Table Of Contents
show ip sctp association parameters
show ip sctp association statistics
sctp
To enter the Stream Control Transmission Protocol (SCTP) configuration, use the sctp command in IDSN User Adaptation Layer (IUA) configuration mode. To disable, use the no form of this command.
sctp [[t1-init milliseconds] [t3-rtx-min seconds] [t3-rtx-max milliseconds] [startup-rtx number] [assoc-rtx number] [path-rtx number]]
no sctp
Syntax Description
Command Default
No default behavior or values.
Command Modes
IUA configuration (config-iua)
Command History
Usage Guidelines
To enter SCTP configuration commands, you must first enter IUA configuration mode and then enter sctp at the Router(config-iua)# prompt to enter SCTP configuration mode.
Examples
The following example shows how to enter IUA configuration mode:
Router# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# iuaRouter(config-iua)#The following is an example of how to set failover time (in milliseconds) between 1 and 10 seconds as part of SCTP configuration of the T1 initiation timer. This example uses the lowest failover timer value allowed (1 second):
Router(config-iua)# as as5400-3 fail-over 1000The following is an example of how to set SCTP maximum startup retransmission interval. This example uses the maximum startup retransmission interval value allowed:
Router(config-iua)# as as5400-3 sctp-startup 20The following is an example of how to configure the number of SCTP streams for this AS. This example uses the maximum SCTP streams allowed:
Router(config-iua)# as as5400-3 sctp-streams 57The following is an example of how to configure the SCTP T1 initiation timer (in milliseconds). This example uses the maximum timer value allowed:
Router(config-iua)# as as5400-3 sctp-t1init 60000Related Commands
serverfarm
To associate an IPv4 server farm with a virtual server, and optionally configure an IPv4 backup server farm, an IPv6 server farm and backup server farm, and specify that sticky connections are to be used in the IPv4 backup server farm, use the serverfarm command in SLB virtual server configuration mode. To remove the server farm association from the virtual server configuration, use the no form of this command.
serverfarm primary-farm [backup backup-farm [sticky]] [ipv6-primary ipv6-primary-farm [ipv6-backup ipv6-backup-farm]] [map map-id priority priority]
no serverfarm primary-farm [backup backup-farm [sticky]] [ipv6-primary ipv6-primary-farm [ipv6-backup ipv6-backup-farm]] [map map-id priority priority]
Syntax Description
Command Default
No real server farm is associated with a virtual server.
If backup backup-farm is not specified, no IPv4 backup server farm is configured.
If backup backup-farm is specified but the sticky keyword is not specified, sticky connections are not used in the IPv4 backup server farm.
If ipv6-primary ipv6-primary-farm is not specified, no dual-stack backup server farm is configured.
If ipv6-backup ipv6-backup-farm is not specified, no dual-stack backup server farm is configured.Command Modes
SLB virtual server configuration (config-slb-vserver)
Command History
Usage Guidelines
RADIUS load balancing and the Home Agent Director do not support the sticky keyword.
You can associate more than one server farm with a given virtual server by configuring more than one serverfarm command, each with a unique map ID and a unique priority. (That is, each map ID and each map priority must be unique across all server farms associated with the virtual server.)
For GPRS load balancing, if a real server is defined in two or more server farms, each server farm must be associated with a different virtual server.
IOS SLB supports dual-stack addresses for GTP load balancing only.
All IPv4 or IPv6 server farms that are associated with the same virtual server must have the same NAT configuration.
If you associate a primary server farm with a backup server farm, then all of the server farm maps that use that primary server farm must also be configured to use that same backup serverfarm. You cannot configure a server farm map that uses that primary server farm and no backup server farm.
•For example, if you configure primary server farm SF1 with backup server farm SF2, then all of the server farm maps that are configured with SF1 as the primary serverfarm must also be configured with SF2 as the backup serverfarm, as follows:
ip slb vserver RADIUSvirtual 2.2.2.2 udp 0 service radiusserverfarm SF1 backup SF2 map 1 priority 1serverfarm SF1 backup SF2inservice•Furthermore, if you configure primary server farm SF1 with backup server farm SF2, you cannot then configure a server farm map to use SF1 as the primary server farm with no backup server farm. That is, the following is not allowed:
ip slb vserver RADIUSvirtual 2.2.2.2 udp 0 service radiusserverfarm SF1 map 1 priority 1serverfarm SF1 backup SF2inservice•The backup server farm associated with an IOS SLB protocol map cannot be associated as a backup server farm with any other map in a given virtual server.
Examples
The following example shows how the ip slb vserver, virtual, and serverfarm commands are used to associate the real server farm named PUBLIC with the virtual server named PUBLIC_HTTP.
Router(config)# ip slb vserver PUBLIC_HTTP
Router(config-slb-vserver)# virtual 10.0.0.1 tcp www
Router(config-slb-vserver)# serverfarm PUBLIC
Related Commands
service-module ip redundancy
To link the primary HSRP interface status to that of the satellite interface, use the service-module ip redundancy command in satellite interface configuration mode. To remove the link between the primary HSRP interface status and the satellite interface status, use the no form of this command.
service-module ip redundancy group-name
no service-module ip redundancy group-name
Syntax Description
group-name
Name of the hot standby group. This name must match the hot standby group name configured for the primary HSRP interface, which is typically an Ethernet interface.
