expression.
Appendix A Catalyst 2955-Specific Alarm Commands show alarm profile Examples This example displays all ports that are attached to the configured profiles and defines the alarm options in the profile.
Appendix A Catalyst 2955-Specific Alarm Commands show alarm settings show alarm settings Use the show alarm settings user EXEC command to display all environmental alarm settings in the switch. show alarm settings [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the expression. | exclude (Optional) Display excludes lines that match the expression.
Appendix A Catalyst 2955-Specific Alarm Commands show alarm settings Related Commands Command Description alarm facility power-supply Sets power supply alarm options. alarm facility temperature Sets temperature alarm options. power-supply dual Sets dual power-supply mode.
Appendix A Catalyst 2955-Specific Alarm Commands show env show env Use the show env privileged EXEC command to display the status of environmental facilities on the Catalyst 2955 switch. show env {all | power | temperature}[ | {begin | exclude | include} expression] Note Syntax Description This command is supported with different keywords on the Catalyst 2950 platform. all Display power supply and temperature environmental status. power Display power supply environmental status.
Appendix A Catalyst 2955-Specific Alarm Commands show env This example shows the status of all environmental facilities (power supply and temperature) on the switch. Switch# show env all Power supply A is present Power supply B is present Current temperature is 49C Highest temperature was 53C Mar 04 1993 04:06:36 Related Commands Command Description power-supply dual Sets dual power-supply mode on the switch.
Appendix A Catalyst 2955-Specific Alarm Commands show facility-alarm relay show facility-alarm relay Use the show facility-alarm relay user EXEC command to display facility alarms associated with the indicated relay circuitry. show facility-alarm relay {major | minor} [ | {begin | exclude | include} expression] Syntax Description major Display alarms associated with major relay. minor Display alarms associated with minor relay.
Appendix A Catalyst 2955-Specific Alarm Commands show facility-alarm status show facility-alarm status Use the show facility-alarm status user EXEC command to display all generated alarms in the switch. show facility-alarm status [critical | info | major | minor] [ | {begin | exclude | include} expression] Syntax Description critical (Optional) Display only critical facility alarms. info (Optional) Display all facility alarms. major (Optional) Display major facility alarms and higher.
Appendix A Catalyst 2955-Specific Alarm Commands show fcs-threshold show fcs-threshold Use the show fcs-threshold user EXEC command to display the frame check sequence (FCS) bit error rate settings on the switch interfaces. show fcs-threshold [ | {begin | exclude | include} expression] Syntax Description | begin (Optional) Display begins with the line that matches the expression. | exclude (Optional) Display excludes lines that match the expression.
Appendix A Catalyst 2955-Specific Alarm Commands test relay test relay Use the test relay privileged EXEC command to turn on or off the relay circuitry. test relay {major | minor} {on| off} Caution Using the test command alters the state (on or off) of a relay. Previous states are not saved. Command Modes Privileged EXEC Command History Release Modification 12.1(12c)EA1 This command was first introduced.
Appendix A Catalyst 2955-Specific Alarm Commands test relay Catalyst 2950 and Catalyst 2955 Switch Command Reference A-22 78-15304-01
C H A P T E R B Debug Commands This appendix describes the Catalyst 2950 and Catalyst 2955 specific debug privileged EXEC commands. These commands are helpful in diagnosing and resolving internetworking problems and should be used only with the guidance of Cisco technical support staff. Caution Because debugging output is assigned high priority in the CPU process, it can render the system unusable.
Chapter B Debug Commands debug autoqos debug autoqos Use the debug autoqos privileged EXEC command to enable debugging of the automatic quality of service (auto-QoS) feature. Use the no form of this command to disable debugging. debug autoqos no debug autoqos Syntax Description This command has no keywords or arguments. Defaults Auto-QoS debugging is disabled. Command Modes Privileged EXEC Command History Release Modification 12.1(12c)EA1 This command was first introduced.
Chapter B Debug Commands debug autoqos Related Commands Command Description auto qos voip Configure auto-QoS for voice over IP (VoIP) within a QoS domain. show auto qos Displays the configuration applied and the new defaults in effect when auto-QoS is enabled. show debugging Displays information about the types of debugging that are enabled. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.
