- show aaa accounting
- show aaa authentication
- show aaa authorization
- show aaa groups
- show aaa local user blocked
- show aaa user default-role
- show access-lists
- show accounting log
- show arp access-lists
- show class-map type control-plane
- show cli syntax roles network-admin
- show copp diff profile
- show copp profile
- show cli syntax roles network-operator
- show copp status
- show crypto ca certificates
- show crypto ca certstore
- show crypto ca crl
- show crypto ca remote-certstore
- show crypto ca trustpoints
- show crypto certificatemap
- show crypto key mypubkey rsa
- show crypto ssh-auth-map
- show cts
- show cts capability interface
- show cts credentials
- show cts environment-data
- show cts interface
- show cts l3 interface
- show cts l3 mapping
- show cts pacs
- show cts role-based access-list
- show cts role-based counters
- show cts role-based enable
- show cts role-based policy
- show cts role-based sgt vlan
- show cts role-based sgt-map
- show cts sap pmk
- show cts sxp
- show cts sxp connection
- show dot1x
- show dot1x all
- show dot1x interface ethernet
- show encryption service stat
- show eou
- show fips status
- show
- show access-list status module
- show hardware access-list feature-combo
- show hardware rate-limiter
- show identity policy
- show identity profile
- show ip access-lists
- show ip access-lists capture session
- show ip arp inspection
- show ip arp inspection interface
- show ip arp inspection log
- show ip arp inspection statistics
- show ip arp inspection vlan
- show ip device tracking
- show ip dhcp relay
- show ip dhcp relay address
- show ip dhcp relay statistics
- show ip dhcp snooping
- show ip dhcp snooping binding
- show ip dhcp snooping statistics
- show ip verify source
- show ipv6 access-lists
- show ipv6 dhcp-ldra
- show ipv6 dhcp relay
- show ipv6 dhcp relay statistics
- show ip udp relay
- show key chain
- show ldap-search-map
- show ldap-server
- show ldap-server groups
- show ldap-server statistics
- show mac access-lists
- show password secure-mode
- show password strength-check
- show policy-map interface control-plane
- show policy-map type control-plane
- show port-security
- show port-security address
- show port-security interface
- show privilege
- show radius
- show radius-server
- show role
- show role feature
- show role feature-group
- show role pending
- show role pending-diff
- show role session
- show role status
- show running-config aaa
- show running-config aclmgr
- show running-config copp
- show running-config cts
- show running-config dhcp
- show running-config dot1x
- show running-config eou
- show running-config ldap
- show running-config port-security
- show running-config radius
- show running-config security
- show running-config tacacs+
- show ssh key
- show ssh server
- show startup-config aaa
- show startup-config aclmgr
- show startup-config copp
- show startup-config dhcp
- show startup-config dot1x
- show startup-config eou
- show startup-config ldap
- show startup-config port-security
- show startup-config radius
- show startup-config security
- show startup-config tacacs+
- show system internal access-list feature bank-class map
- show system internal access-list feature bank-chain map
- show system internal access-list globals
- show system internal pktmgr internal control sw-rate-limit
- show system internal udp-relay database
- show tacacs+
- show tacacs-server
- show telnet server
- show time-range
- show user-account
- show username
- show users
- show vlan access-list
- show vlan access-map
- show vlan filter
Show Commands
This chapter describes the Cisco NX-OS Security show commands.
show aaa accounting
To display AAA accounting configuration information, use the show aaa accounting command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the configuration of the accounting log:
show aaa authentication
To display AAA authentication configuration information, use the show aaa authentication command.
show aaa authentication [ login error-enable | login chap | login mschap | login mschapv2 | login ascii-authentication ]
Syntax Description
Defaults
Displays the console and login authentication methods configuration.
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the configured authentication parameters:
This example shows how to display the authentication-login error-enable configuration:
This example shows how to display the authentication-login CHAP configuration:
This example shows how to display the authentication-login MSCHAP configuration:
This example shows how to display the authentication-login MSCHAP V2 configuration:
This example shows how to display the status of the ASCII authentication for passwords feature :
Related Commands
|
|
|
|---|---|
Enables ASCII authentication for passwords on a TACACS+ server. |
|
Configures the AAA authentication failure message to display on the console. |
|
show aaa authorization
To display AAA authorization configuration information, use the show aaa authorization command.
show aaa authorization [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the configured authorization methods:
This example shows how to display the configured authorization methods and defaults:
Related Commands
|
|
|
|---|---|
show aaa groups
To display AAA server group configuration, use the show aaa groups command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display AAA group information:
show aaa local user blocked
To display the blocked users, use the show aaa local user blocked command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the blocked users:
Related Commands
|
|
|
|---|---|
show aaa user default-role
To display the AAA user default role configuration, use the show aaa user default-role command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
User the aaa user default-role command to configure the AAA user default role.
Examples
This example shows how to display the AAA user default role configuration:
Related Commands
|
|
|
|---|---|
show access-lists
To display all IPv4, IPv6, and MAC access control lists (ACLs) or a specific ACL, use the show access-lists command.
show access-lists [ access-list-name ] [ expanded | summary ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
The device shows all ACLs unless you use the access-list-name argument to specify an ACL.
If you do not specify an ACL name, the device lists ACLs alphabetically by the ACL names.
The expanded keyword allows you to display the details of object groups used in an ACL rather than only the name of the object groups. For more information about object groups, see the object-group ip address, object-group ipv6 address, and object-group ip port commands.
The summary keyword allows you to display information about the ACL rather than the ACL configuration. The information displayed includes the following:
- Whether per-entry statistics are configured for the ACL.
- Whether the fragments command is configured for an IP ACL.
- The number of rules in the ACL configuration. This number does not reflect how many entries that the ACL contains when the device applies it to an interface. If a rule in the ACL uses an object group, the number of entries in the ACL when it is applied may be much greater than the number of rules.
- The interfaces that the ACL is applied to.
- The interfaces that the ACL is active on.
The show access-lists command displays statistics for each entry in an ACL if the following conditions are both true:
- The ACL configuration contains the statistics per-entry command.
- The ACL is applied to an interface that is administratively up.
If an IP ACL includes the fragments command, it appears before the explicit permit and deny rules, but the device applies the fragments command to noninitial fragments only if they do not match all other explicit rules in the ACL.
Examples
This example shows how to use the show access-lists command without specifying an ACL name on a device that has one IP ACL and one MAC ACL configured:
This example shows how to use the show access-lists command to display an IPv4 ACL named ipv4-RandD-outbound-web, including per-entry statistics for the entries except for the MainLab object group:
This example shows how to use the show access-lists command to display an IPv4 ACL named ipv4-RandD-outbound-web. The expanded keyword causes the contents of the object group from the previous example to appear, including the per-entry statistics:
This example shows how to use the show access-lists command with the summary keyword to display information about an IPv4 ACL named ipv4-RandD-outbound-web, such as which interfaces the ACL is applied to and active on:
Related Commands
|
|
|
|---|---|
show accounting log
To display the accounting log contents, use the show accounting log command.
show accounting log [ size | last-index | start-seqnum number | start-time year month day HH : MM : SS ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
When you make a change to the configuration, the results are shown in the output for show accounting log. There three results for the configuration change:
- Success: indicates the configuration change was successful.
- Failure: indicates the configuration change was unsuccessful.
- Redirect: indicates the configuration change was not issued directly from the Command Line Interface (CLI) but was issued as a result of another CLI command. For example, the following output is issued as a result of the port-profile type command:
Examples
This example shows how to display the entire accounting log:
This example shows how to display 400 bytes of the accounting log:
This example shows how to display the accounting log starting at 16:00:00 on February 16, 2008:
This example shows how to display the last index number:
This example shows how to display the result of configuration changes:
Related Commands
|
|
|
|---|---|
show arp access-lists
To display all ARP access control lists (ACLs) or a specific ARP ACL, use the show arp access-lists command.
show arp access-lists [ access-list-name ]
Syntax Description
(Optional) Name of an ARP ACL, which can be up to 64 alphanumeric, case-sensitive characters. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
The device shows all ARP ACLs, unless you use the access-list-name argument to specify an ACL.