Defaults
HSRP is disabled.
Command Modes
Satellite interface configuration (config-if)
Command History
Usage Guidelines
Use the service-module ip redundancy command only when you have two Cisco IP VSAT satellite WAN network modules (NM-1VSAT-GILAT) on separate HSRP-redundant routers that connect to the same outdoor unit (ODU).
This command enables the satellite interface to spoof the line protocol UP state.
Examples
The following example shows how to link the primary HSRP interface status to that of the satellite interface:
service-module ip redundancy grp-hsrpRelated Commands
show debugging
To display information about the types of debugging that are enabled for your router, use the show debugging command in privileged EXEC mode.
show debugging
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Examples
The following is sample output from the show debugging command. In this example, the remote host is not configured or connected.
Router# show debugging
!TCP:TCP Packet debugging is onTCP ECN debugging is on!Router# telnet 10.1.25.234
!Trying 10.1.25.234 ...!00:02:48: 10.1.25.31:11001 <---> 10.1.25.234:23 out ECN-setup SYN00:02:48: tcp0: O CLOSED 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 ECE CWR SYN WIN 412800:02:50: 10.1.25.31:11001 <---> 10.1.25.234:23 congestion window changes00:02:50: cwnd from 1460 to 1460, ssthresh from 65535 to 292000:02:50: tcp0: R SYNSENT 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 ECE CWR SYN WIN 412800:02:54: 10.1.25.31:11001 <---> 10.1.25.234:23 congestion window changes00:02:54: cwnd from 1460 to 1460, ssthresh from 2920 to 292000:02:54: tcp0: R SYNSENT 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 ECE CWR SYN WIN 412800:03:02: 10.1.25.31:11001 <---> 10.1.25.234:23 congestion window changes00:03:02: cwnd from 1460 to 1460, ssthresh from 2920 to 292000:03:02: tcp0: R SYNSENT 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 ECE CWR SYN WIN 412800:03:18: 10.1.25.31:11001 <---> 10.1.25.234:23 SYN with ECN disabled00:03:18: 10.1.25.31:11001 <---> 10.1.25.234:23 congestion window changes00:03:18: cwnd from 1460 to 1460, ssthresh from 2920 to 292000:03:18: tcp0: O SYNSENT 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 SYN WIN 412800:03:20: 10.1.25.31:11001 <---> 10.1.25.234:23 congestion window changes00:03:20: cwnd from 1460 to 1460, ssthresh from 2920 to 292000:03:20: tcp0: R SYNSENT 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 SYN WIN 412800:03:24: 10.1.25.31:11001 <---> 10.1.25.234:23 congestion window changes00:03:24: cwnd from 1460 to 1460, ssthresh from 2920 to 292000:03:24: tcp0: R SYNSENT 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 SYN WIN 412800:03:32: 10.1.25.31:11001 <---> 10.1.25.234:23 congestion window changes00:03:32: cwnd from 1460 to 1460, ssthresh from 2920 to 292000:03:32: tcp0: R SYNSENT 10.1.25.234:11001 10.1.25.31:23 seq 1922220018OPTS 4 SYN WIN 4128!Connection timed out; remote host not respondingThe following is sample output from the show debugging command when user-group debugging is configured:
Router# show debugging
!usergroup:Usergroup Deletions debugging is onUsergroup Additions debugging is onUsergroup Database debugging is onUsergroup API debugging is on!
The following is sample output from the show debugging command when SNAP debugging is configured:
Router# show debugging
Persistent variable debugging is currently All
SNAP Server Debugging ON
SNAP Client Debugging ON
Router#
Table 3 describes the significant fields in the output.
show fm slb counters
To display information about the Feature Manager (FM) IOS Server Load Balancing (IOS SLB) counters, use the show fm slb counters command in privileged EXEC mode.
show fm slb counters
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Examples
The following sample output from the show fm slb counters command shows counter information for virtual server 10.11.11.11:
Router# show fm slb counters
FM SLB Purge Counters:Global Purges: 0TCP Purges: 0UDP Purges: 0Virtual Purges: 0Flow Purges: 0FM SLB Netflow Install Counters[Slot 6 ] Install Request Sent 3Table 4 describes the fields shown in the display.
Related Commands
Command Descriptionclear fm slb counters
Clears Feature Manager (FM) IOS Server Load Balancing (IOS SLB) counters.
show glbp
To display Gateway Load Balancing Protocol (GLBP) information, use the show glbp command in privileged EXEC mode.
show glbp [capability [interface-type interface-number ]] | [[interface-type interface-number [group-number] [state] [brief] [detail] [client-cache [[age number] [forwarder number]] | [mac-address address] | [summary]]]
Syntax Description
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
Use the show glbp command to display information about GLBP groups on a router. The brief keyword displays a single line of information about each virtual gateway or virtual forwarder. The client-cache keyword displays the client cache details and the capability keyword displays all GLBP-capable interfaces.
