- rmon collection stats
- sdm prefer
- service instance
- service password-recovery
- service-policy (interface configuration)
- service-policy (policy-map class configuration)
- set cos
- set dot1ad dei
- set dscp
- set precedence
- set qos-group
- setup
- shape average
- show access-lists
- show archive status
- show arp access-list
- show boot
- show cable-diagnostics tdr
- show class-map
- show controllers cpu-interface
- show controllers ethernet-controller
- show controllers tcam
- show controllers utilization
- show cpu traffic qos
- show diagnostic
- show dot1q-tunnel
- show dot1x
- show env
- show errdisable detect
- show errdisable flap-values
- show errdisable recovery
- show etherchannel
- show ethernet loopback
- show ethernet service evc
- show ethernet service instance
- show ethernet service interface
- show flowcontrol
- show idprom
- show interfaces
- show interfaces counters
- show interfaces rep
- show interfaces transceivers
- show inventory
- show ip arp inspection
- show ip dhcp snooping
- show ip dhcp snooping binding
- show ip dhcp snooping database
- show ip dhcp snooping statistics
- show ip igmp profile
- show ip igmp snooping
- show ip igmp snooping groups
- show ip igmp snooping mrouter
- show ip igmp snooping querier
- show ip sla standards
- show ip sla twamp connection
- show ip sla twamp session
- show ip source binding
- show ip verify source
- show ipc
- show ipv6 access-list
- show ipv6 dhcp conflict
- show ipv6 route updated
- show l2protocol-tunnel
- show lacp
- show link state group
- show location
- show logging onboard
- show mac access-group
- show mac address-table
- show mac address-table address
- show mac address-table aging-time
- show mac address-table count
- show mac address-table dynamic
- show mac address-table interface
- show mac address-table learning
- show mac address-table move update
- show mac address-table notification
- show mac address-table static
- show mac address-table vlan
- show monitor
- show mvr
- show mvr interface
- show mvr members
- show pagp
- show parser macro
- show policer aggregate
- show policer cpu uni-eni
- show policy-map
- show port-security
- show port-type
- show rep topology
- show sdm prefer
- show spanning-tree
- show storm-control
- show system mtu
- show table-map
- show udld
- show version
- show vlan
- show vlan access-map
- show vlan filter
- show vlan mapping
- show vmps
rmon collection stats
Use the rmon collection stats interface configuration command to collect Ethernet group statistics, which include usage statistics about broadcast and multicast packets, and error statistics about cyclic redundancy check (CRC) alignment errors and collisions. Use the no form of this command to return to the default setting.
rmon collection stats index [ owner name ]
no rmon collection stats index [ owner name ]
Syntax Description
Remote Network Monitoring (RMON) collection control index. The range is 1 to 65535. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The RMON statistics collection command is based on hardware counters. If the port is a user network interface (UNI) or enhanced network interface (ENI), you must use the no shutdown interface configuration command to enable it before using the rmon collection stats command. UNIs and ENIs are disabled by default. Network node interfaces (NNIs) are enabled by default.
Examples
This example shows how to collect RMON statistics for the owner root :
You can verify your setting by entering the show rmon statistics privileged EXEC command.
Related Commands
|
|
---|---|
sdm prefer
Use the sdm prefer global configuration command to configure the template used in Switch Database Management (SDM) resource allocation. If the switch is running the metro IP access image, you can use a template to balance resources between Layer 2 and Layer 3 functionality, or you can maximize system usage to support only Layer 2 features in hardware. You can also select the dual IPv4 and IPv6 template to support IPv6 forwarding. Use the no form of this command to return to the default template.
sdm prefer { default | dual-ipv4-and-ipv6 { default | routing | vlan } | layer-2 }
Note The default and dual-ipv4-and-ipv6 keywords are visible only when the metro IP access image is installed on the switch.
Syntax Description
Maximizes system resources for Layer 2 functionality with no routing support. |
|
Defaults
The default template provides a balance to all features.
On switches that are running the metro access image, only the layer-2 template is supported.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
You must reload the switch for the configuration to take effect. If you enter the show sdm prefer command before you enter the reload privileged EXEC command, the show sdm prefer command shows the template currently in use and the template that will become active after a reload.
The default templates balances the use of system resources. Do not use the default template if you do not have routing enabled on your switch. Using the balanced template prevents Layer 2 features from using the memory allocated to unicast routing in the default template.
Do not use the layer-2 template if the switch is routing packets. The layer-2 template does not support routing and forces any routing to be done through software. This overloads the CPU and severely degrades routing performance.
If you try to configure IPv6 features without first selecting a dual IPv4 and IPv6 template, a warning message appears.
The dual-stack templates results in less allowable TCAM capacity for each resource. Do not use them if you plan to forward only IPv4 traffic.
Table 2-4 lists the approximate number of each resource supported in each of the two IPv4 templates for a switch running the metro IP access image. The values in the template are based on eight routed interfaces and approximately 1024 VLANs and represent the approximate hardware boundaries set when a template is selected. If a section of a hardware resource is full, all processing overflow is sent to the CPU, seriously impacting switch performance.
|
|
|
---|---|---|
IPv4 policy-based routing ACEs1 |
||
IPv4 or MAC QoS2 ACEs |
||
|
Table 2-5 defines the approximate feature resources allocated by each dual template. Template estimations are based on a switch with 8 routed interfaces and approximately 1000 VLANs.
|
|
|
|
---|---|---|---|
IPv6 policy-based routing ACEs3 |
|||
|
Examples
This example shows how to configure the layer-2 template on a switch:
This is an example of an output display when you have changed the template to the layer-2 template and have not reloaded the switch:
You can verify your settings by entering the show sdm prefer privileged EXEC command.
Related Commands
|
|
---|---|
Displays the current SDM template in use or displays the templates that can be used, with the approximate resource allocation per feature. |
service instance
Use the service instance interface configuration command to configure an Ethernet service instance on the interface and to enter Ethernet service configuration mode. Use the no form of this command to delete the service instance.
service instance id ethernet [ evc-id ]
This command is available only if your switch is running the metro IP access or metro access image.
Syntax Description
Defaults
Command Modes
Command History
|
|
Usage Guidelines
After you enter the service instance id ethernet command, the switch enters Ethernet service configuration mode, and these configuration commands are available:
- default : sets the service instance to its default state.
- ethernet lmi ce-vlan map : configures Ethernet Local Management Interface (LMI) parameters. See the ethernet lmi ce-vlan map command.
- exit : exits EVC configuration mode and returns to global configuration mode.
- no : negates a command or returns a command to its default setting.
Examples
This example shows how to define an Ethernet service instance and to enter Ethernet service configuration mode for EVC test :
Related Commands
|
|
Displays information about configured Ethernet service instances. |
service password-recovery
Use the service password-recovery global configuration command to enable the password-recovery mechanism (the default). This mechanism allows an end user with physical access to the switch to press the break key on the console terminal to interrupt the boot process while the switch is powering up and to assign a new password.
Use the no form of this command to disable part of the password-recovery functionality. When the password-recovery mechanism is disabled, interrupting the boot process is allowed only if the user agrees to set the system back to the default configuration.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
As a system administrator, you can use the no service password-recovery command to disable some of the functionality of the password recovery feature by allowing an end user to reset a password only by agreeing to return to the default configuration. This provides configuration file security by ensuring that only authenticated and authorized users have access to the configuration file and prevents users from accessing the configuration file by using the password recovery process.
The password recovery procedure requires using a break key. After the switch performs power-on self test (POST), the switch begins the autoboot process. The boot loader prompts the user for a break key character during the boot-up sequence, as shown in this example:
You must enter the break key on the console terminal within 5 seconds of receiving the message that the system will autoboot. A user with physical access to the switch presses the break key on the console terminal within 5 seconds of receiving the message that flash memory is initializing. The System LED flashes green until the break key is accepted. After the break key is accepted, the System LED turns off until after the switch boots.
If the user chooses not to reset the system to the default configuration, the normal boot process continues as if the break key had not been pressed. If you choose to reset the system to the default configuration, the configuration file in flash memory is deleted, and the VLAN database file, flash:vlan.dat (if present), is deleted.
Note If you use the no service password-recovery command to control end user access to passwords, we recommend that you save a copy of the configuration file in a location away from the switch in case the end user uses the password recovery procedure and sets the system back to default values. Do not keep a backup copy of the configuration file on the switch.
You can enter the show version privileged EXEC command to determine if password recovery is enabled or disabled.
Examples
This example shows how to disable password recovery on a switch so that a user can only reset a password by agreeing to return to the default configuration.
Related Commands
|
|
---|---|
service-policy (interface configuration)
Use the service-policy interface configuration command to apply a policy map defined by the policy-map command to the incoming or outgoing traffic of a physical port. Use the no form of this command to remove the policy map and port association.
service-policy { input | output } policy-map-name
no service-policy { input | output } policy-map-name
Syntax Description
Note Though visible in the command-line help strings, the history keyword is not supported, and you should ignore the statistics that it gathers.
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Only one input policy map and one output policy map can be attached to an interface.
Beginning with Cisco IOS Release 12.2(35)SE, you can attach an output policy map to each interface on the switch. However, the switch supports a limit of three unique queue-limit configurations across all output policy maps at any time. Multiple policy maps can share the same queue-limit configuration.If you try to attach an output policy map with a fourth unique queue-limit configuration, you see this error message:
You can attach input or output policy maps to a Fast Ethernet or Gigabit Ethernet port. You cannot attach policy maps to switch virtual interfaces (SVIs) and EtherChannel interfaces.
Examples
This example shows how to apply plcmap1 as an output policy map:
This example shows how to remove plcmap2 from the port:
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands
|
|
---|---|
Creates or modifies a policy map that can be attached to multiple ports to specify a service policy. |
|
show policy-map interface [ interface-id ] |
Displays policy maps configured on the specified interface or on all interfaces. |
service-policy (policy-map class configuration)
Use the service-policy policy-map class configuration command to configure a quality of service (Q0S) service policy for an input or output policy map or a per-port, per-VLAN policy map. Use the no form of this command to disable a service policy as a QoS policy within a policy map.
service-policy policy-map-name
no service-policy policy-map-name
Syntax Description
Name of the service policy map (created by using the policy-map global configuration command) to be used in a QoS hierarchical service policy. |
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
You can use the service-policy input command to assign a child QoS policy to a parent input policy defined with a classification based on VLAN IDs. This allows you to create a hierarchical policy for per-port, per-VLAN QoS.