Examples
This example shows how to use the show arp access-lists command to display all ARP ACLs on a device that has two ARP ACLs:
This example shows how to use the show arp access-lists command to display an ARP ACL named arp-permit-all:
Related Commands
|
|
|
|---|---|
show class-map type control-plane
To display control plane class map information, use the show class-map type control-plane command.
show class-map type control-plane [ class-map-name ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You can use this command only in the default virtual device context (VDC).
Examples
This example shows how to display control plane class map information:
show cli syntax roles network-admin
To display the syntax of the commands that the network-admin role can use but the vdc-admin role cannot, use the show cli syntax roles network-admin command.
show cli syntax roles network-admin
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the syntax of the commands that the network-admin role can use but the vdc-admin role cannot:
Related Commands
|
|
|
|---|---|
Displays the syntax of the commands that the network-operator role can use but the vdc-operator role cannot. |
show copp diff profile
To display the difference between the previous and latest Control Plane Policing (CoPP) best practice policies or between the currently applied default CoPP best practice policy and the latest CoPP best practice policy, use the show copp diff profile command.
show copp diff profile { lenient | moderate | strict } [ prior-ver ] profile { lenient | moderate | strict }
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
When you do not include the prior-ver option, this command displays the difference between two currently applied default CoPP best practice policies (such as the currently applied strict and currently applied moderate policies).
When you include the prior-ver option, this command displays the difference between a currently applied default CoPP best practice policy and a previously applied default CoPP best practice policy (such as the currently applied strict and the previously applied lenient policies).
Examples
This example shows how to display the difference between the currently applied default CoPP best practice policy and the latest CoPP best practice policy:
Related Commands
|
|
|
|---|---|
Displays the details of the CoPP best practice policy, along with the classes and policer values. |
show copp profile
To display the details of the Control Plane Policing (CoPP) best practice policy, along with the classes and policer values, use the show copp profile command.
show copp profile { lenient | moderate | strict }
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the details of the CoPP best practice policy, along with the classes and policer values:
Related Commands
show cli syntax roles network-operator
To display the syntax of the commands that the network-operator role can use but the vdc-operator role cannot, use the show cli syntax roles network-operator command.
show cli syntax roles network-operator
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the syntax of the commands that the network-operator role can use but the vdc-operator role cannot:
Related Commands
|
|
|
|---|---|
Displays the syntax of the commands that the network-admin role can use but the vdc-admin role cannot. |
show copp status
To display the control plane policing (CoPP) configuration status, use the show copp status command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You can use this command only in the default virtual device context (VDC).
Examples
This example shows how to display the CoPP configuration status information:
show crypto ca certificates
To display configured trustpoint certificates, use the show crypto ca certificates command.
show crypto ca certificates trustpoint-label
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Use this command to display the fields in the identity certificate, if present, followed by the fields in the CA certificate (or each CA certificate if it is a chain, starting from the lowest to the self-signed root certificate), or the trustpoint. If the trustpoint name is not specified, all trustpoint certificate details are displayed.
Examples
This example shows how to display configured trustpoint certificates:
Related Commands
|
|
|
|---|---|
show crypto ca certstore
To display the cert-store configuration, use the show crypto ca certstore command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Examples
This example shows how to display the cert-store configuration:
Related Commands
|
|
|
|---|---|
Specifies the cert-store to be used for certificate authentication. |
|
show crypto ca crl
To display configured certificate revocation lists (CRLs), use the show crypto ca crl command.
show crypto ca crl trustpoint-label
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Use this command to list the serial numbers of the revoked certificates in the CRL of the specified trustpoint.
Examples
This example shows how to display a configured CRL:
Related Commands
|
|
|
|---|---|
Configures a CRL or overwrites the existing one for the trustpoint CA. |
show crypto ca remote-certstore
To display the remote cert-store configuration, use the show crypto ca remote-certstore command.
show crypto ca remote-certstore
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Examples
This example shows how to display the remote cert-store configuration:
Related Commands
|
|
|
|---|---|
Specifies the cert-store to be used for certificate authentication. |
|
show crypto ca trustpoints
To display trustpoint configurations, use the show crypto ca trustpoints command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Examples
This example shows how to display configured trustpoints:
Related Commands
|
|
|
|---|---|
Declares the trustpoint certificate authority that the device should trust. |
|
show crypto certificatemap
To display the certificate mapping filters, use the show crypto certificatemap command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Examples
This example shows how to display the certificate mapping filters:
Related Commands
|
|
|
|---|---|
Configures one or more certificate mapping filters within the filter map. |
show crypto key mypubkey rsa
To display the RSA public key configurations, use the show crypto key mypubkey rsa command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Examples
This example shows how to display RSA public key configurations:
Related Commands
|
|
|
|---|---|
show crypto ssh-auth-map
To display the mapping filters configured for SSH authentication, use the show crypto ssh-auth-map command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
|---|---|
Usage Guidelines
Examples
This example shows how to display the mapping filters configured for SSH authentication:
Related Commands
|
|
|
|---|---|
Configures a certificate mapping filter for the SSH protocol. |
|
Configures one or more certificate mapping filters within the filter map. |
show cts
To display the global Cisco TrustSec configuration, use the show cts command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec global configuration:
Related Commands
|
|
|
|---|---|
show cts capability interface
To display the Cisco TrustSec capability of all interfaces or a specific Ethernet interface, use the show cts capability interface command.
show cts capability interface {all | ethernet slot/port}
Syntax Description
Displays the Cisco TrustSec capability of the specific interface. |
Defaults
Command Modes
Command History
|
|
|
This command was introduced. The output was modified to display the 256-bit and 128-bit encryption and sequence number capabilities. |
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec capability of all interfaces:
Related Commands
|
|
|
|---|---|
show cts credentials
To display the Cisco TrustSec device credentials configuration, use the show cts credentials command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec credentials configuration:
Related Commands
|
|
|
|---|---|
show cts environment-data
To display the global Cisco TrustSec environment data, use the show cts environment-data command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
The Cisco NX-OS device downloads the Cisco TrustSec environment data from the ACS after you have configured the Cisco TrustSec credentials for the device and configured authentication, authorization, and accounting (AAA).
Examples
This example shows how to display the Cisco TrustSec environment data:
Related Commands
|
|
|
|---|---|
show cts interface
To display the Cisco TrustSec information for interfaces, use the show cts interface command.
show cts interface { all | brief | ethernet slot / port }
Syntax Description
Displays a brief summary for all Cisco TrustSec- enabled interfaces. |
|
Displays Cisco TrustSec information for the specific interface. |
Defaults
Command Modes
Command History
|
|
|
Added the additional configuration example that applies only to M2 Series modules for 40G or 100G links. |
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec configuration for all interfaces:
This example shows how to display a brief display the Cisco TrustSec configuration:
This example shows how to display the Cisco TrustSec configuration for a specific interface:
Table 1-1 provides information about the values displayed in the show cts interface command output.