Examples
The following is sample output from the show glbp command:
Router# show glbpFastEthernet0/0 - Group 10State is Active2 state changes, last state change 23:50:33Virtual IP address is 10.21.8.10Hello time 5 sec, hold time 18 secNext hello sent in 4.300 secsRedirect time 600 sec, forwarder time-out 7200 secAuthentication MD5, key-stringPreemption enabled, min delay 60 secActive is localStandby is unknownPriority 254 (configured)Weighting 105 (configured 110), thresholds: lower 95, upper 105Track object 2 state Down decrement 5Load balancing: host-dependentThere is 1 forwarder (1 active)Forwarder 1State is Active1 state change, last state change 23:50:15MAC address is 0007.b400.0101 (default)Owner ID is 0005.0050.6c08Redirection enabledPreemption enabled, min delay 60 secActive is local, weighting 105The following is sample output from the show glbp command with the brief keyword specified:
Router# show glbp briefInterface Grp Fwd Pri State Address Active router Standby routerFa0/0 10 - 254 Active 10.21.8.10 local unknownFa0/0 10 1 7 Active 0007.b400.0101 local -The following is sample output from the show glbp command that displays GLBP group 10:
Router# show glbp 10FastEthernet0/0 - Group 10State is Active2 state changes, last state change 23:50:33Virtual IP address is 10.21.8.10Hello time 5 sec, hold time 18 secNext hello sent in 4.300 secsRedirect time 600 sec, forwarder time-out 7200 secAuthentication MD5, key-stringPreemption enabled, min delay 60 secActive is localStandby is unknownPriority 254 (configured)Weighting 105 (configured 110), thresholds: lower 95, upper 105Track object 2 state Down decrement 5Load balancing: host-dependentThere is 1 forwarder (1 active)Forwarder 1State is Active1 state change, last state change 23:50:15MAC address is 0007.b400.0101 (default)Owner ID is 0005.0050.6c08Redirection enabledPreemption enabled, min delay 60 secActive is local, weighting 105The following output shows that the redundancy name has been assigned to the "glbp1" group:
Router# show glbp ethernet0/1 1
Ethernet0/1 - Group 1
State is Listen
64 state changes, last state change 00:00:54
Virtual IP address is 10.1.0.7
Hello time 50 msec, hold time 200 msec
Next hello sent in 0.030 secs
Redirect time 600 sec, forwarder time-out 14400 sec
Authentication text, string "authword"Preemption enabled, min delay 0 sec
Active is 10.1.0.2, priority 105 (expires in 0.184 sec)
Standby is 10.1.0.3, priority 100 (expires in 0.176 sec)
Priority 96 (configured)
Weighting 100 (configured 100), thresholds: lower 95, upper 100
Track object 1 state Up decrement 10
Load balancing: round-robin
IP redundancy name is "glbp1"
Group members:
0004.4d83.4801 (10.0.0.0)
0010.7b5a.fa41 (10.0.0.1)
00d0.bbd3.bc21 (10.0.0.2) local
The following output shows GLBP support for SSO mode on an active RP:
Router# show glbpEthernet0/0 - Group 1State is Standby1 state change, last state change 00:00:20Virtual IP address is 172.24.1.254Hello time 3 sec, hold time 10 secNext hello sent in 0.232 secsRedirect time 600 sec, forwarder time-out 14400 secPreemption disabledActive is 172.24.1.2, priority 100 (expires in 7.472 sec)Standby is localPriority 100 (default)Weighting 100 (default 100), thresholds: lower 1, upper 100Load balancing: round-robinGroup members:aabb.cc00.0100 (172.24.1.1) localaabb.cc00.0200 (172.24.1.2)There are 2 forwarders (1 active)Forwarder 1State is ListenMAC address is 0007.b400.0101 (learnt)Owner ID is aabb.cc00.0200Time to live: 14397.472 sec (maximum 14400 sec)Preemption enabled, min delay 30 secActive is 172.24.1.2 (primary), weighting 100 (expires in 9.540 sec)Forwarder 2State is Active1 state change, last state change 00:00:28MAC address is 0007.b400.0102 (default)Owner ID is aabb.cc00.0100Preemption enabled, min delay 30 secActive is local, weighting 100The following output shows GLBP support for SSO mode on a standby RP:
RouterRP-standby# show glbpEthernet0/0 - Group 1State is Init (standby RP, peer state is Standby)Virtual IP address is 172.24.1.254Hello time 3 sec, hold time 10 secRedirect time 600 sec, forwarder time-out 14400 secPreemption disabledActive is unknownStandby is unknownPriority 100 (default)Weighting 100 (default 100), thresholds: lower 1, upper 100Load balancing: round-robinGroup members:aabb.cc00.0100 (172.24.1.1) localaabb.cc00.0200 (172.24.1.2)There are 2 forwarders (0 active)Forwarder 1State is Init (standby RP, peer state is Listen)MAC address is 0007.b400.0101 (learnt)Owner ID is aabb.cc00.0200Preemption enabled, min delay 30 secActive is unknownForwarder 2State is Init (standby RP, peer state is Active)MAC address is 0007.b400.0102 (default)Owner ID is aabb.cc00.0100Preemption enabled, min delay 30 secActive is unknownGLBP support for Stateful Switchover (SSO) mode is enabled by default but may be disabled by the no glbp sso command. If GLBP support for SSO mode is disabled, the output of the show glbp command on the standby RP will display a warning:
RouterRP-standby# show glbpEthernet0/0 - Group 1State is Init (GLBP SSO disabled) <------ GLBP SSO is disabled.