Chapter B Debug Commands debug dot1x debug dot1x Use the debug dot1x privileged EXEC command to enable debugging of the 802.1X feature. Use the no form of this command to disable debugging output. debug dot1x {all | authsm | backend | besm | core | reauthsm} no debug dot1x {all | authsm | backend | besm | core | reauthsm} Syntax Description all Enable debugging of all conditions.
Chapter B Debug Commands debug etherchannel debug etherchannel Use the debug etherchannel privileged EXEC command for EtherChannel/Port Aggregation Protocol (PAgP) shim debugging. This shim is the software module that is the interface between the PAgP software module and the port manager software module. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug pagp debug pagp Use the debug pagp privileged EXEC command to debug Port Aggregation Protocol (PAgP) activity. Use the no form of this command to disable debugging output. debug pagp [all | event | fsm | misc | packet] no debug pagp [all | event | fsm | misc | packet] Syntax Description all (Optional) Enable all PAgP debugging. event (Optional) Enable debugging of PAgP events. fsm (Optional) Enable debugging of the PAgP finite state machine.
Chapter B Debug Commands debug pm debug pm Use the debug pm privileged EXEC command to debug port manager (PM) activity. The port manager is a state machine that controls all the logical and physical interfaces. All features, such as VLANs and UniDirectional Link Detection (UDLD), work with the port manager to provide switch functions. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug pm Related Commands Command Description show debugging Displays information about the types of debugging that are enabled. For syntax information, refer to Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.1 > Cisco IOS System Management Commands > Troubleshooting Commands.
Chapter B Debug Commands debug spanning-tree debug spanning-tree Use the debug spanning-tree privileged EXEC command to debug spanning-tree activities. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug spanning-tree Related Commands Command Description show debugging Displays information about the types of debugging that are enabled. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.1 > Cisco IOS System Management Commands > Troubleshooting Commands. show spanning-tree Displays spanning-tree state information.
Chapter B Debug Commands debug spanning-tree backbonefast debug spanning-tree backbonefast Use the debug spanning-tree backbonefast privileged EXEC command to enable debugging of spanning-tree BackboneFast events. Use the no form of this command to disable debugging output. debug spanning-tree backbonefast [detail | exceptions] no debug spanning-tree backbonefast [detail | exceptions] Syntax Description detail (Optional) Display detailed BackboneFast debugging messages.
Chapter B Debug Commands debug spanning-tree bpdu debug spanning-tree bpdu Use the debug spanning-tree bpdu privileged EXEC command to enable debugging of received and transmitted spanning-tree bridge protocol data units (BPDUs). Use the no form of this command to disable debugging output. debug spanning-tree bpdu [receive | transmit] no debug spanning-tree bpdu [receive | transmit] Syntax Description receive (Optional) Enable receive BPDU debugging.
Chapter B Debug Commands debug spanning-tree bpdu-opt debug spanning-tree bpdu-opt Use the debug spanning-tree bpdu-opt privileged EXEC command to enable debugging of optimized spanning-tree bridge protocol data units (BPDUs) handling. Use the no form of this command to disable debugging output. debug spanning-tree bpdu-opt [detail | packet] no debug spanning-tree bpdu-opt [detail | packet] Syntax Description detail (Optional) Debug detailed optimized BPDU handling.
Chapter B Debug Commands debug spanning-tree mstp debug spanning-tree mstp Use the debug spanning-tree mstp privileged EXEC command to enable debugging of the Multiple Spanning Tree Protocol (MSTP) software. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug spanning-tree mstp Usage Guidelines This command can be entered only from the switch console. The undebug spanning-tree mstp command is the same as the no debug spanning-tree mstp command. Related Commands Command Description show debugging Displays information about the types of debugging that are enabled. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.
Chapter B Debug Commands debug spanning-tree switch debug spanning-tree switch Use the debug spanning-tree switch privileged EXEC command to enable debugging of the software interface between the Spanning Tree Protocol (STP) software module and the port manager software module. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug spanning-tree switch Related Commands Command Description show debugging Displays information about the types of debugging that are enabled. For syntax information, select Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.1 > Cisco IOS System Management Commands > Troubleshooting Commands. show spanning-tree Displays spanning-tree state information.
