- New and Changed Information
- Preface
- A Commands
- Advanced Services Modules Commands
- B Commands
- C Commands
- Caching Services Module Commands
- CLI Overview
- D Commands
- Debug Commands
- E Commands
- F Commands
- G Commands
- H Commands
- I Commands
- J Commands
- K Commands
- L Commands
- M Commands
- N Commands
- O Commands
- P Commands
- Q Commands
- R Commands
- S Commands
- Show Commands
- T Commands
- U Commands
- V Commands
- W Commands
- Z Commands
K Commands
The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. See “About the CLI Command Modes” section to determine the appropriate mode for each command.
keepalive
To configure the message keepalive interval for the IKE protocol, use the keepalive command in IKE configuration submode. To revert to the default, use the no form of the command.
Syntax Description
Specifies the number of seconds for the keepalive interval. The range is 120 to 86400. |
Defaults
Command Modes
Command History
|
|
Usage Guidelines
The keepalive interface only applies to IKE version 2 tunnels.
To use this command, the IKE protocol must be enabled using the crypto ike enable command.
Examples
The following example shows how to configure the keepalive interval:
Related Commands
|
|
---|---|
kernel core
Use the kernel core command to generate a core dump for each module. Use the no form of this command to negate the command or revert to its factory
kernel core { limit number | module slot { force | level { all | header | kernel | ram | used-ram} | target ipaddress }
no kernel core { limit number | module slot { force | level { all | header | kernel | ram | used-ram} | target ipaddress }
Syntax Description
Limits the number of modules for which the core is generated. The range is 1 to 6. |
|
Configures the external server IP address on the same physical LAN. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Core dumps performed on the supervisor module can lead to packet loss, even in a dual supervisor configuration.
Examples
The following example limits core generation to two modules:
The following example configures module 5 to generate cores:
The following example configures module 5 to generate only header-level cores:
The following example configures the external server:
Related Commands
|
|
---|---|
key (sa configuration submode)
To configure the key for the current Security Association[SA], use the key command. To delete the key from the current SA, use the no form of the command.
Syntax Description
Specifies the key for encryption as a 16-byte hexadecimal string. The maximum size of the string is 34. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
The following example shows how to configure the key for the current SA:
Related Commands
|
|
---|---|
Displays FC-SP-related information for a specific interface. |
key
To configure the preshared key for the IKE protocol, use the key command in IKE configuration submode. To revert to the default, use the no form of the command.
key key-id { address ip-address | hostname name}
no key key-id { address ip-address | hostname name}
Syntax Description
Specifies the ID for the preshared key. The maximum length is 128 characters. |
|
Specifies the peer host name. The maximum length is 128 characters. |
Defaults
Command Modes
Command History
|
|
Usage Guidelines
To use this command, the IKE protocol must be enabled using the crypto ike enable command.
Note The key command supports only the IPv4 format for IP address.
Examples
The following example shows how to configure the key:
The following example shows how to delete the configured key:
The following example shows how to set the preshared key for the specified peer:
The following example shows how to delete the preshared key for the specified peer:
Related Commands
|
|
---|---|
key-ontape
To configure keys on the tape mode and store the encrypted security keys on the backup tapes, use the key-ontape command. To disable this feature, use the no form of the command.
Syntax Description
Defaults
Command Modes
Cisco SME cluster configuration submode.
Command History
|
|
Usage Guidelines
This command allows the encrypted security keys to be stored on the backup tapes.
Note This feature is supported only for unique keys.
Before using this command, automatic volume grouping should be disabled by using the auto-volgrp command.
Examples
The following example enables the key-ontape feature:
The following example disables the key-ontape feature:
Related Commands
|
|
---|---|