Related Commands
|
|
|
|---|---|
show cts l3 interface
To display the Layer 3 Cisco TrustSec configuration on the interfaces, use the show cts l3 interface command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Layer 3 Cisco TrustSec configuration for the interfaces:
Related Commands
|
|
|
|---|---|
show cts l3 mapping
To display the Layer 3 Cisco TrustSec mapping configuration for the device, use the show cts l3 mapping command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Layer 3 Cisco TrustSec mapping for the device:
Related Commands
|
|
|
|---|---|
show cts pacs
To display the Cisco TrustSec protect access credentials (PACs) provisioned by EAP-FAST, use the show cts pacs command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec global configuration:
Related Commands
|
|
|
|---|---|
show cts role-based access-list
To display the global Cisco TrustSec security group access control list (SGACL) configuration, use the show cts role-based access-list command.
show cts role-based access-list [ list-name ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec SGACL configuration:
Related Commands
|
|
|
|---|---|
show cts role-based counters
To display the configuration status of role-based access control list (RBACL) statistics and list the statistics for all RBACL policies, use the show cts role-based counters command.
show cts role-based counters [ sgt { sgt-value | any | unknown }] [ dgt { dgt-value | any | unknown }]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the configuration status of RBACL statistics and the total number of packets that match RBACL policies for a specific SGT and DGT:
Related Commands
|
|
|
|---|---|
Clears the RBACL statistics so that all counters are reset to 0. |
|
show cts role-based enable
To display the Cisco TrustSec security group access control list (SGACL) enable status for VLANs and Virtual Routing and Forwarding instances (VRFs), use the show cts role-based enable command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec SGACL enforcement status:
Related Commands
|
|
|
|---|---|
show cts role-based policy
To display the global Cisco TrustSec security group access control list (SGACL) policies, use the show cts role-based policy command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec SGACL policies:
Related Commands
|
|
|
|---|---|
show cts role-based sgt vlan
To display the Cisco TrustSec Security Group Tag (SGT) mapping configuration for a specific VLAN, use the show cts role-based sgt vlan command.
show cts role-based sgt vlan {all | vlan-id}
Syntax Description
Configured SGT for the specific VLAN. The range is from 1 to 4094. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec SGT mapping configuration for all VLANs:
Related Commands
|
|
|
|---|---|
Displays the global Cisco TrustSec SGT mapping configuration. |
|
show cts role-based sgt-map
To display the global Cisco TrustSec Security Group Tag (SGT) mapping configuration, use the show cts role-based sgt-map command.
show cts role-based sgt-map [summary | sxp peer peer-ipv4-addr | vlan vlan-id | vrf vrf-name]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
The summary, sxp peer peer-ipv4-addr, vlan vlan-id, and vrf vrf-name keywords and arguments were added. |
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec SGT mapping configuration:
Related Commands
|
|
|
|---|---|
Manually configures the Cisco TrustSec SGT mapping to IP addresses. |
show cts sap pmk
To display the Cisco TrustSec Security Association Protocol (SAP) pairwise master key (PMK) configuration, use the show cts sap pmk command.
show cts sap pmk {all | interface ethernet slot/port}
Syntax Description
Displays the hexadecimal value of the configured PMK for all interfaces. |
|
Displays the hexadecimal value of the configured PMK for the specific Ethernet interface. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec SAP PMK configuration:
Related Commands
|
|
|
|---|---|
show cts sxp
To display information about the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (SXP) configuration and default route for SGT, use the show cts sxp command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
This output was modified to include details about the SXPv3 version and network map expansion limit. |
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec SXP configuration:
Related Commands
|
|
|
|---|---|
show cts sxp connection
To display the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (SXP) connections information, use the show cts sxp connection command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (SXP) connections information:
Related Commands
|
|
|
|---|---|
show dot1x
To display the 802.1X feature status, use the show dot1x command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the 802.1X feature by using the feature dot1x command before using this command.
Examples
This example shows how to display the 802.1X feature status:
Related Commands
|
|
|
|---|---|
show dot1x all
To display all 802.1X feature status and configuration information, use the show dot1x all command.
show dot1x all [ details | statistics | summary ]
Syntax Description
(Optional) Displays detailed information about the 802.1X configuration. |
|
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the 802.1X feature by using the feature dot1x command before using this command.
Examples
This example shows how to display all 802.1X feature status and configuration information:
Related Commands
|
|
|
|---|---|
show dot1x interface ethernet
To display the 802.1X feature status and configuration information for an Ethernet interface, use the show dot1x interface ethernet command.
show dot1x interface ethernet slot / port [ details | statistics | summary ]
Syntax Description
(Optional) Displays detailed 802.1X information for the interface. |
|
(Optional) Displays a summary of the 802.1X information for the interface. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the 802.1X feature by using the feature dot1x command before using this command.
Examples
This example shows how to display the 802.1X feature status and configuration information for an Ethernet interface:
Related Commands
|
|
|
|---|---|
show encryption service stat
To display the status of the encryption service, use the show encryption service stat command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the status of the encryption service:
Related Commands
|
|
|
|---|---|
show eou
To display Extensible Authentication Protocol over User Datagram Protocol (EAPoUDP) status and configuration information, use the show eou command.
show eou [ all | authentication { clientless | eap | static } | interface ethernet slot / port | ip-address ipv4-address | mac-address mac-address | posturetoken [ name ]]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the 802.1X feature by using the feature eou command before using this command.
Examples
This example shows how to display all 802.1X feature status and configuration information:
This example shows how to display 802.1X clientless authentication information:
This example shows how to display 802.1X EAP authentication information:
This example shows how to display 802.1X static authentication information:
This example shows how to display 802.1X information for an Ethernet interface:
This example shows how to display 802.1X information for a MAC address:
This example shows how to display 802.1X information for a MAC address:
Related Commands
|
|
|
|---|---|
show fips status
To display the status of Federal Information Processing Standards (FIPS) mode, use the show fips status command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the status of FIPS mode:
Related Commands
|
|
|
|---|---|
show
To display information about which I/O modules are configured with the command, use the show command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
This command does not require a license.
If no I/O modules are configured with the command, the show command has no output.
Examples
This example shows how to display the I/O modules that are configured with the command:
show access-list status module
To display the access control list (ACL) capture configuration, use the show access-list status module command.
show access-list status module slot
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the access control list (ACL) capture configuration:
Related Commands
|
|
|
|---|---|
Enables access control list (ACL) capture on all virtual device contexts (VDCs). |
show hardware access-list feature-combo
To display the bank mapping matrix, use the show hardware access-list feature- combo command.
show hardware access-list { input | output } { interface | vlan } feature-combo features
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
This command does not require a license.
The following are the features you can enter:
- arp—Address Resolution Protocol
- bfd—Bidirectional Forwarding Detection
- cbts—Class-Based Tunnel Selection
- cts_impl_tunnel—CTS Implicit Tunnel
- dhcp—Dynamic Host Configuration Protocol
- erspan_dst—Encapsulated Remote Switched Port Analyzer (destination)
- erspan_src—Encapsulated Remote Switched Port Analyzer (source)
- lisp—Locator/ID Separation Protocol
- lisp_inst—LISP Multitenant Policy
- netflow—NetFlow
- netflow_svi—NetFlow on SVI
- netflow_sampler—NetFlow Sampler
- netflow_sampler_svi—NetFlow Sampler on SVI
- otv—Overlay Transport Virtualization
- pacl—Port ACL
- pbr—Policy-Based Routing without statistics
- pbr_stats—Policy-Based Routing with statistics
- qos—Quality of Service
- racl—Router ACL without statistics
- racl_stats—Router ACL with statistics
- rbacl—Role-based ACL
- tunnel-decap—Tunnel Decap
- vacl—VLAN ACL without statistics
- vacl_stats—VLAN ACL with statistics
- wccp—Web Cache Communication Protocol
If the feature is not supported, the switch returns the following message:
Examples
This example shows how to display a feature combination check on the ingress policy on a Layer 3 interface with the following features—racl with no stats, pbr with stats, wccp, qos and netflow:
This example shows how to display a feature combination check on the ingress policy on a VLAN/SVI with the following features—vacl with stats, racl on svi, pbr on svi, dhcp snoop on vlan and wccp:
This example shows how to display a f eature combination check on the ingress policy on a Layer 2 interface with the following features —pacl and l2 qos:
Related Commands
|
|
|
|---|---|
show hardware rate-limiter
To display the hardware rate limit configuration and statistics, use the show hardware rate-limiter command.
show hardware rate-limiter { access-list-log [ module module] | copy [ module module] | f1 { rl-1 [ module module] | rl-2 [ module module] | rl-3 [ module module] | rl-4 [ module module] | rl-5 [ module module]} | layer-2 { l2pt [ module module] | mcast-snooping [ module module] | port-security [ module module] | storm-control [ module module] | vpc-low [ module module]} | layer-3 { control [ module module] | glean [ module module] | glean-fast [ module module] mtu [ module module] | multicast { directly-connect [ module module] | local-groups [ module module] | rpf-leak [ module module]} | ttl [ module module]} | module module | receive [ module module]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Added the f1, rl-1, rl-2, rl-3, rl-4, rl-5, and module keywords. |
|
Usage Guidelines
You can use the command only in the default virtual device context (VDC).