Chapter B Debug Commands debug spanning-tree uplinkfast debug spanning-tree uplinkfast Use the debug spanning-tree uplinkfast privileged EXEC command to enable debugging of spanning-tree UplinkFast events. Use the no form of this command to disable debugging output. debug spanning-tree uplinkfast [exceptions] no debug spanning-tree uplinkfast [exceptions] Syntax Description exceptions Defaults Debugging is disabled. Command Modes Privileged EXEC Command History Release Modification 12.
Chapter B Debug Commands debug sw-vlan debug sw-vlan Use the debug sw-vlan privileged EXEC command to debug VLAN manager activities. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug sw-vlan Related Commands Command Description show debugging Displays information about the types of debugging that are enabled. For syntax information, refer to Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.1 > Cisco IOS System Management Commands > Troubleshooting Commands. show vlan Displays the parameters for all configured VLANs or one VLAN (if the VLAN name or ID is specified) in the administrative domain.
Chapter B Debug Commands debug sw-vlan ifs debug sw-vlan ifs Use the debug sw-vlan ifs privileged EXEC command to enable VLAN manager IOS file system (IFS) error tests. Use the no form of this command to disable debugging output. debug sw-vlan ifs {open {read | write} | read {1 | 2 | 3 | 4} | write} no debug sw-vlan ifs {open {read | write} | read {1 | 2 | 3 | 4} | write} Syntax Description open Enable VLAN manager IFS debugging of errors in an IFS file open operation.
Chapter B Debug Commands debug sw-vlan notification debug sw-vlan notification Use the debug sw-vlan notification privileged EXEC command to enable debugging messages that trace the activation and deactivation of Inter-Link Switch (ISL) VLAN IDs. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug sw-vlan vtp debug sw-vlan vtp Use the debug sw-vlan vtp privileged EXEC command to enable debugging messages to be generated by the VLAN Trunking Protocol (VTP) code. Use the no form of this command to disable debugging output.
Chapter B Debug Commands debug sw-vlan vtp Related Commands Command Description show debugging Displays information about the types of debugging that are enabled. For syntax information, refer to Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.1 > Cisco IOS System Management Commands > Troubleshooting Commands. show vtp Displays general information about VTP management domain, status, and counters.
Chapter B Debug Commands debug udld debug udld Use the debug udld privileged EXEC command to display the UniDirectional Link Detection (UDLD) debug messages. Use the no form of this command to disable UDLD debugging. debug udld {events | packets | registries} no debug udld {events | packets | registries} Syntax Description events Enable debugging messages for UDLD process events as they occur.
Chapter B Debug Commands debug udld For debug udld registries, these categories of debugging messages appear: Related Commands • Sub-block creation • Fiber-port status changes • State change indications from the port manager software • MAC address registry calls Command Description show debugging Displays information about the types of debugging that are enabled. For syntax information, refer to Cisco IOS Configuration Fundamentals Command Reference For IOS Release 12.
I N D EX permit A 2-131 ACPs, displaying aaa authentication command abort command 2-1 aggregate-port learner 2-355 alarm command access control entries See ACEs access control lists 2-125 A-6 alarm facility fcs-hysteresis command A-2 alarm facility power-supply command A-3 alarm facility temperature command See ACLs alarm IDs Access Control Parameters A-7, A-11 attaching to a port access groups creating 2-78 A-8 A-6 displaying MAC A-12 alarm profile (global configuration) comma
Index duration after which switch declared down C interval between caution, description xiii 2-12 channel-protocol command class command HSRP standby groups 2-15 2-17 class-map command 2-19 2-41 SNMP trap 2-256 cluster timer command 2-19 2-104 1-2 command switch 2-155 See clusters class of service configuration files, private See CoS 2-11 configuring multiple interfaces clear interface command clear lacp command 2-41 2-43 command modes defined defining the match criteria displayi
Index debug etherchannel command debug pagp command dynamic-access ports, configuring B-5 Dynamic Trunking Protocol B-6 debug pm command See DTP B-7 debug spanning-tree backbonefast command debug spanning-tree bpdu command debug spanning-tree command EAP-request/identity frame B-14 debug spanning-tree switch command B-16 debug spanning-tree uplinkfast command B-22 displaying 2-44 2-46 2-47 2-137 PAgP 2-50 aggregate-port learner 2-125 debug messages, displaying xii displaying 2-362, 2-