Virtual IP address is 172.24.1.254Hello time 3 sec, hold time 10 secRedirect time 600 sec, forwarder time-out 14400 secPreemption disabledActive is unknownStandby is unknownPriority 100 (default)Weighting 100 (default 100), thresholds: lower 1, upper 100Load balancing: round-robinGroup members:aabb.cc00.0100 (172.24.1.1) localThere are 2 forwarders (0 active)Forwarder 1State is Init (GLBP SSO disabled)MAC address is 0007.b400.0101 (learnt)Owner ID is aabb.cc00.0200Preemption enabled, min delay 30 secActive is unknownForwarder 2State is Init (GLBP SSO disabled)MAC address is 0007.b400.0102 (default)Owner ID is aabb.cc00.0100Preemption enabled, min delay 30 secActive is unknownTable 5 describes the significant fields shown in the displays.
Related Commands
show interface mac
To display MAC accounting information for interfaces configured for MAC accounting, use the show interface mac command in user EXEC or privileged EXEC mode.
show interface [type number] mac
Syntax Description
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Usage Guidelines
The show interface mac command displays information for one interface, when specified, or all interfaces configured for MAC accounting.
For incoming packets on the interface, the accounting statistics are gathered before the committed access rate (CAR)/distributed committed access rate (DCAR) functionality is performed on the packet. For outgoing packets on the interface, the accounting statistics are gathered after the CAR output, and before DCAR output or distributed weighted random early detection (DWRED) or distributed weighted fair queuing (DWFQ) functionality is performed on the packet.
Therefore, if DCAR or DWRED is performed on the interface and packets are dropped, the dropped packets are still counted in the show interface mac command.
The maximum number of MAC addresses that can be stored for the input and output addresses is 512 each. After the maximum is reached, subsequent MAC addresses are ignored.
To clear the accounting statistics, use the clear counter EXEC command. To configure an interface for IP accounting based on the MAC address, use the ip accounting mac-address interface configuration command.
Examples
The following is sample output from the show interface mac command:
Router# show interface ethernet 0/1/1 macEthernet0/1/1Input (511 free)0007.f618.4449(228): 4 packets, 456 bytes, last: 2684ms agoTotal: 4 packets, 456 bytesOutput (511 free)0007.f618.4449(228): 4 packets, 456 bytes, last: 2692ms agoTotal: 4 packets, 456 bytesTable 6 describes the significant fields shown in the display.
Related Commands
Command Descriptionip accounting mac-address
Enables IP accounting on any interface based on the source and destination MAC address.
show interface precedence
To display precedence accounting information for interfaces configured for precedence accounting, use the show interface precedence command in user EXEC or privileged EXEC mode.
show interface [type number] precedence
Syntax Description
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Usage Guidelines
The show interface precedence command displays information for one interface, when specified, or all interfaces configured for IP precedence accounting.
For incoming packets on the interface, the accounting statistics are gathered before the committed access rate (CAR)/distributed committed access rate (DCAR) functionality is performed on the packet. For outgoing packets on the interface, the accounting statistics are gathered after the CAR output, and before DCAR output or distributed weighted random early detection (DWRED) or distributed weighted fair queuing (DWFQ) functionality is performed on the packet. Therefore, if DCAR or DWRED is performed on the interface and packets are dropped, the dropped packets are still counted in the show interface mac command.
To clear the accounting statistics, use the clear counter EXEC command.
To configure an interface for IP accounting based on IP precedence, use the ip accounting precedence interface configuration command.
Examples
The following is sample output from the show interface precedence command. In this example, the total packet and byte counts are calculated for the interface that receives (input) or sends (output) IP packets and sorts the results based on IP precedence.
Router# show interface ethernet 0/1/1 precedenceEthernet0/1/1InputPrecedence 0: 4 packets, 456 bytesOutputPrecedence 0: 4 packets, 456 bytesTable 7 describes the fields shown in the display.
Related Commands
Command Descriptionip accounting precedence
Enables IP accounting on any interface based on IP precedence.
show ip accounting
To display the active accounting or checkpointed database or to display access list violations, use the show ip accounting command in user EXEC or privileged EXEC mode.
show ip accounting [checkpoint] [output-packets | access-violations]
Syntax Description
Defaults
If neither the output-packets nor access-violations keyword is specified, the show ip accounting command displays information pertaining to packets that passed access control and were routed.
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Usage Guidelines
If you do not specify any keywords, the show ip accounting command displays information about the active accounting database.
To display IP access violations, you must use the access-violations keyword. If you do not specify the keyword, the command defaults to displaying the number of packets that have passed access lists and were routed.
To use this command, you must first enable IP accounting on a per-interface basis.
