- Index
- Preface
- Using the Command-Line Interface
- Catalyst 3750-X and 3560-X Switch Cisco IOS Commands - aaa accounting through reserved-only
- Catalyst 3750-X and 3560-X Switch Cisco IOS Commands - rmon collection through show vtp
- Catalyst 3750-X and 3560-X Switch Cisco IOS Commands - shutdown through vtp
- Catalyst 3750-X and 3560-X Switch Bootloader Commands
- Catalyst 3750-X and 3560-X Switch Debug Commands
- Catalyst 3750-X and 3560-X Switch Show Platform Commands
- Acknowledgments for Open-Source Software
- rmon collection stats
- rsu
- sdm prefer
- service password-recovery
- service-policy
- session
- set
- setup
- setup express
- show access-lists
- show archive status
- show arp access-list
- show authentication
- show auto qos
- show boot
- show cable-diagnostics tdr
- show cdp forward
- show cisp
- show class-map
- show cluster
- show cluster candidates
- show cluster members
- show controllers cpu-interface
- show controllers ethernet-controller
- show controllers ethernet-controller fastethernet
- show controllers ethernet phy macsec
- show controllers power inline
- show controllers tcam
- show controllers utilization
- show device-sensor cache
- show diagnostic
- show dot1q-tunnel
- show dot1x
- show dtp
- show eap
- show env
- show env xps
- show errdisable detect
- show errdisable flap-values
- show errdisable recovery
- show etherchannel
- show fallback profile
- show flowcontrol
- show hw-module switch
- show idprom interface
- show interfaces
- show interfaces counters
- show interfaces rep
- show interfaces transceivers
- show inventory
- show ip arp inspection
- show ip dhcp snooping
- show ip dhcp snooping binding
- show ip dhcp snooping database
- show ip dhcp snooping statistics
- show ip igmp profile
- show ip igmp snooping
- show ip igmp snooping groups
- show ip igmp snooping mrouter
- show ip igmp snooping querier
- show ip source binding
- show ip verify source
- show ipc
- show ipv6 access-list
- show ipv6 dhcp conflict
- show ipv6 mld snooping
- show ipv6 mld snooping address
- show ipv6 mld snooping mrouter
- show ipv6 mld snooping querier
- show ipv6 route updated
- show l2protocol-tunnel
- show lacp
- show link state group
- show location
- show logging onboard
- show logging smartlog
- show mac access-group
- show mac address-table
- show mac address-table address
- show mac address-table aging-time
- show mac address-table count
- show mac address-table dynamic
- show mac address-table interface
- show mac address-table learning
- show mac address-table move update
- show mac address-table notification
- show mac address-table static
- show mac address-table vlan
- show macsec
- show mka default-policy
- show mka policy
- show mka session
- show mka statistics
- show mka summary
- show mls qos
- show mls qos aggregate-policer
- show mls qos input-queue
- show mls qos interface
- show mls qos maps
- show mls qos queue-set
- show mls qos vlan
- show monitor
- show mvr
- show mvr interface
- show mvr members
- show network-policy profile
- show nmsp
- show pagp
- show policy-map
- show port-security
- show power inline
- show psp config
- show psp statistics
- show rep topology
- show sdm prefer
- show setup express
- show spanning-tree
- show stack-power
- show storm-control
- show switch
- show switch service-modules
- show system mtu
- show udld
- show version
- show vlan
- show vlan access-map
- show vlan filter
- show vmps
- show vtp
rmon collection stats
Use the rmon collection stats interface configuration command on the switch stack or on a standalone switch to collect Ethernet group statistics, which include usage statistics about broadcast and multicast packets, and error statistics about cyclic redundancy check (CRC) alignment errors and collisions. Use the no form of this command to return to the default setting.
rmon collection stats index [ owner name ]
no rmon collection stats index [ owner name ]
Syntax Description
Remote Network Monitoring (RMON) collection control index. The range is 1 to 65535. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The RMON statistics collection command is based on hardware counters.
Examples
This example shows how to collect RMON statistics for the owner root :
You can verify your setting by entering the show rmon statistics privileged EXEC command.
Related Commands
|
|
---|---|
rsu
To configure redundant uplinks to the network during the rolling stack upgrade process, use the rsu command in interface configuration mode. Use the no form of this command to return to the default setting.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If spanning tree protocol (STP) is enabled, set the standby role to the blocked interface.