You attach a service policy created in policy-map class configuration to a parent output policy map. This creates hierarchical policy mapping. Use the service-policy policy-map-name policy-map cl ass configuration command to enter a second-level (child) policy map.
For an input policy map, when you configure classes with classification based on VLAN IDs by using the match vlan class-map configuration command, you can use service-policy policy-map class configuration command to associate a child QoS policy with that class. This provides the ability to apply independent QoS policies based on the VLAN IDs of the incoming traffic on the port. The per-port, per-vlan ingress QoS feature is supported only using a 2-level hierarchical input policymap, where the parent level defines the VLAN-based classification and the child level defines the QoS policy to be applied to the corresponding VLAN or VLANs. You can configure the child policy with all actions that are available for input policy maps, specifically policing and marking.
For an output policy map, when shape average is also configured on the class class-default, you can configure hierarchical policy maps by attaching a single service-policy policy-map class command to the class class-default. This policy map specifies the service policy for the port-shaped traffic on the port and is the parent policy map. You can configure the child policy with class-based queuing actions by using the queue-limit policy map class command and with scheduling actions (by using the bandwidth, shape average, or priority command).
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
Examples
This example shows how to define the service policy and to attach it to a parent policy map to set the maximum bandwidth (shape) for an output queue at 90000000 bits per second:
In this example, the class maps in the child-level policy map specify matching criteria for voice and video traffic, and the child policy map sets the action for input policing each type of traffic. The parent-level policy map specifies the VLANs to which the child policy maps are applied on the specified port.
Note You can also enter the match criteria as match vlan 100 200 300 with the same result.
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
set cos
Use the set cos policy-map class configuration command to set a Layer 2 class of service (CoS) value in the packet. Use the no form of this command to remove traffic marking.
set cos { cos_value | from-field [ table table-map-name ]}
no set cos { cos_value | from-field [ table table-map-name ]}
Syntax Description
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
You can configure set cos with all other marking actions, specifically set dscp, set precedence, and set qos-group, for the same class. Support was also added for the ability to configure more than one marking action with enhanced packet marking by using table maps for the same class.
Use the set cos command if you want to mark a packet that is being sent to a switch. Switches can leverage Layer 2 header information including a CoS value marking.
You can use the match cos class-map configuration command and the set cos policy-map class configuration command together to allow switches to interoperate and provide quality of service (QoS) based on the CoS markings. You can also configure Layer 2 to Layer 3 mapping by matching on the CoS value because switches can already match and set CoS values.
If you are using this command to perform enhanced packet marking, you can use the from-field packet marking option for mapping and setting the CoS value. The supported from-field marking categories are: CoS, DSCP, and IP precedence.
If you specify a from-field category, but do not specify the table keyword and table-map-name, the default action is to copy the value associated with the from-field category as the CoS value. For example, if you enter the set cos precedence command, the precedence value is copied and used as the CoS value. If you enter the set cos dscp command, the DSCP value is copied and used as the CoS value.
Examples
This example shows how to set all FTP traffic to cos 3:
This example shows how to assign a DSCP to CoS table map to a class:
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
set dot1ad dei
Use the set dot1ad dei policy-map class configuration command to mark IPv4 traffic by setting a drop eligibility indicator (DEI) in the IEEE 802.1ad frame. Use the no form of this command to remove traffic marking.
Syntax Description
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
You can use this command with per port or per-port per-VLAN policies to set the DEI bit in the 802.1ad header of the packet.
DEI marking is supported only in ingress packets.
You can set the DEI bit only on 802.1ad ports. You configure these ports by entering the ethernet dot1ad { nni | uni { c-port | s-port | c-port isolate | s-port isolate }} interface configuration command.
- C-UNI ports can both classify and mark on the DEI bit.
- S-UNI ports can classify and mark on the DEI bit of either the default S-tag on the port or the S-tagged packet received from the customer port.
- S-NNI ports can both classify and mark on the DEI bit.
You can verify your settings by entering the show policy-map privileged EXEC command.
Examples
This example shows how to configure a policy map with two classes ( match_1 and match_0) that set the DEI bit:
This example shows how to apply the policy map to an S-NNI port ingress:
Related Commands
|
|
---|---|
Defines a traffic classification match criteria to use the DEI bit. |
|
set dscp
Use the set [ ip ] dscp policy-map class configuration command to mark IPv4 traffic by setting a Differentiated Services Code Point (DSCP) value in the type of service (ToS) byte of the packet. Use the no form of this command to remove traffic marking.
set [ ip ] dscp { dscp_value | from-field [ table table-map-name ]}
no set [ ip ] dscp { dscp_value | from-field [ table table-map-name ]}
Note Entering ip dscp is the same as entering dscp.
Syntax Description
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
You can configure set dscp with other marking actions, specifically set cos and set qos-group, for the same class. Support was also added for the ability to configure more than one marking action with enhanced packet marking by using table maps for the same class.
You cannot use the set dscp command with the set precedence command to mark the same packet. DSCP values and IP precedence values are mutually exclusive. A packet can have one value of the other, but not both.
After DSCP bits are set, other quality of service (QoS) features can then operate on the bit settings.
The network gives priority (or some type of expedited handling) to marked traffic. Typically, you set the DSCP value at the edge of the network (or administrative domain) and data is then queued according to the precedence. Class-based weighted fair queuing (CBWFQ) can speed up handling for high-precedence traffic at congestion points. Weighted Tail Drop (WTD) ensures that high-precedence traffic has lower loss rates than other traffic during times of congestion.
Instead of using numeric values, you can also specify the dscp-value by using the reserved keywords EF, AF11, and AF12.
If you are using this command to perform enhanced packet marking, you can use the from-field packet marking option for mapping and setting the DSCP value. The supported from-field marking categories are: CoS, DSCP, and IP precedence.
If you specify a from-field category, but do not specify the table keyword and table-map-name, the default action is to copy the value associated with the from-field category as the DSCP value. For example, if you enter the set dscp cos command, the CoS value is copied and used as the DSCP value.
Examples
This example shows how to set all FTP traffic to DSCP 10:
This example shows how to assign a CoS to DSCP table map to a class:
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
set precedence
Use the set [ ip ] precedence policy-map class configuration command to mark IPv4 traffic by setting an IP-precedence value in the packet. Use the no form of this command to remove traffic marking.
set [ ip ] precedence { precedence_value | from-field [ table table-map-name ]}
no set [ ip ] precedence { precedence_value | from-field [ table table-map-name ]}
Note Entering ip precedence is the same as entering precedence.
Syntax Description
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
You can configure set precedence with other marking actions, specifically set cos and set qos-group, for the same class. Support was also added for the ability to configure more than one marking action with enhanced packet marking by using table maps for the same class.
You cannot use the set precedence command with the set dscp command to mark the same packet. DSCP values and IP precedence values are mutually exclusive. A packet can have one value of the other, but not both.
After precedence bits are set, other quality of service (QoS) features can then operate on the bit settings.
The network gives priority (or some type of expedited handling) to marked traffic. Typically, you set the precedence value at the edge of the network (or administrative domain) and data is then queued according to the precedence. Class-based weighted fair queuing (CBWFQ) can speed up handling for high-precedence traffic at congestion points. Weighted Tail Drop (WTD) ensures that high-precedence traffic has lower loss rates than other traffic during times of congestion.
Instead of using numeric values, you can also specify the dscp-value by using the reserved keywords EF, AF11, and AF12.
If you are using this command to perform enhanced packet marking, you can use the from-field packet marking option for mapping and setting the precedence value. The supported from-field marking categories are: CoS, DSCP, and IP precedence.
If you specify a from-field category, but do not specify the table keyword and table-map-name, the default action is to copy the value associated with the from-field category as the precedence value. For example, if you enter the set precedence cos command, the CoS value is copied and used as the precedence value.
Examples
This example shows how to give all FTP traffic an IP precedence value of 5:
This example shows how to assign a CoS to precedence table map to a class:
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
set qos-group
Use the set qos-group policy-map class configuration command to set a a quality of service (QoS) group identifier that can be used later to classify packets. Use the no form of this command to remove the group identifier.
Syntax Description
Set the QoS group value to use to classify traffic. The range is from 0 to 99. |
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
You can configure set qos-group with all other marking actions, specifically set cos, set dscp, and set precedence, for the same class. Support was also added for the ability to configure more than one marking action with enhanced packet marking by using table maps for the same class.
Use this command to associate a QoS group value with a traffic flow as it enters the switch, which can then be used in an output policy map to identify the flow.
A maximum of 100 QoS groups (0 through 99) is supported on the switch.
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
Examples
This example shows how to set all FTP traffic to QoS group 5:
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
setup
Use the setup privileged EXEC command to configure the switch with its initial configuration.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
When you use the setup command, make sure that you have this information:
When you enter the setup command, an interactive dialog, called the System Configuration Dialog, appears. It guides you through the configuration process and prompts you for information. The values shown in brackets next to each prompt are the default values last set by using either the setup command facility or the configure privileged EXEC command.
Help text is provided for each prompt. To access help text, press the question mark (?) key at a prompt.
To return to the privileged EXEC prompt without making changes and without running through the entire System Configuration Dialog, press Ctrl-C.
When you complete your changes, the setup program shows you the configuration command script that was created during the setup session. You can save the configuration in NVRAM or return to the setup program or the command-line prompt without saving it.
Examples
This is an example of output from the setup command:
Related Commands
|
|
---|---|
shape average
Use the shape average policy-map class configuration command to configure class-based or port shaping by specifying the average traffic shaping rate. Use the command with the class class-default to set port shaping. Use the no form of this command to remove traffic shaping.
Syntax Description
Target average bit rate in bits per second (bps). The range is from 64000 to 1000000000 for class-based shaping and 4000000 to 1000000000 for port shaping. |
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
You use the shape average policy-map class command to control output traffic. Shaping is not supported in input policy maps.