Examples
The following is sample output from the show ip accounting command:
Router# show ip accountingSource Destination Packets Bytes172.16.19.40 192.168.67.20 7 306172.16.13.55 192.168.67.20 67 2749172.16.2.50 192.168.33.51 17 1111172.16.2.50 172.31.2.1 5 319172.16.2.50 172.31.1.2 463 30991172.16.19.40 172.16.2.1 4 262172.16.19.40 172.16.1.2 28 2552172.16.20.2 172.16.6.100 39 2184172.16.13.55 172.16.1.2 35 3020172.16.19.40 192.168.33.51 1986 95091172.16.2.50 192.168.67.20 233 14908172.16.13.28 192.168.67.53 390 24817172.16.13.55 192.168.33.51 214669 9806659172.16.13.111 172.16.6.23 27739 1126607172.16.13.44 192.168.33.51 35412 1523980192.168.7.21 172.163.1.2 11 824172.16.13.28 192.168.33.2 21 1762172.16.2.166 192.168.7.130 797 141054172.16.3.11 192.168.67.53 4 246192.168.7.21 192.168.33.51 15696 695635192.168.7.24 192.168.67.20 21 916172.16.13.111 172.16.10.1 16 1137accounting threshold exceeded for 7 packets and 433 bytesThe following is sample output from the show ip accounting access-violations command. The output pertains to packets that failed access lists and were not routed:
Router# show ip accounting access-violationsSource Destination Packets Bytes ACL172.16.19.40 192.168.67.20 7 306 77172.16.13.55 192.168.67.20 67 2749 185172.16.2.50 192.168.33.51 17 1111 140172.16.2.50 172.16.2.1 5 319 140172.16.19.40 172.16.2.1 4 262 77Accounting data age is 41Table 8 describes the significant fields shown in the displays.
Related Commands
show ip casa affinities
To display statistics about affinities, use the show ip casa affinities command in user EXEC or privileged EXEC mode.
show ip casa affinities [daddr ip-address | detail | dport destination-port | protocol protocol-number | saddr ip-address | sport source-port] [detail | internal]
Syntax Description
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Examples
The following is sample output of the show ip casa affinities command:
Router# show ip casa affinitiesAffinity TableSource Address Port Dest Address Port Prot172.16.36.118 1118 172.16.56.13 19 TCP172.16.56.13 19 172.16.36.118 1118 TCPThe following is sample output of the show ip casa affinities detail command:
Router# show ip casa affinities detailAffinity TableSource Address Port Dest Address Port Prot172.44.36.118 1118 172.16.56.13 19 TCPAction Details:Interest Addr: 172.16.56.19 Interest Port: 1638Interest Packet: 0x0102 SYN FRAGInterest Tickle: 0x0005 FIN RSTDispatch (Layer 2): YES Dispatch Address: 172.26.56.33Source Address Port Dest Address Port Prot172.16.56.13 19 172.16.36.118 1118 TCPAction Details:Interest Addr: 172.16.56.19 Interest Port: 1638Interest Packet: 0x0104 RST FRAGInterest Tickle: 0x0003 FIN SYNDispatch (Layer 2): NO Dispatch Address: 10.0.0.0Table 9 describes the significant fields shown in the display.
Related Commands
show ip casa oper
To display operational information about the forwarding agent, use the show ip casa oper command in user EXEC or privileged EXEC mode.
show ip casa oper
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Examples
The following is sample output from the show ip casa oper command:
Router# show ip casa operCasa is ActiveCasa control address is 10.10.20.34/32Casa multicast address is 239.1.1.1Listening for wildcards on:Port:1637Current passwd:NONE Pending passwd:NONEPasswd timeout:180 sec (Default)Table 10 describes the significant fields shown in the display.
Related Commands
show ip casa stats
To display statistical information about the Forwarding Agent, use the show ip casa stats command in user EXEC or privileged EXEC mode.
show ip casa stats
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Examples
The following is sample output of the show ip casa stats command:
Router# show ip casa statsCasa is active:Wildcard Stats:Wildcards: 6 Max Wildcards: 6Wildcard Denies: 0 Wildcard Drops: 0Pkts Throughput: 441 Bytes Throughput: 39120Affinity Stats:Affinities: 2 Max Affinities: 2Cache Hits: 444 Cache Misses: 0Affinity Drops: 0Casa Stats:Int Packet: 4 Int Tickle: 0Casa Denies: 0 Drop Count: 0Table 11 describes the significant fields shown in the display.
.
Related Commands
show ip casa wildcard
To display information about wildcard blocks, use the show ip casa wildcard command in user EXEC or privileged EXEC mode.
show ip casa wildcard [detail]
Syntax Description
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Examples
The following is sample output from the show ip casa wildcard command:
Router# show ip casa wildcardSource Address Source Mask Port Dest Address Dest Mask Port Prot10.0.0.0 0.0.0.0 0 172.16.56.2 255.255.255.255 0 ICMP10.0.0.0 0.0.0.0 0 172.16.56.2 255.255.255.255 0 TCP10.0.0.0 0.0.0.0 0 172.16.56.13 255.255.255.255 0 ICMP10.0.0.0 0.0.0.0 0 172.16.56.13 255.255.255.255 0 TCP172.16.56.2 255.255.255.255 0 10.0.0.0 0.0.0.0 0 TCP172.16.56.13 255.255.255.255 0 10.0.0.0 0.0.0.0 0 TCPThe following is sample output from the show ip casa wildcard detail command:
Router# show ip casa wildcard detailSource Address Source Mask Port Dest Address Dest Mask Port Prot10.0.0.0 0.0.0.0 0 172.16.56.2 255.255.255.255 0 ICMPService Manager Details:Manager Addr: 172.16.56.19 Insert Time: 08:21:27 UTC 04/18/96Affinity Statistics:Affinity Count: 0 Interest Packet Timeouts: 0Packet Statistics:Packets: 0 Bytes: 0Action Details:Interest Addr: 172.16.56.19 Interest Port: 1638Interest Packet: 0x8000 ALLPKTSInterest Tickle: 0x0107 FIN SYN RST FRAGDispatch (Layer 2): NO Dispatch Address: 10.0.0.0Advertise Dest Address: YES Match Fragments: NOSource Address Source Mask Port Dest Address Dest Mask Port Prot10.0.0.0 0.0.0.0 0 172.16.56.2 255.255.255.255 0 TCPService Manager Details:Manager Addr: 172.16.56.19 Insert Time: 08:21:27 UTC 04/18/96Affinity Statistics:Affinity Count: 0 Interest Packet Timeouts: 0Packet Statistics:Packets: 0 Bytes: 0Action Details:Interest Addr: 172.16.56.19 Interest Port: 1638Interest Packet: 0x8102 SYN FRAG ALLPKTSInterest Tickle: 0x0005 FIN RSTDispatch (Layer 2): NO Dispatch Address: 10.0.0.0Advertise Dest Address: YES Match Fragments: NO
Note If a filter is not set, the filter is not active.