Examples
To set a member interface role to standby :
Related Commands
|
|
---|---|
archive download-sw /rolling-stack upgrade |
Starts the rolling state upgrade process to upgrade the members one at a time. |
show switch stack-upgrade { sequence | status } |
Displays the sequence of the switches to be upgraded or the rolling stack upgrade status. |
sdm prefer
To configure the template used in Switch Database Management (SDM) resource allocation, use the sdm prefer command in global configuration mode. You can use a template to allocate system resources to best support the features being used in your application. Use a template to provide maximum system usage for unicast routing or for VLAN configuration or to select the dual IPv4 and IPv6 template to support IPv6 forwarding. To return to the default template, use the no form of this command.
sdm prefer { access | default | dual-ipv4-and-ipv6 { default | routing | vlan } | indirect-ipv4-and-ipv6- routing | routing | vlan }
Note Although visible in the command-line help, the ipe keyword is not supported. The routing keywords are not supported on switched running the LAN base feature set.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
You must reload the switch for the configuration to take effect. If you enter the show sdm prefer command before you enter the reload privileged EXEC command, the show sdm prefer command shows the template currently in use and the template that will become active after a reload.
Although these templates are visible on all switches, the resources on switches running the LAN base feature do not match those shown in the templates:
- Switches running the LAN base feature set support only 255 VLAN s, not 1024 as shown in all templates.
- Although the routing template is visible, the template is not supported.
- The LAN base feature set supports only 16 static IPv4 routes on SVIs and the switch must be running the default template for static routing.
- On switches running the LAN base feature set, none of the routing values shown for the templates are valid.
Follow these guidelines for switch stacks:
- In a switch stack, all stack members use the same SDM desktop template that is stored on the stack master. When a new switch member is added to a stack, the stored SDM configuration overrides the template configured on an individual switch.
- The IPv6 packets are routed in hardware across the stack, as long as the packet does not have exceptions (IPv6Options) and the switches have not run out of hardware resources.
- If a stack member cannot support the template that is running on the master switch, the switch goes into SDM mismatch mode, the master switch does not attempt to change the SDM template, and the switch cannot be a functioning member of the stack.
For more information about stacking, see the “Managing Switch Stacks” chapter in the software configuration guide.
Use the no sdm prefer command to set the switch to the default template.
The access template maximizes system resources for access control lists (ACLs) as required to accommodate a large number of ACLs.
The default templates balances the use of system resources.
Use the sdm prefer vlan global configuration command only on switches intended for Layer 2 switching with no routing. When you use the VLAN template, no system resources are reserved for routing entries, and any routing is done through software. This overloads the CPU and severely degrades routing performance.
Do not select a routing template ( sdm prefer routing, sdm prefer dual-ipv4 -and-ipv6 routing, or indirect-ipv4-and-ipv6-routing) when the switch is running the LAN base feature set. The LAN base feature set supports 16 static IPv4 routes on SVIs when the switch is running the default template.
Do not use the routing template if you do not have routing enabled on your switch. Entering the sdm prefer routing global configuration command prevents other features from using the memory allocated to unicast routing in the routing template.
Do not use the ipv4-and-ipv6 templates if you do not plan to enable IPv6 routing on the switch. Entering the sdm prefer ipv4-and-ipv6 { default | routing | vlan } global configuration command divides resources between IPv4 and IPv6, limiting those allocated to IPv4 forwarding.
Use the indirect-ipv4-and-ipv6-routing template to provide more space for IPv4 and IPv6 summary or indirect routes by providing less space for IPv4 policy-based routing entries and IPv6 ACL, QoS, and policy-based routes.
You can verify your settings by entering the show sdm prefer privileged EXEC command.
Table 2-23 lists the approximate number of each resource that is supported in each of the IPv4-only templates for a switch. The values in the template are based on 8 routed interfaces and 1024 VLANs and represent the approximate hardware boundaries set when a template is selected. If a section of a hardware resource is full, all processing overflow is sent to the CPU, seriously impacting switch performance.
Note On switches running the LAN base feature set, none of the routing values shown for the templates are valid.
|
|
|
|
|
---|---|---|---|---|
Internet Group Management Protocol (IGMP) groups and multicast routes |
||||
Table 2-24 lists the approximate number of each resource supported in each of the dual IPv4-and IPv6 templates.
Note On switches running the LAN base feature set, routing values shown in all templates are not valid.
|
|
|
||
---|---|---|---|---|
|
|
|
||
Examples
This example shows how to configure the access template on a switch:
This example shows how to configure the routing template on a switch running the IP base or IP services feature set:
This example shows how to configure the dual IPv4-and-IPv6 default template on a switch:
This example shows how to change a switch template to the default template.