Examples
This example shows how to display all the hardware rate-limit configuration and statistics:
This example shows how to display the rate-limit configuration and statistics for access-list log packets:
Related Commands
|
|
|
|---|---|
show identity policy
To display the identity policies, use the show identity policy command.
show identity policy [ policy-name ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display information for all of the identity policies:
This example shows how to display information for a specific identity policy:
Related Commands
|
|
|
|---|---|
show identity profile
To display the identity profiles, use the show identity profile command.
show identity profile [ eapoudp ]
Syntax Description
(Optional) Displays the Extensible Authentication Protocol over User Datagram Protocol (EAPoUDP) identity profile. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the identity profiles:
This example shows how to display the EAPoUDP identity profile configuration:
Related Commands
|
|
|
|---|---|
show ip access-lists
To display all IPv4 access control lists (ACLs) or a specific IPv4 ACL, use the show ip access-lists command.
show ip access-lists [ access-list-name ] [ expanded | summary ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
The device shows all IPv4 ACLs, unless you use the access-list-name argument to specify an ACL.
If you do not specify an ACL name, the device lists ACLs alphabetically by the ACL names.
IPv4 address object groups and IP port object groups show only by name, unless you use the expanded keyword.
The expanded keyword allows you to display the details of object groups used in an ACL rather than only the name of the object groups. For more information about object groups, see the object-group ip address and object-group ip port commands.
The summary keyword allows you to display information about the ACL rather than the ACL configuration. The information displayed includes the following:
- Whether per-entry statistics are configured for the ACL.
- Whether the fragments command is configured for the ACL.
- The number of rules in the ACL configuration. This number does not reflect how many entries that the ACL contains when the device applies it to an interface. If a rule in the ACL uses an object group, the number of entries in the ACL when it is applied may be much greater than the number of rules.
- The interfaces that the ACL is applied to.
- The interfaces that the ACL is active on.
The show ip access-lists command displays statistics for each entry in an ACL if the following conditions are both true:
- The ACL configuration contains the statistics per-entry command.
- The ACL is applied to an interface that is administratively up.
If an IP ACL includes the fragments command, it appears before the explicit permit and deny rules, but the device applies the fragments command to noninitial fragments only if they do not match all other explicit rules in the ACL.
Examples
This example shows how to use the show ip access-lists command to display all IPv4 ACLs on a device that has a single IPv4 ACL:
This example shows how to use the show ip access-lists command to display an IPv4 ACL named ipv4-RandD-outbound-web, including per-entry statistics for the entries except for the MainLab object group:
This example shows how to use the show ip access-lists command to display an IPv4 ACL named ipv4-RandD-outbound-web. The expanded keyword causes the contents of the object group from the previous example to appear, including the per-entry statistics:
This example shows how to use the show ip access-lists command with the summary keyword to display information about an IPv4 ACL named ipv4-RandD-outbound-web, such as which interfaces the ACL is applied to and active on:
Related Commands
|
|
|
|---|---|
Starts recording statistics for packets permitted or denied by each entry in an ACL. |
show ip access-lists capture session
To display the ACL capture session configuration, use the show ip access-lists capture session command.
show ip access-lists capture session session
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the ACL capture session configuration:
Related Commands
|
|
|
|---|---|
show ip arp inspection
To display the Dynamic ARP Inspection (DAI) configuration status, use the show ip arp inspection command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the status of the DAI configuration:
Related Commands
|
|
|
|---|---|
Displays the trust state and the ARP packet rate for a specified interface. |
|
Displays DHCP snooping configuration, including DAI configuration. |
show ip arp inspection interface
To display the trust state and the ARP packet rate for the specified interface, use the show ip arp inspection interface command.
show ip arp inspection interface { ethernet slot / port | port-channel channel-number }
Syntax Description
(Optional) Specifies that the output is for an Ethernet interface. |
|
(Optional) Specifies that the output is for a port-channel interface. Valid port-channel numbers are from 1 to 4096. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the trust state and the ARP packet rate for a trusted interface:
Related Commands
|
|
|
|---|---|
Enables Dynamic ARP Inspection (DAI) for a specified list of VLANs. |
|
Displays DHCP snooping configuration, including DAI configuration. |
show ip arp inspection log
To display the Dynamic ARP Inspection (DAI) log configuration, use the show ip arp inspection log command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the DAI log configuration:
Related Commands
|
|
|
|---|---|
Displays the trust state and the ARP packet rate for a specified interface. |
|
Displays DHCP snooping configuration, including DAI configuration. |
show ip arp inspection statistics
Use the show ip arp inspection statistics command to display the Dynamic ARP Inspection (DAI) statistics. You can specify a VLAN or range of VLANs.
show ip arp inspection statistics [ vlan vlan-list ]
Syntax Description
(Optional) Specifies the list of VLANs for which to display DAI statistics. Valid VLAN IDs are from 1 to 4096. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the DAI statistics for VLAN 1:
Related Commands
|
|
|
|---|---|
Displays the trust state and the ARP packet rate for a specified interface. |
|
Displays DHCP snooping configuration, including DAI configuration. |
show ip arp inspection vlan
Use the show ip arp inspection vlan command to display Dynamic ARP Inspection (DAI) status for the specified list of VLANs.
show ip arp inspection vlan vlan-list
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Examples
This example shows how to display DAI status for VLANs 1 and 13:
Related Commands
|
|
|
|---|---|
Displays the trust state and the ARP packet rate for a specified interface. |
|
Displays DHCP snooping configuration, including DAI configuration. |
show ip device tracking
To display IP device tracking information, use the show ip device tracking command.
show ip device tracking { all | interface ethernet slot / port | ip-address ipv4-address | mac-address mac-address }
Syntax Description
Displays IP tracking device information for an IPv4 address in the A.B.C.D format. |
|
Displays IP tracking information for a MAC address in the XXXX.XXXX.XXXX format. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display all IP device tracking information:
This example shows how to display the IP device tracking information for an interface:
This example shows how to display the IP device tracking information for an IP address:
This example shows how to display the IP device tracking information for a MAC address:
Related Commands
|
|
|
|---|---|
show ip dhcp relay
To display DHCP snooping relay status, including DHCP server address configuration details, use the show ip dhcp relay command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
This command was modified. An example for a helper address configuration on a bridge domain interface (BDI) was added. |
Usage Guidelines
Examples
This example shows how to display the DHCP relay status and configured DHCP server addresses:
This example shows how to display the DHCP relay status and configured DHCP server addresses. In this example, the helper address is configured on a bridge domain interface.