Table 12 describes significant fields shown in the display.
Related Commands
show ip dfp
To display information about Dynamic Feedback Protocol (DFP) agents and their subsystems, use the show ip dfp command in privileged EXEC mode.
show ip dfp [agent subsystem-name] [detail]
Syntax Description
agent subsystem-name
(Optional) Displays information about the specified DFP agent, such as slb for IOS SLB.
detail
(Optional) Displays detailed DFP agent information.
Defaults
If no options are specified, the command displays output for all DFP agents identified by ip dfp agent commands, regardless of whether those agents are currently in service (Inservice: yes) or active (AppActive: yes).
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
Detailed output for the show ip dfp command includes information about all DFP agents configured with ip slb agent commands, regardless of whether those agents are currently in service.
Examples
The following example shows basic information for DFP agent slb:
Router# show ip dfp agent slb
Unexpected errors: 0DFP Agent for service: SLBPort: 666 Interval: 10Current passwd: <none> Pending passwd: <none>Passwd timeout: 0Inservice: yes AppActive: yesManager IP Address Timeout------------------ -------172.16.45.27 0The following example shows detailed information for DFP agent slb:
Router# show ip dfp agent slb detail
Unexpected errors: 0DFP Agent for service: SLBPort: 666 Interval: 10Current passwd: <none> Pending passwd: <none>Passwd timeout: 0Inservice: yes AppActive: yesManager IP Address Timeout------------------ -------172.16.45.27 0Weight Table Report for Agent SLBWeights for Port: 80 Protocol: TCPIP Address Bind ID Weight--------------- ------- -------10.1.1.1 0 65535Weights for Port: 0 (wildcard) Protocol: 0 (wildcard)IP Address Bind ID Weight--------------- ------- -------10.0.0.0 65534 0Bind ID Table Report for Agent SLBBind IDs for Port: 80 Protocol: TCPBind ID Client IP Client Mask------- --------------- ---------------0 10.0.0.0 0.0.0.0Table 13 describes the fields shown in the display.
Related Commands
show ip helper-address
To display IP address information from the helper-address table, use the show ip helper-address command in user EXEC or privileged EXEC mode.
show ip helper-address [interface-type interface-number]
Syntax Description
Command Default
If no arguments are specified, IP address information for all the entries in the helper-address table is displayed.
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Examples
The following is sample output from the show ip helper-address command:
Router# show ip helper-addressInterface Helper-Address VPN VRG Name VRG StateFastEthernet0/0 172.16.0.0 0 router1 UnknownEthernet3/3 172.16.1.0 0 None UnknownATM6/0 172.16.2.0 0 None UnknownLoopback30 172.16.2.1 0 None Unknown172.16.2.3 0 None Unknown172.16.5.0 0 None UnknownTable 14 describes the significant fields shown in the display.
Related Commands
Command Descriptionip helper-address
Enables the forwarding of UDP broadcasts, including BOOTP, received on an interface.
show ip icmp rate-limit
To display all Internet Control Message Protocol (ICMP) unreachable destination messages or unreachable destination messages for a specified interface including the number of dropped packets, use the show ip icmp rate-limit command in privileged EXEC mode.
show ip icmp rate-limit [interface-type interface-number]
Syntax Description
Defaults
All unreachable statistics for all devices are displayed.
Command Modes
Privileged EXEC (#)
Command History
Release Modification12.4(2)T
This command was introduced.
12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(31)SB2.
Examples
The following is sample output when the show ip icmp rate-limit command is entered and unreachable messages are generated:
Router# show ip icmp rate-limitDF bit unreachables All other unreachablesInterval (millisecond) 500 500Interface # DF bit unreachables # All other unreachables--------- --------------------- ------------------------Ethernet0/0 0 0Ethernet0/2 0 0Serial3/0/3 0 19The greatest number of unreachables on Serial3/0/3 is 19.The following is sample output when the show ip icmp rate-limit command is entered and the rate-limit interval has been set at 500. The packet threshold has been set at 1 by using the ip icmp rate-limit unreachable command, so the logging will display on the console when the threshold is exceeded. The total suppressed packets since last log message is displayed.
Router# show ip icmp rate-limit00:04:18: %IP-3-ICMPRATELIMIT: 2 unreachables rate-limited within 60000 milliseconds on Serial3/0/3. 17 log messages suppressed since last log message displayed on Serial3/0/3Table 15 describes the significant fields shown in the display.