Traffic shaping limits the rate of transmission of data. Configuring traffic shaping for a user-defined class or class-default for class-based shaping sets the peak information rate (PIR) for that class. Configuring traffic shaping for the class class-default when it is the only class in the policy map that is attached to an interface sets the PIR for the interface (port shaping).
You cannot configure shape average in a class that includes priority queueing (configured with the priority policy-map class configuration command).
The shape average command uses a default queue limit for the class. You can change the queue limit by using the queue-limit policy-map class command, overriding the default that is set by the shape average command.
You cannot use the bandwidth policy-map class configuration command to configure class-based weighted fair queuing (CBWFQ) and the shape average command to configure traffic shaping for the same class.
You can configure hierarchical policy maps by attaching the service-policy policy-map class command to the class class-default only when shape average is also configured on the class class-default.
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
Examples
This example shows how to configure traffic shaping for outgoing traffic on a Fast Ethernet port so that outclass1, outclass2, and outclass3 get a maximum of 50, 20, and 10 Mbps of the buffer size. The class class-default gets the remaining bandwidth.
This example shows how to configure port shaping by configuring a hierarchical policy map that shapes a port to 90 Mbps, allocated according to the out-policy policy map configured in the previous example.
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
|
|
---|---|
Defines a traffic classification match criteria for the specified class-map name. |
|
Creates or modifies a policy map that can be attached to multiple ports to specify a service policy. |
|
show policy-map interface [ interface-id ] |
Displays policy maps configured on the specified interface or on all interfaces. |
show access-lists
Use the show access-lists privileged EXEC command to display access control lists (ACLs) configured on the switch.
show access-lists [name | number | hardware counters | ipc ]
Syntax Description
(Optional) Display global hardware ACL statistics for switched and routed packets. |
|
(Optional) Display Interprocess Communication (IPC) protocol access-list configuration download information. |
Note Though visible in the command-line help strings, the rate-limit keywords are not supported.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The switch supports only IP standard and extended access lists. Therefore, the allowed numbers are only 1 to 199 and 1300 to 2699.
Examples
This is an example of output from the show access-lists command:
This is an example of output from the show access-lists hardware counters command:
Related Commands
|
|
---|---|
Configures a standard or extended numbered access list on the switch. |
|
Configures a named or numbered MAC access list on the switch. |
show archive status
Use the show archive status privileged EXEC command to display the status of a new image being downloaded to a switch with the HTTP or the TFTP protocol.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you use the archive download-sw privileged EXEC command to download an image to a TFTP server, the output of the show archive status command shows the status of the download.
Examples
These are examples of output from the show archive status command:
Related Commands
|
|
---|---|
show arp access-list
Use the show arp access-list user EXEC command to display detailed information about Address Resolution Protocol (ARP) access control (lists).
show arp access-list [ acl-name ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show arp access-list command:
Related Commands
show boot
Use the show boot privileged EXEC command to display the settings of the boot environment variables.
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show boot command. Switch# show boot
Table 2-6 describes each field in the display.
Related Commands
show cable-diagnostics tdr
Use the show cable-diagnostics tdr privileged EXEC command to display the Time Domain Reflector (TDR) results.
show cable-diagnostics tdr interface interface-id
Note TDR is supported only on the copper Ethernet 10/100 ports on the Cisco ME switch.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
TDR is supported only on copper Ethernet 10/100 ports on the Cisco ME switch. It is not supported on small form-factor pluggable (SFP)-module ports. For more information about TDR, see the software configuration guide for this release.
Examples
This is an example of output from the show cable-diagnostics tdr interface interface-id command on a Cisco ME switch:
Table 2-7 lists the descriptions of the fields in the show cable-diagnostics tdr command output.
This is an example of output from the show interface interface-id command when TDR is running:
This is an example of output from the show cable-diagnostics tdr interface interface-id command when TDR is not running:
If an interface does not support TDR, this message appears:
Related Commands
|
|
---|---|
show class-map
Use the show class-map user EXEC command to display quality of service (QoS) class maps, which define the match criteria to classify traffic.
show class-map [ class-map-name ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show class-map command:
Related Commands
|
|
---|---|
Creates a class map to be used for matching packets to the class whose name you specify. |
|
show controllers cpu-interface
Use the show controllers cpu-interface privileged EXEC command to display the state of the CPU network interface ASIC and the send and receive statistics for packets reaching the CPU.
show controllers cpu-interface
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This display provides information that might be useful for Cisco technical support representatives troubleshooting the switch.
Examples
This is a partial output example from the show controllers cpu-interface command:
Related Commands
show controllers ethernet-controller
Use the show controllers ethernet-controller privileged EXEC command without keywords to display per-interface send and receive statistics read from the hardware. Use with the phy keyword to display the interface internal registers or the port-asic keyword to display information about the port ASIC.
show controllers ethernet-controller [ interface-id ] [ phy [ detail ]] [ port-asic { configuration | statistics }]
Syntax Description
Command Modes
Privileged EXEC (only supported with the interface-id keywords in user EXEC mode)
Command History
|
|
---|---|
Usage Guidelines
This display without keywords provides traffic statistics, basically the RMON statistics for all interfaces or for the specified interface.
When you enter the phy or port-asic keywords, the displayed information is useful primarily for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers ethernet-controller command for an interface. Table 2-8 describes the Transmit fields, and Table 2-9 describes the Receive fields.
|
|
---|---|
The number of frames dropped on the egress port because the packet aged out. |
|
The number of frames that are not sent after the time exceeds 2*maximum-packet time. |
|
The number of frames that are larger than the maximum allowed frame size. |
|
The number of frames that are successfully sent on an interface after one collision occurs. |
|
The number of frames that are successfully sent on an interface after two collisions occur. |
|
The number of frames that are successfully sent on an interface after three collisions occur. |
|
The number of frames that are successfully sent on an interface after four collisions occur. |
|
The number of frames that are successfully sent on an interface after five collisions occur. |
|
The number of frames that are successfully sent on an interface after six collisions occur. |
|
The number of frames that are successfully sent on an interface after seven collisions occur. |
|
The number of frames that are successfully sent on an interface after eight collisions occur. |
|
The number of frames that are successfully sent on an interface after nine collisions occur. |
|
The number of frames that are successfully sent on an interface after ten collisions occur. |
|
The number of frames that are successfully sent on an interface after 11 collisions occur. |
|
The number of frames that are successfully sent on an interface after 12 collisions occur. |
|
The number of frames that are successfully sent on an interface after 13 collisions occur. |
|
The number of frames that are successfully sent on an interface after 14 collisions occur. |
|
The number of frames that are successfully sent on an interface after 15 collisions occur. |
|
The number of frames that could not be sent on an interface after 16 collisions occur. |
|
After a frame is sent, the number of frames dropped because late collisions were detected while the frame was sent. |
|
The number of frames dropped on an interface because the CFI4 bit is set. |
|
The number of frames that are not sent after the time exceeds the maximum-packet time. |
|
The total number of frames sent on an interface that are 64 bytes. |
|
The total number of frames sent on an interface that are from 65 to 127 bytes. |
|
The total number of frames sent on an interface that are from 128 to 255 bytes. |
|
The total number of frames sent on an interface that are from 256 to 511 bytes. |
|
The total number of frames sent on an interface that are from 512 to 1023 bytes. |
|
The total number of frames sent on an interface that are from 1024 to 1518 bytes. |
|
The number of frames sent on an interface that are larger than the maximum allowed frame size. |
|
The number of frames that are successfully sent on an interface after one collision occurs. This value does not include the number of frames that are not successfully sent after one collision occurs. |
|
|
|
---|---|
The total amount of memory (in bytes) used by frames received on an interface, including the FCS5 value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total number of frames successfully received on the interface that are directed to unicast addresses. |
|
The total number of frames successfully received on the interface that are directed to multicast addresses. |
|
The total number of frames successfully received on an interface that are directed to broadcast addresses. |
|
The total amount of memory (in bytes) used by unicast frames received on an interface, including the FCS value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total amount of memory (in bytes) used by multicast frames received on an interface, including the FCS value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total amount of memory (in bytes) used by broadcast frames received on an interface, including the FCS value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total number of frames received on an interface that have alignment errors. |
|
The total number of frames received on an interface that have a valid length (in bytes) but do not have the correct FCS values. |
|
The number of frames received on an interface that are larger than the maximum allowed frame size. |
|
The number of frames received on an interface that are smaller than 64 bytes. |
|
The total number of frames that are from 1024 to 1518 bytes. |
|
The total number of overrun frames received on an interface. |
|
The number of frames received on an interface that have symbol errors. |
|
The number of frames received that were larger than maximum allowed MTU6 size (including the FCS bits and excluding the frame header) and that have either an FCS error or an alignment error. |
|
The number of frames received on an interface that are larger than the maximum allowed frame size. |
|
The number of frames received that are smaller than 64 bytes (including the FCS bits and excluding the frame header) and that have either an FCS error or an alignment error. |
|
The number of frames received on an interface that are smaller than 64 bytes (or 68 bytes for VLAN-tagged frames) and that have valid FCS values. The frame size includes the FCS bits but excludes the frame header bits. |
|
The number of frames dropped on the ingress port because the packet aged out. |
|
The number of frames received on an interface that are larger than the maximum allowed frame size and have valid FCS values. The frame size includes the FCS value but does not include the VLAN tag. |
|
The total number of frames received on an interface that have a valid length (in bytes) but that do not have the correct FCS values. |
|
The total number of frames received on an interface that are dropped because the ingress queue is full. |
|
This is an example of output from the show controllers ethernet-controller phy command for a specific interface. Note that the last line of the display is the setting for Auto-MDIX for the interface.
This is an example of output from the show controllers ethernet-controller port-asic configuration command:
This is an example of output from the show controllers ethernet-controller port-asic statistics command:
Related Commands
show controllers tcam
Use the show controllers tcam privileged EXEC command to display the state of the registers for all ternary content addressable memory (TCAM) in the system and for all TCAM interface ASICs that are CAM controllers.
show controllers tcam [ asic [ number ]] [ detail ]
Syntax Description
(Optional) Display information for the specified port ASIC number. The range is from 0 to 15. |
|
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This display provides information that might be useful for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers tcam command:
Related Commands
show controllers utilization
Use the show controllers utilization user EXEC command to display bandwidth utilization on the switch or specific ports.
show controllers [ interface-id ] utilization
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show controllers utilization command.