Related Commands
|
|
|
|---|---|
show ip dhcp relay address
To display DHCP server addresses configured on the device, use the show ip dhcp relay address command.
show ip dhcp relay address [ interface { ethernet list | port-channel list }]
show ip dhcp relay address [ interface interface-list ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Support was added for the interface keyword and for VRF awareness. |
|
Usage Guidelines
Examples
This example shows how to display all the DHCP relay addresses configured on a device:
This example shows how to display the DHCP relay addresses configured Ethernet interfaces 1/2 through 1/4 and Ethernet 1/8:
Related Commands
|
|
|
|---|---|
Shows DHCP relay status and server addresses configured on the device. |
show ip dhcp relay statistics
To display the DHCP relay statistics, use the show ip dhcp relay statistics command.
show ip dhcp relay statistics [ interface interface ]
Syntax Description
Displays the DHCP relay address of the interface. The supported interface types are ethernet, port-channel, and VLAN. |
Defaults
Command Modes
Command History
|
|
|
This command was modified. An example for DHCP relay statistics information for a Bridge Domain Interface (BDI) was added. |
Usage Guidelines
Examples
This example shows how to display DHCP relay statistics for an interface:
Related Commands
|
|
|
|---|---|
show ip dhcp snooping
To display general status information for DHCP snooping, use the show ip dhcp snooping command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display general status information about DHCP snooping:
Related Commands
|
|
|
|---|---|
Displays IP-MAC address bindings, including the static IP source entries. |
|
show ip dhcp snooping binding
To display IP-to-MAC address bindings for all interfaces or a specific interface, use the show ip dhcp snooping binding command. It includes static IP source entries. Static entries appear with the term “static” in the Type column.
show ip dhcp snooping binding [ IP-address ] [ MAC-address ] [ interface ethernet slot / port ] [ vlan vlan-id ]
show ip dhcp snooping binding [ dynamic ]
show ip dhcp snooping binding [ static ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display all bindings:
Related Commands
|
|
|
|---|---|
Displays DHCP snooping configuration, including IP Source Guard configuration. |
show ip dhcp snooping statistics
To display DHCP snooping statistics, use the show ip dhcp snooping statistics command.
show ip dhcp snooping statistics
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
This command does not require a license.
- Packets processed —The number of packets containing DHCP messages.
- Packets forwarded —The number of packets containing DHCP messages forwarded by the relay agent.
- Total packets dropped —The total number of packets containing DHCP messages that were dropped. The reasons for dropping the packets are as follows:
–
Received from untrusted ports —The number of packets containing DHCP messages, particularly DHCPOFFER packets, received from untrusted ports.
Examples
This example shows how to display DHCP snooping statistics:
Related Commands
|
|
|
|---|---|
Displays IP-MAC address bindings, including the static IP source entries. |
|
show ip verify source
To display the IP-to-MAC address bindings, use the show ip verify source command.
show ip verify source [ interface { ethernet slot / port | port-channel channel-number }]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the IP-to-MAC address bindings:
Related Commands
|
|
|
|---|---|
Creates a static IP source entry for the specified Ethernet interface. |
|
Displays DHCP snooping configuration, including IP Source Guard configuration. |
show ipv6 access-lists
To display all IPv6 access-control lists (ACLs) or a specific IPv6 ACL, use the show ipv6 access-lists command.
show ipv6 access-lists [ access-list-name ] [ expanded | summary ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
The device shows all IPv6 ACLs, unless you use the access-list-name argument to specify an ACL.
If you do not specify an ACL name, the device lists ACLs alphabetically by the ACL names.
IPv6 address object groups and IP port object groups show only by name, unless you use the expanded keyword.
The expanded keyword allows you to display the details of object groups used in an ACL rather than only the name of the object groups. For more information about object groups, see the object-group ipv6 address and object-group ip port commands.
The summary keyword allows you to display information about the ACL rather than the ACL configuration. The information displayed includes the following:
- Whether per-entry statistics are configured for the ACL.
- Whether the fragments command is configured for the ACL.
- The number of rules in the ACL configuration. This number does not reflect how many entries that the ACL contains when the device applies it to an interface. If a rule in the ACL uses an object group, the number of entries in the ACL when it is applied may be much greater than the number of rules.
- The interfaces that the ACL is applied to.
- The interfaces that the ACL is active on.
The show ipv6 access-lists command displays statistics for each entry in an ACL if the following conditions are both true:
- The ACL configuration contains the statistics per-entry command.
- The ACL is applied to an interface that is administratively up.
If an IP ACL includes the fragments command, it appears before the explicit permit and deny rules, but the device applies the fragments command to noninitial fragments only if they do not match all other explicit rules in the ACL.
Examples
This example shows how to use the show ipv6 access-lists command to display all IPv6 ACLs on a device that has a single IPv6 ACL:
This example shows how to use the show ipv6 access-lists command to display an IPv6 ACL named ipv6-RandD-outbound-web, including per-entry statistics for the entries except for the LowerLab object group:
This example shows how to use the show ipv6 access-lists command to display an IPv6 ACL named ipv6-RandD-outbound-web. The expanded keyword causes the contents of the object group from the previous example to appear, including the per-entry statistics:
This example shows how to use the show ipv6 access-lists command with the summary keyword to display information about an IPv6 ACL named ipv6-RandD-outbound-web, such as which interfaces the ACL is applied to and active on:
Related Commands
|
|
|
|---|---|
Starts recording statistics for packets permitted or denied by each entry in an ACL. |
show ipv6 dhcp-ldra
To display configuration details and statistics for the Lightweight DHCPv6 Relay Agent (LDRA), use the show ipv6 dhcp-ldra command.
show ipv6 dhcp-ldra [statistics]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the LDRA feature by using the ipv6 dhcp-ldra command.
Examples
This example shows how to enable the LDRA feature on the specified interface:
Related Commands
|
|
|
|---|---|
show ipv6 dhcp relay
To display the DHCPv6 relay global or interface-level configuration, including DHCPv6 server addresses configured on interfaces, use the show ipv6 dhcp relay command.
show ipv6 dhcp relay [ interface interface]
Syntax Description
(Optional) Displays the DHCPv6 relay address of the interface. The supported interface types are ethernet, port-channel, and VLAN. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the globally configured DHCPv6 relay status and DHCPv6 server addresses:
Related Commands
|
|
|
|---|---|
show ipv6 dhcp relay statistics
To display the DHCPv6 relay statistics, use the show ipv6 dhcp relay statistics command.
show ipv6 dhcp relay statistics [ interface interface]
Syntax Description
(Optional) Displays the DHCPv6 relay address of the interface. The supported interface types are ethernet, port-channel, and VLAN. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the globally configured DHCPv6 relay statistics:
Related Commands
|
|
|
|---|---|
show ip udp relay
To display the configuration details of the UDP relay feature, use the show ip udp relay command.
show ip udp relay [interface [ethernet slot/port-number | port-channel port-channel-number] | object-group object-group-name]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the details of the UDP relay feature:
Related Commands
|
|
|
|---|---|
show key chain
To display the configuration for a specific keychain, use the show key chain command.
show key chain keychain-name [ mode decrypt ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display keychain configuration for the keychain glbp-key, which contains one key (key 13) which has specific accept and send lifetimes:
Related Commands
|
|
|
|---|---|
show ldap-search-map
To display information about the configured Lightweight Directory Access Protocol (LDAP) attribute maps, use the show ldap -search-map command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must use the feature ldap command before you can display LDAP information.
Examples
This example shows how to display information about the configured LDAP attribute maps:
Related Commands
show ldap-server
To display the Lightweight Directory Access Protocol (LDAP) server configuration, use the show ldap-server command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must use the feature ldap command before you can display LDAP information.
Examples
This example shows how to display the LDAP server configuration:
Related Commands
|
|
|
|---|---|
Specifies the IPv4 or IPv6 address or hostname for an LDAP server. |
show ldap-server groups
To display the Lightweight Directory Access Protocol (LDAP) server group configuration, use the show ldap-server groups command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must use the feature ldap command before you can display LDAP information.