Related Commands
show ip redirects
To display the address of a default gateway (router) and the address of hosts for which an Internet Control Message Protocol (ICMP) redirect message has been received, use the show ip redirects command in user EXEC or privileged EXEC mode.
show ip redirects
Syntax Description
This command has no arguments or keywords.
Command Modes
User EXEC (>)
Privileged EXEC (#)Command History
Usage Guidelines
This command displays the default router (gateway) as configured by the ip default-gateway command.
The ip mtu command enables the router to send ICMP redirect messages.
Examples
The following is sample output from the show ip redirects command:
Router# show ip redirectsDefault gateway is 172.16.80.29Host Gateway Last Use Total Uses Interface172.16.1.111 172.16.80.240 0:00 9 Ethernet0172.16.1.4 172.16.80.240 0:00 4 Ethernet0Related Commands
show ip sctp association list
Note Effective with Cisco IOS Release 12.4(11)T, the show ip sctp association list command is replaced by the show sctp association list command. See the show sctp association list command for more information.
To display identifiers and information for current Stream Control Transmission Protocol (SCTP) associations and instances, use the show ip sctp association list command in privileged EXEC mode.
show ip sctp association list
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
Use this command to display the current SCTP association and instance identifiers, the current state of SCTP associations, and the local and remote port numbers and addresses that are used in the associations.
Examples
The following is sample output from this command for three association identifiers:
Router# show ip sctp association list*** SCTP Association List ****AssocID:0, Instance ID:0Current state:ESTABLISHEDLocal port:8989, Addrs:10.1.0.2 10.2.0.2Remote port:8989, Addrs:10.6.0.4 10.5.0.4AssocID:1, Instance ID:0Current state:ESTABLISHEDLocal port:8989, Addrs:10.1.0.2 10.2.0.2Remote port:8990, Addrs:10.6.0.4 10.5.0.4AssocID:2, Instance ID:0Current state:ESTABLISHEDLocal port:8989, Addrs:10.1.0.2 10.2.0.2Remote port:8991, Addrs:10.6.0.4 10.5.0.4Table 16 describes the significant fields shown in the display.
Related Commands
show ip sctp association parameters
Note Effective with Cisco IOS Release 12.4(11)T, the show ip sctp association parameters command is replaced by the show sctp association parameters command. See the show sctp association parameters command for more information.
To display configured and calculated parameters for the specified Stream Control Transmission Protocol (SCTP) association, use the show ip sctp association parameters command in privileged EXEC mode.
show ip sctp association parameters assoc-id
Syntax Description
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
The show ip sctp association parameters command provides information to determine the stability of SCTP associations, dynamically calculated statistics about destinations, and values to assess network congestion. This command also displays parameter values for the specified association.
This command requires an association identifier. Association identifiers can be obtained from the output of the show ip sctp association list command.
Many parameters are defined for each association. Some are configured parameters, and others are calculated. Three main groupings of parameters are displayed by this command:
•Association configuration parameters
•Destination address parameters
•Association boundary parameters
The association configuration section displays information similar to that in the show ip sctp association list command, including association identifiers, state, and local and remote port and address information. The current primary destination is also displayed.
Examples
The following sample output shows the IP SCTP association parameters for association 0:
Router# show ip sctp association parameters 0** SCTP Association Parameters **AssocID: 0 Context: 0 InstanceID: 1Assoc state: ESTABLISHED Uptime: 19:05:57.425Local port: 8181Local addresses: 10.1.0.3 10.2.0.3Remote port: 8181Primary dest addr: 10.5.0.4Effective primary dest addr: 10.5.0.4Destination addresses:10.5.0.4: State: ACTIVEHeartbeats: Enabled Timeout: 30000 msRTO/RTT/SRTT: 1000/16/38 ms TOS: 0 MTU: 1500cwnd: 5364 ssthresh: 3000 outstand: 768Num retrans: 0 Max retrans: 5 Num times failed: 010.6.0.4: State: ACTIVEHeartbeats: Enabled Timeout: 30000 msRTO/RTT/SRTT: 1000/4/7 ms TOS: 0 MTU: 1500cwnd: 3960 ssthresh: 3000 outstand: 0Num retrans: 0 Max retrans: 5 Num times failed: 0Local vertag: 9A245CD4 Remote vertag: 2A08D122Num inbound streams: 10 outbound streams: 10Max assoc retrans: 5 Max init retrans: 8CumSack timeout: 200 ms Bundle timeout: 100 msMin RTO: 1000 ms Max RTO: 60000 msLocalRwnd: 18000 Low: 13455 RemoteRwnd: 15252 Low: 13161Congest levels: 0 current level: 0 high mark: 325Table 17 describes the significant fields shown in the display.
Related Commands
show ip sctp association statistics
Note Effective with Cisco IOS Release 12.4(11)T, the show ip sctp association statistics command is replaced by the show sctp association statistics command. See the show sctp association statistics command for more information.
To display statistics that have accumulated for the specified Stream Control Transmission Protocol (SCTP) association, use the show ip sctp association statistics command in privileged EXEC mode.
show ip sctp association statistics assoc-id
Syntax Description
assoc-id
Association identifier, which can be obtained from the output of the show ip sctp association list command.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
This command shows only the information that has become available since the last time a clear ip sctp statistics command was executed.