Related Commands
|
|
---|---|
Displays the current SDM template in use or displays the templates that can be used, with approximate resource allocation per feature. |
service password-recovery
Use the service password-recovery global configuration command on the switch stack or on a standalone switch to enable the password-recovery mechanism (the default). This mechanism allows an end user with physical access to the switch to hold down the Mode button and interrupt the boot process while the switch is powering up and to assign a new password. Use the no form of this command to disable part of the password-recovery functionality. When the password-recovery mechanism is disabled, interrupting the boot process is allowed only if the user agrees to set the system back to the default configuration.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
As a system administrator, you can use the no service password-recovery command to disable some of the functionality of the password recovery feature by allowing an end user to reset a password only by agreeing to return to the default configuration.
To use the password-recovery procedure, a user with physical access to the switch holds down the Mode button while the unit powers up and for a second or two after the LED above port 1X turns off. When the button is released, the system continues with initialization.
If the password-recovery mechanism is disabled, this message appears:
If the user chooses not to reset the system to the default configuration, the normal boot process continues, as if the Mode button had not been pressed. If you choose to reset the system to the default configuration, the configuration file in flash memory is deleted, and the VLAN database file, flash:vlan.dat (if present), is deleted.
Note If you use the no service password-recovery command to control end user access to passwords, we recommend that you save a copy of the config file in a location away from the switch in case the end user uses the password recovery procedure and sets the system back to default values. Do not keep a backup copy of the config file on the switch.
If the switch is operating in VTP transparent mode, we recommend that you also save a copy of the vlan.dat file in a location away from the switch.
When you enter the service password-recovery or no service password-recovery command on the stack master, it is propagated throughout the stack and applied to all switches in the stack.
You can verify if password recovery is enabled or disabled by entering the show version privileged EXEC command.
Examples
This example shows how to disable password recovery on a switch or switch stack so that a user can only reset a password by agreeing to return to the default configuration.
Related Commands
|
|
---|---|
service-policy
Use the service-policy interface configuration command on the switch stack or on a standalone switch to apply a policy map defined by the policy-map command to the input of a physical port or a switch virtual interface (SVI). Use the no form of this command to remove the policy map and port association.
service-policy input policy-map-name
no service-policy input policy-map-name
Syntax Description
Apply the specified policy map to the input of a physical port or an SVI. |
Note Though visible in the command-line help strings, the history keyword is not supported, and you should ignore the statistics that it gathers. The output keyword is also not supported.
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Only one policy map per ingress port is supported.
Policy maps can be configured on physical ports or on SVIs. When VLAN-based quality of service (QoS) is disabled by using the no mls qos vlan-based interface configuration command on a physical port, you can configure a port-based policy map on the port. If VLAN-based QoS is enabled by using the mls qos vlan-based interface configuration command on a physical port, the switch removes the previously configured port-based policy map. After a hierarchical policy map is configured and applied on an SVI, the interface-level policy map takes effect on the interface.
You can apply a policy map to incoming traffic on a physical port or on an SVI. You can configure different interface-level policy maps for each class defined in the VLAN-level policy map. For more information about hierarchical policy maps, see the “Configuring QoS” chapter in the software configuration guide for this release.
Classification using a port trust state (for example, mls qos trust [ cos | dscp | ip-precedence ] and a policy map (for example, service-policy input policy-map-name) are mutually exclusive. The last one configured overwrites the previous configuration.
Examples
This example shows how to apply plcmap1 to an physical ingress port:
This example shows how to remove plcmap2 from a physical port:
This example shows how to apply plcmap1 to an ingress SVI when VLAN-based QoS is enabled:
This example shows how to create a hierarchical policy map and attach it to an SVI:
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands
|
|
---|---|
Creates or modifies a policy map that can be attached to multiple ports to specify a service policy. |
|
session
Use the session privileged EXEC command on the stack master to access a specific stack member.
Note This command is supported only on Catalyst 3750-X switches.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
When you access the stack member, its stack member number is appended to the system prompt.
Examples
This example shows how to access stack member 6:
Related Commands
|
|
---|---|
Reloads the stack member and puts a configuration change into effect. |
|
Displays information about the switch stack and its stack members. |
set
Use the set policy-map class configuration command on the switch stack or on a standalone switch to classify IP traffic by setting a Differentiated Services Code Point (DSCP) or an IP-precedence value in the packet. Use the no form of this command to remove traffic classification.
set { dscp new-dscp | [ ip ] precedence new-precedence }
no set { dscp new-dscp | [ ip ] precedence new-precedence }
Syntax Description
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
Usage Guidelines
If you have used the set ip dscp p olicy-map class configuration command, the switch changes this command to set dscp in the switch configuration. If you enter the set ip dscp policy-map class configuration command, this setting appears as set dscp in the switch configuration.