Examples
This example shows how to display the LDAP server group configuration:
Related Commands
|
|
|
|---|---|
Creates an LDAP server group and enters the LDAP server group configuration mode for that group. |
|
show ldap-server statistics
To display the Lightweight Directory Access Protocol (LDAP) server statistics, use the show ldap-server statistics command.
show ldap-server statistics { ipv4-address | ipv6-address | host-name }
Syntax Description
Server name. The name is alphanumeric, case sensitive, and has a maximum of 256 characters. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must use the feature ldap command before you can display LDAP information.
Examples
This example shows how to display the statistics for an LDAP server:
Related Commands
|
|
|
|---|---|
Specifies the IPv4 or IPv6 address or hostname for an LDAP server. |
show mac access-lists
To display all MAC access control lists (ACLs) or a specific MAC ACL, use the show mac access-lists command.
show mac access-lists [ access-list-name ] [ expanded | summary ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
The device shows all MAC ACLs, unless you use the access-list-name argument to specify an ACL.
If you do not specify an ACL name, the device lists ACLs alphabetically by the ACL names.
The expanded keyword allows you to display the details of object groups used in an ACL rather than only the name of the object groups. For more information about object groups, see the object-group ip address, object-group ipv6 address, and object-group ip port commands.
The summary keyword allows you to display information about the ACL rather than the ACL configuration. The information displayed includes the following:
- Whether per-entry statistics are configured for the ACL.
- The number of rules in the ACL configuration. This number does not reflect how many entries that the ACL contains when the device applies it to an interface. If a rule in the ACL uses an object group, the number of entries in the ACL when it is applied may be much greater than the number of rules.
- The interfaces that the ACL is applied to.
- The interfaces that the ACL is active on.
The show mac access-lists command displays statistics for each entry in an ACL if the following conditions are both true:
Examples
This example shows how to use the show mac access-lists command to show all MAC ACLs on a device with a single MAC ACL:
This example shows how to use the show mac access-lists command to display a MAC ACL named mac-lab-filter, including per-entry statistics:
This example shows how to use the show mac access-lists command with the summary keyword to display information about a MAC ACL named mac-lab-filter, such as which interfaces the ACL is applied to and active on:
Related Commands
|
|
|
|---|---|
show password secure-mode
To display the secure mode for changing password, use the show password secure-mode command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the secure mode for changing password:
Related Commands
|
|
|
|---|---|
show password strength-check
To display password-strength checking status, use the show password strength-check command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display password-strength checking status:
Related Commands
|
|
|
|---|---|
Displays security feature configuration in the running configuration. |
show policy-map interface control-plane
To display packet-level statistics for all classes that are part of the applied control plane policing (CoPP) policy, use the show policy-map interface control-plane command.
show policy-map interface control-plane [ class class-name ] [ module module-number ]
Syntax Description
Displays the packet-level statistics for the specific class. |
|
Displays the packet-level statistics for the specific module. The range is from 1 to 18. |
Command Modes
Command History
|
|
|
Usage Guidelines
Use this command to display the policy values with associated class maps and drops per policy or class map. It also displays the scale factor values when a CoPP policy is applied. When the scale factor value is the default (1.00), it is not displayed.
Note
The scale factor changes the CIR, BC, PIR, and BE values internally on each module, but the display shows the configured CIR, BC, PIR, and BE values only. The actual applied value on a module is the scale factor multiplied by the configured value.
Examples
This example shows how to monitor CoPP:
This example shows the 5-minute moving averages and peaks of the conformed and violated byte counts in the output of the show policy-map interface control-plane command. In this example, the 5-minute offered rate is the 5-minute moving average of the conformed bytes, the 5-minute violate rate is the 5-minute moving average of the violated bytes, and the peak rate is the highest value since bootup or counter reset, with the peak occurring at the time stamp shown.
Related Commands
|
|
|
|---|---|
Displays the CoPP status, including the last configuration operation and its status. |
show policy-map type control-plane
To display control plane policy map information, use the show policy-map type control-plane command.
show policy-map type control-plane [ expand ] [ name policy-map-name ]
Syntax Description
(Optional) Displays expanded control plane policy map information. |
|
(Optional) Specifies the name of the control plane policy map. The name is case sensitive. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You can use this command only in the default virtual device context (VDC).
Examples
This example shows how to display control plane policy map information:
show port-security
To show the state of port security on the device, use the show port-security command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to use the show port-security command to view the status of the port security feature on a device:
Related Commands
|
|
|
|---|---|
show port-security address
To show information about MAC addresses secured by the port security feature, use the show port-security address command.
show port-security address [ interface { port-channel channel-number | ethernet slot / port }]
Syntax Description
(Optional) Limits the port-security MAC address information to a specific interface. |
|
Specifies a Layer 2 port-channel interface. The channel-number argument can be a whole number from 1 to 4096. |
|
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to use the show port-security address command to view information about all MAC addresses secured by port security:
This example shows how to use the show port-security address command to view the MAC addresses secured by the port security feature on the Ethernet 1/4 interface:
Related Commands
|
|
|
|---|---|
show port-security interface
To show the state of port security on a specific interface, use the show port-security interface command.
show port-security interface { port-channel channel-number | ethernet slot / port }
Syntax Description
Specifies a Layer 2 port-channel interface. The channel-number argument can be a whole number from 1 to 4096. |
|
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to use the show port-security interface command to view the status of the port security feature on the Ethernet 1/4 interface:
Related Commands
|
|
|
|---|---|
show privilege
To show the current privilege level, username, and status of cumulative privilege support, use the show privileg e command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to use the show privilege command to view the current privilege level, username, and status of cumulative privilege support:
Related Commands
|
|
|
|---|---|
Enables the cumulative privilege of roles for command authorization on TACACS+ servers. |
|
show radius
To display the RADIUS Cisco Fabric Services (CFS) distribution status and other details, use the show radius command.
show radius { distribution status | merge status | pending [ cmds ] | pending-diff | session status | status }
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the RADIUS CFS distribution status:
This example shows how to display the RADIUS merge status:
This example shows how to display the RADIUS CFS session status:
This example shows how to display the RADIUS CFS status:
This example shows how to display the pending RADIUS configuration:
This example shows how to display the pending RADIUS configuration commands:
This example shows how to display the differences between the pending RADIUS configuration and the current RADIUS configuration:
show radius-server
To display RADIUS server information, use the show radius-server command.
show radius-server [ hostname | ipv4-address | ipv6-address ]
[ directed-request | groups | sorted | statistics ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
RADIUS preshared keys are not visible in the show radius-server command output. Use the show running-config radius command to display the RADIUS preshared keys.
Examples
This example shows how to display information for all RADIUS servers:
This example shows how to display information for a specified RADIUS server:
This example shows how to display the RADIUS directed request configuration:
This example shows how to display information for RADIUS server groups:
This example shows how to display information for a specified RADIUS server group:
This example shows how to display sorted information for all RADIUS servers:
This example shows how to display statistics for a specified RADIUS server:
Related Commands
|
|
|
|---|---|
Displays the RADIUS information in the running configuration file. |
show role
To display the user role configuration, use the show role command.