Index authentication methods F debugging 2-1 B-4 facility alarm relays, displaying A-18 displaying settings facility alarm status, displaying A-19 EAP-request/identity frame fan information, displaying 2-167 response time FCS bit error rate sending fluctuation threshold A-2 FCS bit error rate, setting fcs-threshold command file name, VTP files, deleting A-20 2-55 2-60 re-authenticaton A-9 initiating periodic 2-46 2-58 2-59 re-authenticaton attempts, interval between 2-69 resettin
Index error detection for loop guard, for spanning tree 2-65 error recovery timer 2-272, 2-275 2-67 ip access-group command ip access-list command 2-78 M 2-80 ip address command 2-82 ip addresses, setting 2-82 mac access-group command MAC access-list configuration mode ip igmp snooping command 2-83 deny ip igmp snooping source-only-learning command ip igmp snooping vlan command 2-84 2-86 ip igmp snooping vlan mrouter command ip igmp snooping vlan static command 2-50 entering permit
Index enabling sticky learning learning dynamically current or pending display 2-317 displaying 2-317 mac address-table aging-time command 2-98 mac address-table notification command mac address-table static command MAC-named extended ACLs 2-100 loop guard restricting which can be root 2-44 2-272 2-272 affects of extended system ID xii hello-time xi maps, QoS 2-270 2-283, 2-292 interval between BDPU messages 2-285 interval between hello BPDU messages 2-108 displaying 2-272 root s
Index multicast router ports, configuring multicast suppression level configuring displaying enabling 2-309 multicast traffic counters multicast VLAN, MVR 2-182 2-128 permit (MAC access-list configuration) command 2-131 PIM-DVMRP, as multicast router learning method 2-88 2-133 policy-map command 2-135 policy maps 2-117 applying to an interface multicast VLAN registration See MVR creating Multiple Spanning Tree Protocol 2-145 2-135 displaying 2-218 policers See MSTP displaying MVR
Index VLANs 2-324 R VTP displaying interface information enabling rcommand command 2-176 receiver port, MVR 2-362, 2-366, 2-368 publications, related 2-139 2-121 receiving flow-control packets xiii 2-69 recovery mechanism causes Q 2-67 displaying timer interval QoS ACPs, displaying 2-8 class maps creating 2-19 defining the match criteria displaying 2-67 redundancy for cluster switches 2-202 automatic configuration relay-major command A-6 relay-minor command A-6 remote-span co
Index show auto qos command show boot command show rps command 2-151 show running-config vlan command 2-153 show changes command 2-355 show class-map command 2-155 show cluster candidates command show cluster command show env command 2-232 2-235 2-239 2-240 show vlan command fields 2-163 show vmps command 2-167 show vtp command A-16 show etherchannel command show fcs threhsold command 2-247 shutdown command 2-170 SNMP host, specifying A-19 2-255 2-258 snmp-server host command 2
Index spanning-tree guard command spanning-tree activity 2-272 spanning-tree link-type command switch shim 2-274 spanning-tree loopguard default command spanning-tree mode command 2-275 spanning-tree mst configuration command spanning-tree mst cost command 2-278 spanning-tree mst forward-time command spanning-tree mst hello-time command 2-283 2-285 spanning-tree mst max-hops command 2-287 spanning-tree mst port-priority command spanning-tree mst priority command spanning-tree mst root command
Index switching characteristics modifying normal mode resetting shutdown interfaces 2-315 returning to interfaces status 2-315 switchport access command switchport nonegotiate command switchport port-security command 2-322 2-323 2-339 2-341 unicast suppression level configuring 2-309 displaying 2-232 enabling 2-309 unicast traffic counters 2-176 2-182 UniDirectional Link Detection 2-324 switchport voice vlan command 2-327 See UDLD UplinkFast, for STP A-6 system mtu command 2-32
Index VLAN manager activity VTP B-19 B-23 displaying configurations extended-range counters display fields 2-248 displaying information 2-247 enabling 2-240 pruning 2-342 MAC addresses 2-362, 2-366, 2-368 version 2 2-362, 2-366, 2-368 displaying 2-195 mode number of 2-195 pruning 2-345, 2-350 saving the configuration media types normal-range saving the configuration 2-343, 2-352 2-249 vtp (global configuration) command 2-342 vtp (privileged EXEC) command 2-255 SNMP traps for