This is an example of output from the show controllers utilization command on a specific port:
Related Commands
|
|
---|---|
show cpu traffic qos
Use the show cpu traffic qos command in user EXEC mode to display the QoS marking values for CPU-generated traffic.
Syntax Description
Defaults
Displays output the QoS marking values for all CPU-generated traffic.
Command Modes
Command History
|
|
---|---|
Examples
The following is sample output from the show cpu traffic qos command:
Related Commands
show diagnostic
Use the show diagnostic user EXEC command to display the online diagnostic test results and the supported test suites.
show diagnostic result [ test { name | test-id | test-id-range | all }] [ detail ]
show diagnostic switch [ detail ]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show diagnostic post command output is the same as the show post command output.
The show diagnostic result [ detail ] command output is the same as the show diagnostic switch [ detail ] command output.
Examples
This example shows how to display the diagnostic test IDs and attributes.
This example shows how to display the diagnostic test results for a switch. You can also use the show diagnostic switch command to display these results.
This example shows how to display the running tests in a switch:
This example shows how to display the online diagnostic test schedule for a switch:
This example shows how to display the detailed results for a switch. You can also use the show diagnostic result all detail command to display these results.
Related Commands
|
|
---|---|
Sets the scheduling of test-based online diagnostic testing. |
|
show dot1q-tunnel
Use the show dot1q-tunnel user EXEC command to display information about IEEE 802.1Q tunnel ports.
show dot1q-tunnel [ interface interface-id ]
This command is visible only when the switch is running the metro IP access or metro access image.
Syntax Description
(Optional) Specify the interface for which to display IEEE 802.1Q tunneling information. Valid interfaces include physical ports and port channels. |
Command Modes
Command History
|
|
---|---|
Examples
These are examples of output from the show dot1q-tunnel commands:
Related Commands
|
|
---|---|
show vlan dot1q tag native |
|
switchport mode dot1q-tunnel |
show dot1x
Use the show dot1x privileged EXEC command to display IEEE 802.1x statistics, administrative status, and operational status for the switch or for the specified port.
show dot1x [ all | interface interface-id | statistics interface interface-id ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you do not specify a port, global parameters and a summary appear. If you specify a port, details for that port appear.
Examples
This is an example of output from the show dot1x and the show dot1x all privileged EXEC commands:
This is an example of output from the show dot1x interface interface-id privileged EXEC command:
This is an example of output from the show dot1x statistics interface interface-id command. Table 2-11 describes the fields in the display.
Related Commands
|
|
---|---|
Resets the configurable IEEE 802.1x parameters to their default values. |
show env
Use the show env user EXEC command to display alarm contact, fan, temperature, and power information for the switch.
show env { alarm-contact | all | fan | power | temperature }
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show env alarm-contact command:
This is an example of output from the show env all command:
This is an example of output from the show env fan command:
This is an example of output from the show env power command when both DC inputs are expected but one is missing:
This is an example of output from the show env power command when one AC-power supply is present:
This is an example of output from the show env temperature command:
Related Commands
|
|
---|---|
show errdisable detect
Use the show errdisable detect user EXEC command to display error-disable detection status.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The Mode
column shows the shutdown mode that was configured for the error-disabled reason:
- port—The physical port is error disabled if a violation occurs.
- vlan—The virtual port is disabled if a violation occurs.
- port/vlan—Some ports are configured for physical port disable, and others are configured for virtual port disable. Enter the show running config privileged EXEC command to see the configuration for each port.
A displayed gbic-invalid
error in the Reason
column refers to an invalid small form-factor pluggable (SFP) interface.
Examples
This is an example of output from the show errdisable detect command:
Note Though visible in the output, the dtp-flap, ilpower, storm-control, and unicast-flood fields are not valid.
Related Commands
|
|
---|---|
Enables error-disable detection for a specific cause or all causes. |
|
show interfaces status |
Displays interface status or a list of interfaces in an error-disabled state. |
show errdisable flap-values
Use the show errdisable flap-values user EXEC command to display conditions that cause an error to be recognized for a cause.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The Flaps column in the display shows how many changes to the state within the specified time interval will cause an error to be detected and a port to be disabled. For example, the display shows that an error will be assumed and the port shut down if three Dynamic Trunking Protocol (DTP)-state (port mode access/trunk) or Port Aggregation Protocol (PAgP) flap changes occur during a 30-second interval, or if 5 link-state (link up/down) changes occur during a 10-second interval.
Note Although visible in the output display, the switch does not support DTP.
Examples
This is an example of output from the show errdisable flap-values command:
Related Commands
|
|
---|---|
Enables error-disable detection for a specific cause or all causes. |
|
show interfaces status |
Displays interface status or a list of interfaces in error-disabled state. |
show errdisable recovery
Use the show errdisable recovery user EXEC command to display the error-disable recovery timer information.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
A gbic-invalid error-disable reason refers to an invalid small form-factor pluggable (SFP) module interface.
Examples
This is an example of output from the show errdisable recovery command:
ErrDisable Reason Timer Status
----------------- --------------
udld Disabled
bpduguard Disabled
security-violatio Disabled
channel-misconfig Disabled
vmps Disabled
pagp-flap Disabled
dtp-flap Disabled
l2ptguard Disabled
link-flap Enabled
psecure-violation Disabled
gbic-invalid Disabled
dhcp-rate-limit Disabled
unicast-flood Disabled
storm-control Disabled
arp-inspection Disabled
loopback Disabled
Timer interval:300 seconds
Interfaces that will be enabled at the next timeout:
Interface Errdisable reason Time left(sec)
--------- ----------------- --------------
Gi0/2 link-flap 279
Note Though visible in the output, the unicast-flood and DTP fields are not valid.
Related Commands
|
|
---|---|
show interfaces status |
Displays interface status or a list of interfaces in error-disabled state. |
show etherchannel
Use the show etherchannel user EXEC command to display EtherChannel information for a channel.
show etherchannel [ channel-group-number { detail | port | port-channel | protocol | summary }] { detail | load-balance | port | port-channel | protocol | summary }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you do not specify a channel-group , all channel groups are displayed.
In the output, the Passive port list field is displayed only for Layer 3 port channels. This field means that the physical port, which is still not up, is configured to be in the channel group (and indirectly is in the only port channel in the channel group).
Note The switch must be running the metro IP access image to support Layer 3 ports.
Examples
This is an example of output from the show etherchannel 1 detail command:
This is an example of output from the show etherchannel 1 summary command:
This is an example of output from the show etherchannel 1 port-channel command:
This is an example of output from show etherchannel protocol command:
Related Commands
|
|
---|---|
show ethernet loopback
Use the show ethernet loopback privileged EXEC command to display information about per port Ethernet loopbacks configured on the switch or on an interface.
show ethernet loopback [ interface-id ]
Syntax Description
(Optional) Show loopback information for the specified interface. Only physical interfaces support Ethernet loopback. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you do not specify an interface-id , all configured loopbacks appear. The switch supports a maximum of two Ethernet loopback configurations.
Examples
This is an example of output from the show ethernet loopback command:
This is an example of output with both a port and a VLAN loopback session configured and started.
Related Commands
|
|
---|---|
show ethernet service evc
Use the show ethernet service evc privileged EXEC command to display information about Ethernet virtual connection (EVC) customer-service instances.
show ethernet service evc [ id evc-id | interface interface-id ] [ detail ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ethernet service evc command:
Related Commands
|
|
---|---|
ethernet evc evc-id |
show ethernet service instance
Use the show ethernet service instance privileged EXEC command to display information about Ethernet customer-service instances.
show ethernet service instance [ id id ] [ interface interface-id ] [ detail ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ethernet service instance command:
Related Commands
|
|
---|---|
service instance id ethernet |
Defines an Ethernet service instance and enters Ethernet service configuration mode. |
show ethernet service interface
Use the show ethernet service interface privileged EXEC command to display interface-based information about Ethernet customer-service instances for all interfaces or a specified interface.
show ethernet service interface [ interface-id ] [ detail ]
Syntax Description
(Optional) Display service-instance information for the specified interface. |
|
(Optional) Display detailed information about service instances on all interfaces or the specified interface. |
Command Modes
Command History
|
|
---|---|
Examples
These are examples of outputs from the show ethernet service interface commands:
Related Commands
|
|
---|---|
service instance id ethernet |
Defines an Ethernet service instance and enters Ethernet service configuration mode from interface configuration mode. |
show flowcontrol
Use the show flowcontrol user EXEC command to display the flow control status and statistics.
show flowcontrol [ interface interface-id | module number ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display the flow control status and statistics on the switch or for a specific interface.
Use the show flowcontrol command to display information about all the switch interfaces. The output from the show flowcontrol command is the same as the output from the show flowcontrol module number command.
Use the show flowcontrol interface interface-id command to display information about a specific interface.
Examples
This is an example of output from the show flowcontrol command.
This is an example of output from the show flowcontrol interface interface-id command:
Related Commands
|
|
---|---|
show idprom
Use the show idprom user EXEC command to display the IDPROM information for a Gigabit Ethernet interface.
show idprom { interface interface-id } [ detail ]
Syntax Description
Display the IDPROM information for the specified Gigabit Ethernet interface. |
|
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This command applies only to Gigabit Ethernet interfaces and displays information about SFPs inserted in the SFP module slot.