Examples
The following sample output shows the statistics accumulated for SCTP association 0:
Router# show ip sctp association statistics 0** SCTP Association Statistics **AssocID/InstanceID: 0/1Current State: ESTABLISHEDControl ChunksSent: 623874 Rcvd: 660227Data Chunks SentTotal: 14235644 Retransmitted: 60487Ordered: 6369678 Unordered: 6371263Avg bundled: 18 Total Bytes: 640603980Data Chunks RcvdTotal: 14496585 Discarded: 1755575Ordered: 6369741 Unordered: 6371269Avg bundled: 18 Total Bytes: 652346325Out of Seq TSN: 3069353ULP DgramsSent: 12740941 Ready: 12740961 Rcvd: 12740941Table 18 describes the significant fields shown in the display.
Related Commands
show ip sctp errors
Note Effective with Cisco IOS Release 12.4(11)T, the show ip sctp errors command is replaced by the show sctp errors command. See the show sctp errors command for more information.
To display the error counts logged by the Stream Control Transmission Protocol (SCTP), use the show ip sctp errors command in privileged EXEC mode.
show ip sctp errors
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
This command displays all errors across all associations that have been logged since the last time that the SCTP statistics were cleared with the clear ip sctp statistics command. If no errors have been logged, this is indicated in the output.
Examples
The following sample output shows a session with no errors:
Router# show ip sctp errors*** SCTP Error Statistics ****No SCTP errors logged.The following sample output shows a session that has SCTP errors:
Router# show ip sctp errors** SCTP Error Statistics **Invalid verification tag: 5Communication Lost: 64Destination Address Failed: 3Unknown INIT params rcvd: 16Invalid cookie signature: 5Expired cookie: 1Peer restarted: 1No Listening instance: 2Field descriptions are self-explanatory.
Related Commands
show ip sctp instances
Note Effective with Cisco IOS Release 12.4(11)T, the show ip sctp instances command is replaced by the show sctp instances command. For more information, see the show sctp instances command.
To display information for each of the currently configured Stream Control Transmission Protocol (SCTP) instances, use the show ip sctp instances command in privileged EXEC mode.
show ip sctp instances
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
This command displays information for each of the currently configured instances. The instance number, local port, and address information are displayed. The instance state is either available or deletion pending. An instance enters the deletion pending state when a request is made to delete it but there are currently established associations for that instance. The instance cannot be deleted immediately and instead enters the pending state. No new associations are allowed in this instance, and when the last association is terminated or fails, the instance is deleted.
The default inbound and outbound stream numbers are used for establishing incoming associations, and the maximum number of associations allowed for this instance is shown. Then a snapshot of each existing association is shown, if any exists.
Effective with Cisco IOS Release 12.4(11)T, if you enter the show ip sctp instances command, you must type the complete word instances in the command syntax.
Examples
The following sample output shows available IP SCTP instances. In this example, two current instances are active and available. The first is using local port 8989, and the second is using 9191. Instance identifier 0 has three current associations, and instance identifier 1 has no current associations.
Router# show ip sctp instances*** SCTP Instances ****Instance ID:0 Local port:8989Instance state:availableLocal addrs:10.1.0.2 10.2.0.2Default streams inbound:1 outbound:1Current associations: (max allowed:6)AssocID:0 State:ESTABLISHED Remote port:8989Dest addrs:10.6.0.4 10.5.0.4AssocID:1 State:ESTABLISHED Remote port:8990Dest addrs:10.6.0.4 10.5.0.4AssocID:2 State:ESTABLISHED Remote port:8991Dest addrs:10.6.0.4 10.5.0.4Instance ID:1 Local port:9191Instance state:availableLocal addrs:10.1.0.2 10.2.0.2Default streams inbound:1 outbound:1No current associations established for this instance.Max allowed:6Field descriptions are self-explanatory.
Related Commands
show ip sctp statistics
Note Effective with Cisco IOS Release 12.4(11)T, the show ip sctp statistics command is replaced by the show sctp statistics command. See the show sctp statistics command for more information.
To display the overall statistics counts for Stream Control Transmission Protocol (SCTP) activity, use the show ip sctp statistics command in privileged EXEC mode.
show ip sctp statistics
Syntax Description
This command has no arguments or keywords.
Command Modes
Privileged EXEC (#)
Command History
Usage Guidelines
This command displays the overall SCTP statistics accumulated since the last clear ip sctp statistics command. It includes numbers for all currently established associations, and for any that have been terminated. The statistics indicated are similar to those shown for individual associations.
Examples
The following sample output shows IP SCTP statistics:
Router# show ip sctp statistics*** SCTP Overall Statistics ****Total Chunks Sent: 2097Total Chunks Rcvd: 2766Data Chunks Rcvd In Seq: 538Data Chunks Rcvd Out of Seq: 0Total Data Chunks Sent: 538Total Data Chunks Rcvd: 538Total Data Bytes Sent: 53800Total Data Bytes Rcvd: 53800Total Data Chunks Discarded: 0Total Data Chunks Retrans: 0Total SCTP Dgrams Sent: 1561Total SCTP Dgrams Rcvd: 2228Total ULP Dgrams Sent: 538Total ULP Dgrams Ready: 538Total ULP Dgrams Rcvd: 538Field descriptions are self-explanatory.
Related Commands