Syntax Description
(Optional) Displays information for a specific user role name. The role name is case sensitive. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display information for a specific user role:
This example shows how to display information for all user roles in the default virtual device context (VDC):
This example shows how to display information for all user roles in a nondefault virtual device context (VDC):
Related Commands
|
|
|
|---|---|
show role feature
To display the user role features, use the show role feature command.
show role feature [ detail | name feature-name ]
Syntax Description
(Optional) Displays detailed information for a specific feature. The feature name is case sensitive. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the user role features:
This example shows how to display detailed information for all the user role features:
This example shows how to display detailed information for a specific user role feature:
Related Commands
|
|
|
|---|---|
show role feature-group
To display the user role feature groups, use the show role feature-group command.
show role feature-group [ detail | name group-name ]
Syntax Description
(Optional) Displays detailed information for all feature groups. |
|
(Optional) Displays detailed information for a specific feature group. The group name is case sensitive. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the user role feature groups:
This example shows how to display detailed information about all the user role feature groups:
This example shows how to display information for a specific user role feature group:
Related Commands
|
|
|
|---|---|
show role pending
To display the pending user role configuration differences for the Cisco Fabric Services distribution session, use the show role pending command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example displays the user role configuration differences for the Cisco Fabric Services session:
Related Commands
|
|
|
|---|---|
Enables Cisco Fabric Services distribution for the user role configuration. |
show role pending-diff
To display the differences between the pending user role configuration for the Cisco Fabric Services distribution session and the running configuration, use the show role pending-diff command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example displays the user role configuration differences for the Cisco Fabric Services session:
Related Commands
|
|
|
|---|---|
Enables Cisco Fabric Services distribution for the user role configuration. |
show role session
To display the status information for a user role Cisco Fabric Services session, use the show role session command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example displays the user role configuration differences for the Cisco Fabric Services session:
Related Commands
|
|
|
|---|---|
Enables Cisco Fabric Services distribution for the user role configuration. |
show role status
To display the status for the Cisco Fabric Services distribution for the user role feature, use the show role status command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example displays the user role configuration differences for the Cisco Fabric Services session:
Related Commands
|
|
|
|---|---|
Enables Cisco Fabric Services distribution for the user role configuration. |
show running-config aaa
To display authentication, authorization, and accounting (AAA) configuration information in the running configuration, use the show running-config aaa command.
show running-config aaa [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the configured AAA information in the running configuration:
show running-config aclmgr
To display the user-configured access control lists (ACLs) in the running configuration, use the show running-config aclmgr command.
show running-config aclmgr [ all | inactive-if-config ]
Syntax Description
Displays both the default (CoPP-configured) and user-configured ACLs in the running configuration. |
|
Displays the inactive policies in the running configuration. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display user-configured ACLs in the running configuration:
Related Commands
show running-config copp
To display control plane policing configuration information in the running configuration, use the show running-config copp command.
show running-config copp [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You can use this command only in the default virtual device context (VDC).
Examples
This example shows how to display the configured control plane policing information in the running configuration:
This example shows how to display the configured and default control plane policing information in the running configuration:
show running-config cts
To display the Cisco TrustSec configuration in the running configuration, use the show running-config cts command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command.
Examples
This example shows how to display the Cisco TrustSec configuration in the running configuration:
Related Commands
|
|
|
|---|---|
show running-config dhcp
To display the Dynamic Host Configuration Protocol (DHCP) snooping configuration in the running configuration and verify other DHCP configurations on a device, use the show running-config dhcp command.
show running-config dhcp [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
This command was modified. A sample output for DHCP relay configuration on a Bridge Domain Interface (BDI) was added. |
Usage Guidelines
To use this command, you must enable the DHCP snooping feature using the feature dhcp command.
Examples
This example shows how to display the DHCP snooping configuration:
This example shows how to verify DHCP configurations on the device. DHCP relay configuration information is also displayed in the example.
Related Commands
|
|
|
|---|---|
Displays IP-MAC address bindings, including the static IP source entries. |
show running-config dot1x
To display 802.1X configuration information in the running configuration, use the show running-config dot1x command.
show running-config dotx1 [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the 802.1X feature by using the feature dot1x command before using this command.
Examples
This example shows how to display the configured 802.1X information in the running configuration:
show running-config eou
To display the Extensible Authentication Protocol over User Datagram Protocol (EAPoUDP) configuration information in the running configuration, use the show running-config eou command.
show running-config eou [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the EAPoUDP feature by using the feature eou command before using this command.
Examples
This example shows how to display the configured EAPoUDP information in the running configuration:
show running-config ldap
To display Lightweight Directory Access Protocol (LDAP) server information in the running configuration, use the show running-config ldap command.
show running-config ldap [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must use the feature ldap command before you can display LDAP information.
Examples
This example shows how to display LDAP information in the running configuration:
Related Commands
|
|
|
|---|---|
show running-config port-security
To display port-security information in the running configuration, use the show running-config port-security command.
show running-config port-security [ all ]
Syntax Description
(Optional) Displays default port-security configuration information. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display information for port-security in the running configuration:
Related CommandsA
|
|
|
|---|---|
Displays port-security information in the startup configuration. |
show running-config radius
To display RADIUS server information in the running configuration, use the show running-config radius command.
show running-config radius [ all ]
Syntax Description
(Optional) Displays default RADIUS configuration information. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display information for RADIUS in the running configuration:
Related Commands
|
|
|
|---|---|
show running-config security
To display a user account, Secure Shell (SSH) server, and Telnet server information in the running configuration, use the show running-config security command.
show running-config security [ all ]
Syntax Description
(Optional) Displays the default user account, SSH server, and Telnet server configuration information. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display user account, SSH server, and Telnet server information in the running configuration:
show running-config tacacs+
To display TACACS+ server information in the running configuration, use the show running-config tacacs+ command.
show running-config tacacs+ [ all ]
Syntax Description
(Optional) Displays default TACACS+ configuration information. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must use the feature tacacs+ command before you can display TACACS+ information.
Examples
This example shows how to display TACACS+ information in the running configuration:
Related Commands
|
|
|
|---|---|
show ssh key
To display the Secure Shell (SSH) server key for a virtual device context (VDC), use the show ssh key command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
This command is available only when SSH is enabled using the feature ssh command.
Examples
This example shows how to display the SSH server key:
Related Commands
|
|
|
|---|---|
show ssh server
To display the Secure Shell (SSH) server status for a virtual device context (VDC), use the show ssh server command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the SSH server status:
Related Commands
|
|
|
|---|---|
show startup-config aaa
To display authentication, authorization, and accounting (AAA) configuration information in the startup configuration, use the show startup-config aaa command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the AAA information in the startup configuration:
show startup-config aclmgr
To display the user-configured access control lists (ACLs) in the startup configuration, use the show startup-config aclmgr command.
show startup-config aclmgr [ all ]
Syntax Description
Displays both the default (CoPP-configured) and user-configured ACLs in the startup configuration. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the user-configured ACLs in the startup configuration:
Related Commands
show startup-config copp
To display the Control Plane Policing (CoPP) configuration information in the startup configuration, use the show startup-config copp command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You can use this command only in the default virtual device context (VDC).
Examples
This example shows how to display the control plane policing information in the startup configuration:
show startup-config dhcp
To display the Dynamic Host Configuration Protocol (DHCP) snooping configuration in the startup configuration, use the show startup-config dhcp command.
show startup-config dhcp [ all ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
To use this command, you must enable the DHCP snooping feature using the feature dhcp command.
Examples
This example shows how to display the DHCP snooping configuration in the startup configuration:
Related Commands
|
|
|
|---|---|
Shows DHCP snooping configuration in the running configuration. |
show startup-config dot1x
To display 802.1X configuration information in the startup configuration, use the show startup-config dot1x command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the 802.1X feature by using the feature dot1x command before using this command.
Examples
This example shows how to display the 802.1X information in the startup configuration:
show startup-config eou
To display the Extensible Authentication Protocol over User Datagram Protocol (EAPoUDP) configuration information in the startup configuration, use the show startup-config eou command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must enable the EAPoUDP feature by using the feature eou command before using this command.
Examples
This example shows how to display the EAPoUDP information in the startup configuration:
show startup-config ldap
To display Lightweight Directory Access Protocol (LDAP) configuration information in the startup configuration, use the show startup-config ldap command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
You must use the feature ldap command before you can display LDAP information.