Examples
This is an example of output from the show idprom interface command for a Gigabit Ethernet interface:
Related Commands<output truncated>
Related CommandsPage 1 Registers
Related Commands-----------------------------------------------------------------------
Related Commands0000: 2100 Control Register : 0010 0001 0000 0000
Related Commands0001: 6141 Control STATUS : 0110 0001 0100 0001
Related Commands0002: 0141 Phy ID 1 : 0000 0001 0100 0001
Related Commands0003: 0C92 Phy ID 2 : 0000 1100 1001 0010
Related Commands0004: 0060 Auto-Negotiation Advertisement : 0000 0000 0110 0000
Related Commands0005: 0000 Auto-Negotiation Link Partner : 0000 0000 0000 0000
Related Commands0006: 0004 Auto-Negotiation Expansion Reg : 0000 0000 0000 0100
Related Commands0007: 2001 Next Page Transmit Register : 0010 0000 0000 0001
Related Commands0008: 0000 Link Partner Next page Registe : 0000 0000 0000 0000
Related Commands0009: 0000 1000BASE-T Control Register : 0000 0000 0000 0000
Related Commands000A: 0000 1000BASE-T Status Register : 0000 0000 0000 0000
Related Commands000F: 0000 Extended Status Register : 0000 0000 0000 0000
Related Commands0010: 0200 PHY Specific Control Register : 0000 0010 0000 0000
Related Commands0011: 0098 PHY Specific Status Register : 0000 0000 1001 1000
Related Commands0012: 0000 Interrupt Enable Register : 0000 0000 0000 0000
Related Commands0013: 0000 PHY Specific Status Register2 : 0000 0000 0000 0000
Related Commands0015: 0000 Receive Error Counter : 0000 0000 0000 0000
|
|
---|---|
Displays per-interface send and receive statistics read from the hardware, interface internal registers, or port ASIC information. |
show interfaces
Use the show interfaces privileged EXEC command to display the administrative and operational status of all interfaces or a specified interface.
show interfaces [ interface-id [ mtu ] | vlan vlan-id ] [ accounting | capabilities [ module number ] | counters | description | etherchannel | flowcontrol | private-vlan mapping | rep | stats | status [ err-disabled ] | switchport [ backup | module number ] | transceivers | trunk ]
Syntax Description
(Optional) Valid interfaces include physical ports (including type, module, and port number) and port channels. The port-channel range is 1 to 48. |
|
(Optional) Display the maximum transmission unit (MTU) size set on the interface. |
|
(Optional) Display accounting information on the interface, including active protocols and input and output packets and octets. |
|
(Optional) Display the capabilities of all interfaces or the specified interface, including the features and options that you can configure on the interface. Though visible in the command line help, this option is not available for VLAN IDs. |
|
(Optional) Display capabilities, switchport configuration, or transceiver characteristics (depending on preceding keyword) of all interfaces on the switch. The only valid module number is 1. This option is not available if you have entered a specific interface ID. |
|
(Optional) See the show interfaces counters command. |
|
(Optional) Display the administrative status and description set for an interface. |
|
(Optional) Display private-VLAN mapping information for the VLAN switch virtual interfaces (SVIs) and private VLAN promiscuous ports. A promiscuous port must be a network node interface (NNI). This keyword is visible only when the switch is running the metro access or metro IP access image. |
|
(Optional) See the show interfaces rep command. |
|
(Optional) Display the input and output packets by switching path for the interface. |
|
(Optional) Display the status of the interface. A status of unsupported in the Type field means that a non-Cisco small form-factor pluggable (SFP) module is inserted in the module slot. |
|
(Optional) Display the administrative and operational status of a switching (nonrouting) port, including port blocking and port protection settings. |
|
(Optional) Display Flex Link backup interface configuration and status for the specified interface or all interfaces on the switch. This keyword is visible only when the switch is running the metro access or metro IP access image. |
|
(Optional) See the show interfaces transceivers command. |
|
Display interface trunk information. If you do not specify an interface, only information for active trunking ports appears. |
Note Though visible in the command-line help strings, the rb, fair-queue, irb, mac-accounting, precedence, pruning random-detect, rate-limit, and shape keywords are not supported.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show interfaces capabilities command with different keywords has these results:
- Use the show interface capabilities module 1 to display the capabilities of all interfaces on the switch. Entering any other number is invalid.
- Use the show interfaces interface-id capabilities to display the capabilities of the specified interface.
- Use the show interfaces capabilities (with no module number or interface ID) to display the capabilities of all interfaces on the switch.
- Use the show interface switchport module 1 to display the switch port characteristics of all interfaces on the switch. Entering any other number is invalid.
Examples
This is an example of output from the show interfaces command for an interface:
This is an example of output from the show interfaces accounting command.
This is an example of output from the show interfaces capabilities command for an interface.
This is an example of output from the show interfaces interface description command when the interface has been described as Connects to Marketing by using the description interface configuration command.
This is an example of output from the show interfaces etherchannel command when port channels are configured on the switch:
This is an example of output from the show interfaces private-vlan mapping command when the private-VLAN primary VLAN is VLAN 10 and the secondary VLANs are VLANs 501 and 502:
This is an example of output from the show interfaces stats command for a specified VLAN interface.
This is an example of partial output from the show interfaces status command. It displays the status of all interfaces.
These are examples of output from the show interfaces status command for a specific interface when private VLANs are configured. Port 22 is configured as a private-VLAN host port. It is associated with primary VLAN 20 and secondary VLAN 25.
In this example, port 2 is configured as a private-VLAN promiscuous port. The display shows only the primary VLAN 20.
This is an example of output from the show interfaces status err-disabled command for an interface:
This is an example of output from the show interfaces switchport command for a single port. Table 2-12 describes the fields in the display.
Note Private VLAN trunks are not supported in this release, so those fields are not applicable.
This is an example of output from the show interfaces switchport command for a port configured as a private VLAN promiscuous port. The primary VLAN 20 is mapped to secondary VLANs 25, 30 and 35:
This is an example of out put from the show interfaces switchport backup command when a Flex Link interface goes down (LINK_DOWN), and VLANs preferred on this interface are moved to the peer interface of the Flex Link pair. In this example, if interface Gi0/6 goes down, Gi0/8 carries all VLANs of the Flex Link pair.
This is an example of output from the show interfaces swit chport backup command. In this example, VLANs 1 to 50, 60, and 100 to 120 are configured on the switch:
When both interfaces are up, G/0/8 forwards traffic for VLANs 60, 100 to 120, and Gi0/6 will forward traffic for VLANs 1 to 50.
When a Flex Link interface goes down (LINK_DOWN), VLANs preferred on this interface are moved to the peer interface of the Flex Link pair. In this example, if interface Gi0/6 goes down, Gi0/8 carries all VLANs of the Flex Link pair.
When a Flex Link interface comes up, VLANs preferred on this interface are blocked on the peer interface and moved to the forwarding state on the interface that has just come up. In this example, if interface Gi0/6 comes up, then VLANs preferred on this interface are blocked on the peer interface Gi0/8 and forwarded on Gi0/6.
This is an example of output from the show interfaces interface-id trunk command. It displays trunking information for the port.
Related Commands
show interfaces counters
Use the show interfaces counters privileged EXEC command to display various counters for the switch or for a specific interface.
show interfaces [ interface-id | vlan vlan-id ] counters [ errors | trunk ] [ module switch- number ] | etherchannel | protocol status ]
Syntax Description
Note Though visible in the command-line help string, the vlan vlan-id keyword is not supported.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you do not enter any keywords, all counters for all interfaces are included.
Examples
This is an example of partial output from the show interfaces counters command. It displays all counters for the switch.
This is an example of partial output from the show interfaces counters protocol status command for all interfaces.
This is an example of output from the show interfaces counters trunk command. It displays trunk counters for all interfaces.
Related Commands
|
|
---|---|
show interfaces rep
Use the show interfaces rep User EXEC command to display Resilient Ethernet Protocol (REP) configuration and status for a specified interface or for all interfaces.
show interfaces [ interface-id ] rep [ detail ]
Syntax Description
(Optional) Display REP configuration and status for a specified physical interface or port channel ID. |
|
(Optional) Display detailed REP configuration and status information. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
In the output for the show interface rep [ detail ] command, in addition to an Open, Fail, or AP (alternate port) state, the Port Role might show as Fail Logical Open ( FailLogOpen) or Fail No Ext Neighbor ( FailNoNbr). These states indicate that the port is physically up, but REP is not configured on the neighboring port. In this case, one port goes into a forwarding state for the data path to help maintain connectivity during configuration. The Port Role for this port shows as Fail Logical Open; the port forwards all data traffic on all VLANs. The other failed Port Role shows as Fail No Ext Neighbor; this port blocks traffic for all VLANs.
When the external neighbors for the failed ports are configured, the failed ports go through the alternate port state transitions and eventually go to an Open state or remain as the alternate port, based on the alternate port election mechanism.
In the show interfaces rep command output, ports configured as edge no-neighbors are designated with an asterisk (*) in front of Primary Edge or Secondary Edge. In the output of the show interfaces rep detail command, No-Neighbor is spelled out.
The output of this command is also included in the show tech-support privileged EXEC command output.
Examples
This is sample output from the show interface rep command:
This is sample output from the show interface rep command when the edge port is configured to have no REP neighbor. Note the asterisk (*) next to Primary Edge.
This is sample output from the show interface rep command when external neighbors are not configured:
This is sample output from the show interface rep detail command for a specified interface:
Related Commands
|
|
---|---|
Enables REP on an interface and assigns a segment ID. This command is also used to configure a port as an edge port, a primary edge port, or a preferred port. |
|
show rep topology [ detail ] |
Displays information about all ports in the segment, including which one was configured and selected as the primary edge port. |
show interfaces transceivers
Use the show interfaces transceivers privileged EXEC command to display the physical properties of a small form-factor pluggable (SFP) module interface.
show interfaces [ interface-id ] transceiver [ detail | module number | properties | supported-list | threshold-table ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The threshold values shown in the outputs from the show interfaces transceiver threshold-table and the show interfaces transceiver detail are not the same. The thresholds shown in the output from the show interfaces transceiver threshold-table command are hard-coded in Cisco IOS, but are not supported.
The thresholds shown in the output from the show interfaces transceiver detail command are read from the SFP EEPROM and are supported. You should always use the show interfaces transceiver detail command to view transceiver thresholds.
The DOM threshold provides a mechanism to send traps when parameters from the EEPROM exceed the thresholds. The firmware reads real-time values, including temperature, voltage, transmitted power and received power, from the SFP EEPROM and compares them against product alarm and warning thresholds. When transceiver traps are enabled, a trap is sent every 10 minutes when thresholds are exceeded.
The reading of entSensorThresholdTable and SNMP notification upon threshold violations in CISCO-ENTITY-SENSOR-MIB is supported only in Cisco IOS Release 12.2(52)SE and later.
Examples
This is an example of output from the show interfaces interface-id transceiver properties command:
This is an example of output from the show interfaces interface-id transceiver detail command:
This is an example of output from the show interfaces transceiver dom-supported-list command:
This is an example of output from the show interfaces transceiver threshold-table command. Note that these are thresholds programmed into IOS software, and are NOT used to determine alarms.
Related Commands
|
|
---|---|
show inventory
Use the show inventory user EXEC command to display product identification (PID) information for the hardware.
show inventory [ entity-name | raw ]
Syntax Description
(Optional) Display the specified entity. For example, enter the interface (such as gigabitethernet 0/x) into which a small form-factor pluggable (SFP) module is installed to display its identity. |
|
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The command is case sensitive. With no arguments, the show inventory command produces a compact display of all identifiable entities that have a product identifier. The display shows the entity location (slot identity), entity description, and the unique device identifier (UDI), including PID, version identifier (VID), and serial number (SN) of that entity.
Many legacy SFPs are not programmed with PIDs and VID.s
Note If there is no PID, no output appears when you enter the show inventory command.
For the product identifier (PID) and version identifier (VID) of SFP modules, the output of the show inventory user EXEC command displays either the correct information or displays Unspecified for the PID and nothing for the VID if the SFP module does not have PID and VID information.
Examples
This is example output from the show inventory command:
show ip arp inspection
Use the show ip arp inspection privileged EXEC command to display the configuration and the operating state of dynamic Address Resolution Protocol (ARP) inspection or the status of this feature for all VLANs or for the specified interface or VLAN.
show ip arp inspection [ interfaces [ interface-id ] | log | statistics [ vlan vlan-range ] | vlan vlan-rang e]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip arp inspection command
This is an example of output from the show ip arp inspection interfaces command:
This is an example of output from the show ip arp inspection interfaces interface-id command:
This is an example of output from the show ip arp inspection log command. It shows the contents of the log buffer before the buffers are cleared:
If the log buffer overflows, it means that a log event does not fit into the log buffer, and the display for the show ip arp inspection log privileged EXEC command is affected. A -- in the display appears in place of all data except the packet count and the time. No other statistics are provided for the entry. If you see this entry in the display, increase the number of entries in the log buffer, or increase the logging rate in the ip arp inspection log-buffer global configuration command.
This is an example of output from the show ip arp inspection statistics command. It shows the statistics for packets that have been processed by dynamic ARP inspection for all active VLANs.
For the show ip arp inspection statistics command, the switch increments the number of forwarded packets for each ARP request and response packet on a trusted dynamic ARP inspection port. The switch increments the number of ACL or DHCP permitted packets for each packet that is denied by source MAC, destination MAC, or IP validation checks, and the switch increments the appropriate failure count.
This is an example of output from the show ip arp inspection statistics vlan 5 command. It shows statistics for packets that have been processed by dynamic ARP for VLAN 5.
This is an example of output from the show ip arp inspection vlan 5 command. It shows the configuration and the operating state of dynamic ARP inspection for VLAN 5.
Related Commands
|
|
---|---|
show ip dhcp snooping
Use the show ip dhcp snooping user EXEC command to display the DHCP snooping configuration.
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip dhcp snooping command.
Related Commands
|
|
---|---|
show ip dhcp snooping binding
Use the show ip dhcp snooping binding user EXEC command to display the DHCP snooping binding database and configuration information for all interfaces on a switch.
show ip dhcp snooping binding [ ip-address ] [ mac-address ] [ interface interface-id ] [ vlan vlan-id ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show ip dhcp snooping binding command output shows only the dynamically configured bindings. Use the show ip source binding privileged EXEC command to display the dynamically and statically configured bindings in the DHCP snooping binding database.
If DHCP snooping is enabled and an interface changes to the down state, the switch does not delete the statically configured bindings.
Examples
This example shows how to display the DHCP snooping binding entries for a switch:
This example shows how to display the DHCP snooping binding entries for a specific IP address:
This example shows how to display the DHCP snooping binding entries for a specific MAC address:
This example shows how to display the DHCP snooping binding entries on a port:
This example shows how to display the DHCP snooping binding entries on VLAN 20:
Table 2-13 describes the fields in the show ip dhcp snooping binding command output:
Related Commands
|
|
---|---|
show ip dhcp snooping database
Use the show ip dhcp snooping database user EXEC command to display the status of the DHCP snooping binding database agent.
show ip dhcp snooping database [ detail ]
Syntax Description
(Optional) Display detailed status and statistics information. |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip dhcp snooping database command:
This is an example of output from the show ip dhcp snooping database detail command:
Related Commands
|
|
---|---|
Configures the DHCP snooping binding database agent or the binding file. |
|
show ip dhcp snooping statistics
Use the show ip dhcp snooping statistics user EXEC command to display DHCP snooping statistics in summary or detail form.
show ip dhcp snooping statistics [ detail ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip dhcp snooping statistics command:
This is an example of output from the show ip dhcp snooping statistics detail command:
Table 2-14 shows the DHCP snooping statistics and their descriptions:
Related Commands
|
|
---|---|
Clears the DHCP snooping binding database, the DHCP snooping binding database agent statistics, or the DHCP snooping statistics counters. |
show ip igmp profile
Use the show ip igmp profile privileged EXEC command to display all configured Internet Group Management Protocol (IGMP) profiles or a specified IGMP profile.
show ip igmp profile [ profile number ]
Syntax Description
(Optional) The IGMP profile number to be displayed. The range is 1 to 4294967295. If no profile number is entered, all IGMP profiles are displayed. |
Command Modes
Command History
|
|
---|---|
Examples
These are examples of output from the show ip igmp profile privileged EXEC command, with and without specifying a profile number. If no profile number is entered, the display includes all profiles configured on the switch.
Related Commands
|
|
---|---|
show ip igmp snooping
Use the show ip igmp snooping user EXEC command to display the Internet Group Management Protocol (IGMP) snooping configuration of the switch or the VLAN.
show ip igmp snooping [ groups | mrouter | querier [ vlan vlan-id ] [detail] ] [ vlan vlan-id ] [detail]
Syntax Description
(Optional) See the show ip igmp snooping groups command. |
|
(Optional) See the show ip igmp snooping mrouter command. |
|
(Optional) See the show ip igmp snooping querier command. |
|
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094 (available only in privileged EXEC mode). |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display snooping configuration for the switch or for a specific VLAN.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Although visible in the output display, output lines for source-only learning are not valid.
Examples
This is an example of output from the show ip igmp snooping vlan 1 command. It shows snooping characteristics for a specific VLAN.
Note Source-only learning are not supported, and information appearing for this feature is not valid.
This is an example of output from the show ip igmp snooping command. It displays snooping characteristics for all VLANs on the switch.
Related Commands
show ip igmp snooping groups
Use the show ip igmp snooping groups privileged EXEC command to display the Internet Group Management Protocol (IGMP) snooping multicast table for the switch or the multicast information. Use with the vlan keyword to display the multicast table for a specified multicast VLAN or specific multicast information.
show ip igmp snooping groups [count | dynamic [count] | user [count]]
show ip igmp snooping groups vlan vlan-id [ip_address | count | dynamic [ count ] | user [ count ]]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display multicast information or the multicast table.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Examples
This is an example of output from the show ip igmp snooping groups command without any keywords. It displays the multicast table for the switch.
This is an example of output from the show ip igmp snooping groups count command. It displays the total number of multicast groups on the switch.
This is an example of output from the show ip igmp snooping groups dynamic command. It shows only the entries learned by IGMP snooping.
This is an example of output from the show ip igmp snooping groups vlan vlan-id ip-address command. It shows the entries for the group with the specified IP address.
Related Commands
show ip igmp snooping mrouter
Use the show ip igmp snooping mrouter privileged EXEC command to display the Internet Group Management Protocol (IGMP) snooping dynamically learned and manually configured multicast router ports for the switch or for the specified multicast VLAN.
show ip igmp snooping mrouter [ vlan vlan-id ]
Syntax Description
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display multicast router ports on the switch or for a specific VLAN.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
When multicast VLAN registration (MVR) is enabled, the show ip igmp snooping mrouter command displays MVR multicast router information and IGMP snooping information.
Examples
This is an example of output from the show ip igmp snooping mrouter command. It shows how to display multicast router ports on the switch.
Related Commands
show ip igmp snooping querier
Use the show ip igmp snooping querier user EXEC command to display the IP address and incoming port for the Internet Group Management Protocol (IGMP) query most recently received by the switch.
show ip igmp snooping querier [ vlan vlan-id ] [detail]
Syntax Description
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094. |
|
(Optional) Display querier information as well as configuration and operational information pertaining to the querier. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show ip igmp snooping querier command to display the IGMP version and IP address of a detected device (also called a querier) that sends IGMP query message. A subnet can have multiple multicast routers but has only one IGMP querier. In a subnet running IGMPv2, one of the multicast routers is elected as the querier. The querier can be a Layer 3 switch.
The show ip igmp snooping querier command output also shows the VLAN and interface on which the querier was detected. If the querier is the switch, the output shows the Port field as Router. If the querier is a router, the output shows the port number on which the querier is learned in the Port field.
The show ip igmp snooping querier detail user EXEC command is similar to the show ip igmp snooping querier command. However, the show ip igmp snooping querier detail command displays the IP address of the most recent device detected by the switch querier along with this additional information:
Examples
This is an example of output from the show ip igmp snooping querier command:
This is an example of output from the show ip igmp snooping querier detail command:
Related Commands
|
|
---|---|
Enables and configures the IGMP snooping querier on the switch or on a VLAN. |
|
Displays IGMP snooping multicast router ports for the switch or for the specified multicast VLAN. |
show ip sla standards
Use the show ip sla standards command in user EXEC or privileged EXEC mode to display the Cisco IOS IP Service Level Agreements (SLAs) and Two-Way Active Measurement Protocol (TWAMP) standards implemented on the switch.
Syntax Description
Defaults
Displays the IP SLAs and TWAMP standards implemented on the switch.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show ip sla standards command to display the IP SLAs TWAMP standards implemented on the switch.
Examples
The following is sample output from the show ip sla standards command:
Related Commands
|
|
---|---|
show ip sla twamp connection {detail | requests} |
|
show ip sla twamp connection
Use the show ip sla twamp connection command in user EXEC mode to display the current Cisco IOS IP Service Level Agreements (SLAs) Two-Way Active Measurement Protocol (TWAMP) connections.
show ip sla twamp connection { detail [ source-ip ip-address ] | requests }
Syntax Description
(Optional) Display connection details from a specific TWAMP connection. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the detail keyword to display detailed information for a single IP SLAs TWAMP connection.