Examples
This example shows how to display the LDAP information in the startup configuration:
Related Commands
|
|
|
|---|---|
show startup-config port-security
To display port-security information in the startup configuration, use the show startup-config port-security command.
show startup-config port-security [ all ]
Syntax Description
(Optional) Displays default port-security configuration information. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display information for port-security in the startup configuration:
Related Commands
|
|
|
|---|---|
Displays port-security information in the running configuration. |
show startup-config radius
To display RADIUS configuration information in the startup configuration, use the show startup-config radius command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the RADIUS information in the startup configuration:
show startup-config security
To display user account, Secure Shell (SSH) server, and Telnet server configuration information in the startup configuration, use the show startup-config security command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the user account, SSH server, and Telnet server information in the startup configuration:
show startup-config tacacs+
To display TACACS+ configuration information in the startup configuration, use the show startup-config tacacs+ command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the TACACS+ information in the startup configuration:
show system internal access-list feature bank-class map
To display the access control list (ACL) ternary content addressable memory (TCAM) bank mapping feature group and class combination tables, use the show system internal access-list feature bank-class map command.
show system internal access-list feature bank-class map { ingress | egress } [ module module]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the feature group and class combination tables for ingress module 4:
Related Commands
|
|
|
|---|---|
Enables ACL TCAM bank mapping for feature groups and classes. |
show system internal access-list feature bank-chain map
To display the access control list (ACL) ternary content addressable memory (TCAM) bank mapping feature group and combination tables, use the show system internal access-list feature bank-chain map command.
show system internal access-list feature bank-chain map {port-vlan | vlan-vlan} { ingress | egress } [ module module]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the feature group and class combination tables for ingress module 2:
Related Commands
|
|
|
|---|---|
Enables ACL TCAM bank mapping for feature groups and classes. |
show system internal access-list globals
To display the access control list (ACL) ternary content addressable memory (TCAM) common information along with the bank chaining mode, use the show system internal access-list globals command.
show system internal access-list globals
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the bank chaining mode:
Related Commands
|
|
|
|---|---|
Enables ACL TCAM bank mapping for feature groups and classes. |
show system internal pktmgr internal control sw-rate-limit
To display the inband and outband global rate limit configuration for packets that reach the supervisor module, use the show system internal pktmgr internal control sw-rate-limit command.
show system internal pktmgr internal control sw-rate-limit
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the inband and outband global rate limit configuration for packets that reach the supervisor module:
Related Commands
|
|
|
|---|---|
Configures rate limits globally on the device for packets that reach the supervisor module. |
show system internal udp-relay database
To display the configuration details of the UDP relay feature, use the show system internal udp-relay database command.
show system internal udp-relay database
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the details of the UDP relay feature:
Related Commands
|
|
|
|---|---|
show tacacs+
To display the TACACS+ Cisco Fabric Services (CFS) distribution status and other details, use the show tacacs+ command.
show tacacs+ { distribution status | pending [ cmds ] | pending-diff }
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the TACACS+ CFS status:
This example shows how to display the TACACS+ merge status:
This example shows how to display the pending TACACS+ configuration:
This example shows how to display the pending TACACS+ configuration commands:
This example shows how to display the differences between the pending TACACS+ configuration and the current TACACS+configuration:
show tacacs-server
To display TACACS+ server information, use the show tacacs-server command.
show tacacs-server [ hostname | ip4-address | ipv6-address ]
[ directed-request | groups | sorted | statistics ]
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
TACACS+ preshared keys are not visible in the show tacacs-server command output. Use the show running-config tacacs+ command to display the TACACS+ preshared keys.
You must use the feature tacacs+ command before you can display TACACS+ information.
Examples
This example shows how to display information for all TACACS+ servers:
This example shows how to display information for a specified TACACS+ server:
This example shows how to display the TACACS+ directed request configuration:
This example shows how to display information for TACACS+ server groups:
This example shows how to display information for a specified TACACS+ server group:
This example shows how to display sorted information for all TACACS+ servers:
This example shows how to display statistics for a specified TACACS+ servers:
Related Commands
|
|
|
|---|---|
Displays the TACACS+ information in the running configuration file. |
show telnet server
To display the Telnet server status for a virtual device context (VDC), use the show telnet server command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display the Telnet server status:
Related Commands
|
|
|
|---|---|
show time-range
To display all time ranges or a specific time range, use the show time-range command.
show time-range [ time-range-name ]
Syntax Description
(Optional) Name of a time range, which can be up to 64 alphanumeric, case-sensitive characters. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
The device shows all time ranges unless you use the time-range-name argument to specify a time range.
If you do not specify a time-range name, the device lists time ranges alphabetically by the time-range names.
The output of the show time-range command indicates whether a time range is active, which means that the current system time on the device falls within the configured time range.
Examples
This example shows how to use the show time-range command without specifying a time-range name on a device that has two time ranges configured, where one of the time ranges is inactive and the other is active:
Related Commands
|
|
|
|---|---|
show user-account
To display information for the user accounts in a virtual device context (VDC), use the show user-account command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display information for user accounts in the default virtual device context (VDC):
This example shows how to display information for user accounts in a nondefault VDC:
Related Commands
|
|
|
|---|---|
show username
To display the public key for the specified user, use the show username command.
show username username keypair
Syntax Description
Name of the user. You can enter up to 28 alphanumeric characters. |
|
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
This command does not require a license.
For security reasons, this command does not show the private key.
Examples
This example shows how to display the public key for the specified user:
Related Commands
|
|
|
|---|---|
Generates the SSH public and private keys and stores them in the home directory of the Cisco NX-OS device for the specified user. |
show users
To display the user session information for a virtual device context (VDC), use the show users command.
Syntax Description
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display user session information in the default virtual device context (VDC):
This example shows how to display information for user accounts in a nondefault VDC:
Related Commands
|
|
|
|---|---|
show vlan access-list
To display the contents of the IPv4 access control list (ACL), IPv6 ACL, or MAC ACL associated with a specific VLAN access map, use the show vlan access-list command.
show vlan access-list access-list-name
Syntax Description
Name of the VLAN access map, which can be up to 64 alphanumeric, case-sensitive characters. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to use the show vlan access-list command to display the contents of the ACL that the VLAN access map named vacl-01 is configured to use:
Related Commands
|
|
|
|---|---|
Displays all VLAN access maps or a specific VLAN access map. |
show vlan access-map
To display all VLAN access maps or a VLAN access map, use the show vlan access-map command.
Syntax Description
VLAN access map, which can be up to 64 alphanumeric, case-sensitive characters. |
Defaults
Command Modes
Command History
|
|
|
Usage Guidelines
The device shows all VLAN access maps, unless you use the map-name argument to specify an access map.
If you do not specify an access-map name, the device lists VLAN access maps alphabetically by access-map name.
For each VLAN access map displayed, the device shows the access-map name, the ACL specified by the match command, and the action specified by the action command.
Use the show vlan filter command to see which VLANs have a VLAN access map applied to them.
Examples
This example shows how to remove dynamically learned, secure MAC addresses from the Ethernet 2/1 interface:
Related Commands
show vlan filter
To display information about instances of the vlan filter command, including the VLAN access-map and the VLAN IDs affected by the command, use the show vlan filter command.
show vlan filter [ access-map map-name | vlan vlan-ID ]
Syntax Description
Defaults
The device shows all instances of VLAN access maps applied to a VLAN, unless you use the access-map keyword and specify an access map, or you use the vlan keyword and specify a VLAN ID.
Command Modes
Command History
|
|
|
Usage Guidelines
Examples
This example shows how to display all VLAN access map information on a device that has only one VLAN access map applied (austin-vlan-map) to VLANs 20 through 35 and 42 through 80:
Related Commands
|
|
|
|---|---|
Specifies an action for traffic filtering in a VLAN access map. |
|
Specifies an ACL for traffic filtering in a VLAN access map. |
|
Feedback