Use the requests keyword to display the current IP SLAs TWAMP connection requests.
Examples
The following is sample output from the show ip sla twamp connection detail command:
The following is sample output from the show ip sla twamp connection requests command:
Related Commands
|
|
---|---|
Displays the TWAMP server and reflector standards implemented on the switch. |
|
show ip sla twamp session
Use the show ip sla twamp session command in user EXEC mode to display Cisco IOS IP Service Level Agreements (SLAs) Two-Way Active Measurement Protocol (TWAMP) test sessions.
show ip sla twamp session [ source-ip ip address | source-port port-number ]
Syntax Description
(Optional) Display results from the TWAMP test session on the specified IP address. |
|
(Optional) Display results from the TWAMP test session on the specified port. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show ip sla twamp session command to display information about IP SLAs TWAMP test sessions.
Examples
The following is sample output from the show ip sla twamp session command:
Related Commands
|
|
---|---|
Displays the TWAMP server and reflector standards implemented on the switch. |
|
show ip sla twamp connection {detail | requests} |
show ip source binding
Use the show ip source binding user EXEC command to display the IP source bindings on the switch.
show ip source binding [ ip-address ] [ mac-address ] [ dhcp-snooping | static ] [ vlan vlan-id ] [ interface interface-id ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show ip source binding command output shows the dynamically and statically configured bindings in the DHCP snooping binding database. Use the show ip dhcp snooping binding privileged EXEC command to display only the dynamically configured bindings.
Examples
This is an example of output from the show ip source binding command:
Related Commands
|
|
---|---|
show ip verify source
Use the show ip verify source user EXEC command to display the IP source guard configuration on the switch or on a specific interface.
show ip verify source [ interface interface-id ]
Syntax Description
(Optional) Display IP source guard configuration on a specific interface. |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip verify source command:
In the previous example, this is the IP source guard configuration:
- On the Fast Ethernet 0/1 interface, dynamic host control protocol (DHCP) snooping is enabled on VLANs 10 to 20. For VLAN 10, IP source guard with IP address filtering is configured on the interface, and a binding is on the interface. For VLANs 11 to 20, the second entry shows that a default port access control list (ACL) is applied on the interface for the VLANs on which IP source guard is not configured.
- The Fast Ethernet 0/2 interface is configured as trusted for DHCP snooping.
- On the Fast Ethernet 0/3 interface, DHCP snooping is not enabled on the VLANs to which the interface belongs.
- On the Fast Ethernet 0/4 interface, IP source guard with source IP and MAC address filtering is enabled, and static IP source bindings are configured on VLANs 10 and 11. For VLANs 12 to 20, the default port ACL is applied on the interface for the VLANs on which IP source guard is not configured.
- On the Fast Ethernet 0/5 interface, IP source guard with source IP and MAC address filtering is enabled and configured with a static IP binding, but port security is disabled. The switch cannot filter source MAC addresses.
This is an example of output on an interface on which IP source guard is disabled:
Related Commands
|
|
---|---|
show ipc
Use the show ipc user EXEC command to display Interprocess Communications Protocol (IPC) configuration, status, and statistics.
show ipc { mcast { appclass | groups | status } | nodes | ports [ open ] | queue | rpc | session { all | rx | tx } [ verbose ] | status [ cumlulative ] | zones }
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This example shows how to display the IPC routing status:
This example shows how to display the participating nodes:
This example shows how to display the local IPC ports:
This example shows how to display the contents of the IPC retransmission queue:
This example shows how to display all the IPC session statistics:
This example shows how to display the status of the local IPC server:
Related Commands
|
|
---|---|
show ipv6 access-list
Use the show ipv6 access-list user EXEC command to display the contents of all current IPv6 access lists.
show ipv6 access-list [ access-list-name ]
Note This command is available only if you have configured a dual IPv4 and IPv6 Switch Database Management (SDM) template on the switch.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show ipv6 access-list command provides output similar to the show ip access-list command, except that it is IPv6-specific.
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | routing | vlan ) global configuration command, and reload the switch.
Examples
The following output from the show ipv6 access-list command shows IPv6 access lists named inbound :
Related Commands
show ipv6 dhcp conflict
Use the show ipv6 dhcp conflict privileged EXEC command to display address conflicts found by a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server when addresses are offered to the client.
Note This command is available only if the switch is running the metro IP access image and you have configured a dual IPv4 and IPv6 Switch Database Management (SDM) template on the switch.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | routing | vlan ) global configuration command, and reload the switch.
When you configure the DHCPv6 server to detect conflicts, it uses ping. The client uses neighbor discovery to detect clients and reports to the server through a DECLINE message. If an address conflict is detected, the address is removed from the pool, and the address cannot be assigned until it is removed from the conflict list.
Examples
This is an example of the output from the show ipv6 dhcp conflict command:
Related Commands
|
|
---|---|
Configures a DHCPv6 pool and enters DHCPv6 pool configuration mode. |
|
show ipv6 route updated
Use the show ipv6 route updated user EXEC command to display the current contents of the IPv6 routing table.
show ipv6 route [ protocol ] updated [ boot-up ] { hh:mm | day { month [ hh:mm] } [{ hh:mm | day { month [ hh:mm ]}]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show ipv6 route privileged EXEC command to display the current contents of the IPv6 routing table.
Examples
This is an example of output from the show ipv6 route updated rip command.
Related Commands
show l2protocol-tunnel
Use the show l2protocol-tunnel user EXEC command to display information about Layer 2 protocol tunnel ports. Displays information for interfaces with protocol tunneling enabled.
show l2protocol-tunnel [ interface interface-id ] [ summary ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
After enabling Layer 2 protocol tunneling on an access port, a trunk port, or an IEEE 802.1Q tunnel port by using the l2protocol-tunnel interface configuration command, you can configure some or all of these parameters:
If you enter the show l2protocol-tunnel [ interface interface-id ] command, only information about the active ports on which all the parameters are configured appears.
If you enter the show l2protocol-tunnel summary command, only information about the active ports on which some or all of the parameters are configured appears.
Examples
This is an example of output from the show l2protocol-tunnel command:
This is an example of output from the show l2protocol-tunnel summary command:
Related Commands
|
|
---|---|
Enables Layer 2 protocol tunneling for CDP, STP, or VTP packets on an interface. |
|
Configures a class of service (CoS) value for tunneled Layer 2 protocol packets. |
show lacp
Use the show lacp user EXEC command to display Link Aggregation Control Protocol (LACP) channel-group information.
show lacp [ channel-group-number ] { counters | internal | neighbor | sys-id }
Note LACP is available only on network node interfaces (NNIs) or enhanced network interfaces (ENIs).
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
You can enter any show lacp command to display the active channel-group information. To display specific channel information, enter the show lacp command with a channel-group number.
If you do not specify a channel group, information for all channel groups appears.
You can enter the channel-group-number option to specify a channel group for all keywords except sys-id.
Examples
This is an example of output from the show lacp counters user EXEC command. Table 2-16 describes the fields in the display.
This is an example of output from the show lacp internal command:
Table 2-17 describes the fields in the display.
This is an example of output from the show lacp neighbor command:
This is an example of output from the show lacp sys-id command:
The system identification is made up of the system priority and the system MAC address. The first two bytes are the system priority, and the last six bytes are the globally administered individual MAC address associated to the system.
Related Commands
|
|
---|---|
show link state group
Use the show link state group global configuration command to display the link-state group information.
show link state group [ number ] [ detail ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show link state group command to display the link-state group information. Enter this command without keywords to display information about all link-state groups. Enter the group number to display information specific to the group.
Enter the detail keyword to display detailed information about the group. The output for the show link state group detail command displays only those link-state groups that have link-state tracking enabled or that have upstream or downstream interfaces (or both) configured. If there is no link-state group configuration for a group, it is not shown as enabled or disabled.
Examples
This is an example of output from the show link state group 1 command:
This is an example of output from the show link state group detail command:
Upstream Interfaces : Gi0/15(Dwn) Gi0/16(Dwn)
Downstream Interfaces : Gi0/11(Dis) Gi0/12(Dis) Gi0/13(Dis) Gi0/14(Dis)
Upstream Interfaces : Gi0/15(Dwn) Gi0/16(Dwn) Gi0/17(Dwn)
Downstream Interfaces : Gi0/11(Dis) Gi0/12(Dis) Gi0/13(Dis) Gi0/14(Dis)
Related Commands
|
|
---|---|
show location
Use the show location user EXEC command to display location information for an endpoint.
show location civic-location { identifier id number | interface interface-id | static }
show location elin-location { identifier id number | interface interface-id | static }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show location command to display location information for an endpoint.
Examples
This is an example of output from the show location civic-location command that displays location information for an interface:
This is an example of output from the show location civic-location command that displays all the civic location information:
This is an example of output from the show location elin-location command that displays the emergency location information:
This is an example of output from the show location elin static command that displays all emergency location information:
Related Commands
|
|
---|---|
show logging onboard
Use the show logging onboard privileged EXEC command to display the on-board failure logging (OBFL) information.
show logging onboard [ module [ slot-number ]] {{ clilog | environment | message | temperature | uptime | voltage } [ continuous | detail | summary ] [ start hh:mm:ss day month year ] [ end hh:mm:ss day month year ]}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
When OBFL is enabled, the switch records all the OBFL data in a continuous, circular file. When the continuous file is full, the switch combines the data into a summary file, which is also known as a historical file. The switch then continues to write new data to the continuous file.
Use the start and end keywords to display data collected only during a particular time period. When specifying the start and end times, follow these guidelines:
- hh:mm:ss —Enter the time as a 2-digit number for a 24-hour clock. Make sure to use the colons (:). For example, enter 13:32:45.
- day —Enter the day of the month. The range is from 1 to 31.
- month —Enter the month in upper-case or lower-case letters. You can enter the full name of the month, such as January or august, or the first three letters of the month, such as jan or Aug.
- year —Enter the year as a 4-digit number, such as 2008. The range is from 1993 to 2035.
Examples
This is an example of output from the show logging onboard clilog continuous command:
This is an example of output from the show logging onboard message command:
This is an example of output from the show logging onboard status command:
This is an example of output from the show logging onboard temperature continuous command:
This is an example of output from the show logging onboard uptime summary command:
This is an example of output from the show logging onboard voltage summary command:
Related Commands
|
|
---|---|
show mac access-group
Use the show mac access-group user EXEC command to display the MAC access control lists (ACLs) configured for an interface or a switch.
show mac access-group [ interface interface-id ]
Syntax Description
(Optional) Display the MAC ACLs configured on a specific interface. Valid interfaces are physical ports and port channels; the port-channel range is 1 to 48 (available only in privileged EXEC mode). |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac-access group user EXEC command. In this display, Fast Ethernet interface 0/2 has the MAC access list macl_e1 applied to inbound traffic; no MAC ACLs are applied to other interfaces.
This is an example of output from the show mac access-group interface fastethernet0/1 command:
Related Commands
|
|
---|---|
show mac address-table
Use the show mac address-table user EXEC command to display a specific MAC address table static and dynamic entry or the MAC address table static and dynamic entries on a specific interface or VLAN.
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac address-table command:
Related Commands
|
|
---|---|
clear mac address-table dynamic |
Deletes from the MAC address table a specific dynamic address, all dynamic addresses on a particular interface, or all dynamic addresses on a particular VLAN. |
Displays the number of addresses present in all VLANs or the specified VLAN. |
|
Displays the MAC address table information for the specified interface. |
|
Displays the MAC address notification settings for all interfaces or the specified interface. |
|
Displays the MAC address table information for the specified VLAN. |
show mac address-table address
Use the show mac address-table address user EXEC command to display MAC address table information for the specified MAC address.
show mac address-table address mac-address [ interface interface-id ] [ vlan vlan-id ]
Syntax Description
(Optional) Display information for a specific interface. Valid interfaces include physical ports and port channels. |
|
(Optional) Display entries for the specific VLAN only. The range is 1 to 4094. |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac address-table address command:
Related Commands
show mac address-table aging-time
Use the show mac address-table aging-time user EXEC command to display the aging time of a specific address table instance, all address table instances on a specified VLAN or, if a specific VLAN is not specified, on all VLANs.
show mac address-table aging-time [ vlan vlan-id ]
Syntax Description
(Optional) Display aging time information for a specific VLAN. The range is 1 to 4094. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If no VLAN number is specified, the aging time for all VLANs appears.
Examples
This is an example of output from the show mac address-table aging-time command:
This is an example of output from the show mac address-table aging-time vlan 10 command:
Related Commands
show mac address-table count
Use the show mac address-table count user EXEC command to display the number of addresses present in all VLANs or the specified VLAN.
show mac address-table count [ vlan vlan-id ]
Syntax Description
(Optional) Display the number of addresses for a specific VLAN. The range is 1 to 4094. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If no VLAN number is specified, the address count for all VLANs appears.
Examples
This is an example of output from the show mac address-table count command:
Related Commands
show mac address-table dynamic
Use the show mac address-table dynamic user EXEC command to display only dynamic MAC address table entries.
show mac address-table dynamic [ address mac-address ] [ interface interface-id ] [ vlan vlan-id ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac address-table dynamic command:
Related Commands
|
|
---|---|
clear mac address-table dynamic |
Deletes from the MAC address table a specific dynamic address, all dynamic addresses on a particular interface, or all dynamic addresses on a particular VLAN. |
Displays MAC address table information for the specified MAC address. |
|
Displays the number of addresses present in all VLANs or the specified VLAN. |
|
Displays the MAC address table information for the specified interface. |
|
Displays the MAC address table information for the specified VLAN. |
show mac address-table interface
Use the show mac address-table interface user command to display the MAC address table information for the specified interface in the specified VLAN.
show mac address-table interface interface-id [ vlan vlan-id ]
Syntax Description
Specify an interface type; valid interfaces include physical ports and port channels. |
|
(Optional) Display entries for a specific VLAN; the range is 1 to 4094. |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac address-table interface command:
Related Commands
show mac address-table learning
Use the show mac address-table learning user EXEC command to display the status of MAC address learning for all VLANs or the specified VLAN.
show mac address-table learning [ vlan vlan-id ]
Syntax Description
(Optional) Display information for a specific VLAN. The range is 1 to 4094. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show mac address-table learning command without any keywords to display configured VLANs and whether MAC address learning is enabled or disabled on them. The default is that MAC address learning is enabled on all VLANs. Use the command with a specific VLAN ID to display the learning status on an individual VLAN.
Examples
This is an example of output from the show mac address-table learning user EXEC command showing that MAC address learning is disabled on VLAN 200:
Related Commands
|
|
---|---|
show mac address-table move update
Use the show mac address-table move update user EXEC command to display the MAC address-table move update information on the switch.
show mac address-table move update
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac address-table move update command:
Related Commands
|
|
---|---|
mac address-table move update { receive | transmit } |
show mac address-table notification
Use the show mac address-table notification user EXEC command to display the MAC address notification settings for all interfaces or the specified interface.
show mac address-table notification { change [ interface [ interface-id ] | mac-move | threshold }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show mac address-table notification change command without keywords to see if the MAC address change notification feature is enabled or disabled, the MAC notification interval, the maximum number of entries allowed in the history table, and the history table contents.
Use the interface keyword to display the notifications for all interfaces. If the interface-id is included, only the flags for that interface appear.
Examples
This is an example of output from the show mac address-table notification change command:
Related Commands
|
|
---|---|
clear mac address-table notification |
|
Displays MAC address table information for the specified MAC address. |
|
Displays the number of addresses present in all VLANs or the specified VLAN. |
|
Displays the MAC address table information for the specified interface. |
|
Displays the MAC address table information for the specified VLAN. |
show mac address-table static
Use the show mac address-table static user EXEC command to display only static MAC address table entries.
show mac address-table static [ address mac-address ] [ interface interface-id ] [ vlan vlan-id ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac address-table static command:
Switch> show mac address-table static
Related Commands
show mac address-table vlan
Use the show mac address-table vlan user EXEC command to display the MAC address table information for the specified VLAN.
show mac address-table vlan vlan-id
Syntax Description
(Optional) Display addresses for a specific VLAN. The range is 1 to 4094. |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mac address-table vlan 1 command:
Related Commands
show monitor
Use the show monitor user EXEC command to display information about all Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) sessions on the switch. Use the command with keywords to show a specific session, all sessions, all local sessions, or all remote sessions.
show monitor [ session { session_number | all | local | range list | remote } [ detail ]]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The output is the same for the show monitor command and the show monitor session all command.
Examples
This is an example of output for the show monitor user EXEC command:
This is an example of output for the show monitor user EXEC command for RSPAN source session 1:
This is an example of output for the show monitor session all user EXEC command when ingress traffic forwarding is enabled:
Related Commands
|
|
---|---|
show mvr
Use the show mvr privileged EXEC command without keywords to display the current Multicast VLAN Registration (MVR) global parameter values, including whether or not MVR is enabled, the MVR multicast VLAN, the maximum query response time, the number of multicast groups, and the MVR mode (dynamic or compatible).
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show mvr command:
In the preceding display, the maximum number of multicast groups is fixed at 256. The MVR mode is either compatible (for interoperability with Catalyst 2900 XL and Catalyst 3500 XL switches) or dynamic (where operation is consistent with IGMP snooping operation and dynamic MVR membership on source ports is supported).
Related Commands
show mvr interface
Use the show mvr interface privileged EXEC command without keywords to display the Multicast VLAN Registration (MVR) receiver and source ports. Use the command with keywords to display MVR parameters for a specific receiver port.
show mvr interface [ interface-id [ members [ vlan vlan-id ]]]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If the entered port identification is a non-MVR port or a source port, the command returns an error message. For receiver ports, it displays the port type, per port status, and Immediate-Leave setting.
If you enter the show mvr interface interface-id command and the specified port is a non-MVR port, the output displays NON MVR in the Type field. For active MVR ports, it displays the port type (RECEIVER or SOURCE), mode (access or trunk), VLAN, status, and Immediate-Leave setting.
If you enter the members keyword, all MVR group members on the interface appear.
Examples
This is an example of output from the show mvr interface command:
Fa0/1 Receiver Trunk 2000 ACTIVE/DOWN DISABLED
Fa0/2 Receiver Trunk 2 ACTIVE/UP DISABLED
Fa0/2 Receiver Trunk 3000 ACTIVE/UP DISABLED
Fa0/3 Receiver Trunk 2 ACTIVE/UP DISABLED
Fa0/3 Receiver Trunk 3000 ACTIVE/UP DISABLED
Fa0/10 Source Access 10 ACTIVE/UP DISABLED
In the preceding display, Status is defined as follows:
- Active means the port is part of a VLAN.
- Up/Down means that the port is forwarding/nonforwarding.
- Inactive means that the port is not yet part of any VLAN.
This is an example of output from the show mvr interface fastethernet0/10 command:
This is an example of output from the show mvr interface fastethernet0/1 command. In this example, the port is not an MVR member:
This is an example of output from the show mvr interface gigabitethernet0/1 members command:
Related Commands
|
|
---|---|
Enables and configures multicast VLAN registration on the switch. |
|
Displays all receiver ports that are members of an MVR multicast group. |
show mvr members
Use the show mvr members privileged EXEC command to display all receiver and source ports that are currently members of an IP multicast group.
show mvr members [ ip-address ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show mvr members command applies to receiver and source ports. For MVR-compatible mode, all source ports are members of all multicast groups.
Examples
This is an example of output from the show mvr members command:
This is an example of output from the show mvr members 239.255.0.2 command. It shows how to view the members of the IP multicast group 239.255.0.2:
Related Commands
show pagp
Use the show pagp user EXEC command to display Port Aggregation Protocol (PAgP) channel-group information.
show pagp [ channel-group-number ] { counters | internal | neighbor }
Note PAgP is available only on network node interfaces (NNIs) or enhanced network interfaces (ENIs).
Syntax Description
(Optional) Number of the channel group. The range is 1 to 48. |
|
Command Modes
Command History
|
---|