You can use the set ip precedence policy-map class configuration command or the set precedence policy-map class configuration command. This setting appears as set ip precedence in the switch configuration.
The set command is mutually exclusive with the trust policy-map class configuration command within the same policy map.
For the set dscp new-dscp or the set ip precedence new-precedence command, you can enter a mnemonic name for a commonly used value. For example, you can enter the set dscp af11 command, which is the same as entering the set dscp 10 command. You can enter the set ip precedence critical command, which is the same as entering the set ip precedence 5 command. For a list of supported mnemonics, enter the set dscp ? or the set ip precedence ? command to see the command-line help strings.
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
Examples
This example shows how to assign DSCP 10 to all FTP traffic without any policers:
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
setup
Use the setup privileged EXEC command to configure the switch with its initial configuration.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
When you use the setup command, make sure that you have this information:
- IP address and network mask
- Password strategy for your environment
- Whether the switch will be used as the cluster command switch and the cluster name
When you enter the setup command, an interactive dialog, called the System Configuration Dialog, appears. It guides you through the configuration process and prompts you for information. The values shown in brackets next to each prompt are the default values last set by using either the setup command facility or the configure privileged EXEC command.
Help text is provided for each prompt. To access help text, press the question mark (?) key at a prompt.
To return to the privileged EXEC prompt without making changes and without running through the entire System Configuration Dialog, press Ctrl-C.
When you complete your changes, the setup program shows you the configuration command script that was created during the setup session. You can save the configuration in NVRAM or return to the setup program or the command-line prompt without saving it.
Examples
This is an example of output from the setup command:
Related Commands
|
|
---|---|
setup express
Use the setup express global configuration command to enable Express Setup mode on the switch stack or on a standalone switch. Use the no form of this command to disable Express Setup mode.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
When Express Setup is enabled on a new (unconfigured) switch, pressing the Mode button for 2 seconds activates Express Setup. You can access the switch through an Ethernet port by using the IP address 10.0.0.1 and then can configure the switch with the web-based Express Setup program or the command-line interface (CLI)-based setup program.
When you press the Mode button for 2 seconds on a configured switch, the LEDs above the Mode button start blinking. If you press the Mode button for a total of 10 seconds, the switch configuration is deleted, and the switch reboots. The switch can then be configured like a new switch, either through the web-based Express Setup program or the CLI-based setup program.
Note As soon as you make any change to the switch configuration (including entering no at the beginning of the CLI-based setup program), configuration by Express Setup is no longer available. You can only run Express Setup again by pressing the Mode button for 10 seconds. This deletes the switch configuration and reboots the switch.
If Express Setup is active on the switch, entering the write memory or copy running-configuration startup-configuration privileged EXEC commands deactivates Express Setup. The IP address 10.0.0.1 is no longer valid on the switch, and your connection using this IP address ends.
The primary purpose of the no setup express command is to prevent someone from deleting the switch configuration by pressing the Mode button for 10 seconds.
Examples
This example shows how to enable Express Setup mode:
You can verify that Express Setup mode is enabled by pressing the Mode button:
- On an unconfigured switch, the LEDs above the Mode button turn solid green after 3 seconds.
- On a configured switch, the mode LEDs begin blinking after 2 seconds and turn solid green after 10 seconds.
This example shows how to disable Express Setup mode:
You can verify that Express Setup mode is disabled by pressing the Mode button. The mode LEDs do not turn solid green or begin blinking green if Express Setup mode is not enabled on the switch.
Related Commands
|
|
---|---|
show access-lists
Use the show access-lists privileged EXEC command to display access control lists (ACLs) configured on the switch.
show access-lists [name | number | hardware counters | ipc ]
Syntax Description
(Optional) Display global hardware ACL statistics for switched and routed packets. |
|
(Optional) Display Interprocess Communication (IPC) protocol access-list configuration download information. |
Note Though visible in the command-line help strings, the rate-limit keywords are not supported.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The switch supports only IP standard and extended access lists. Therefore, the allowed numbers are only 1 to 199 and 1300 to 2699.
This command also displays the MAC ACLs that are configured.
Examples
This is an example of output from the show access-lists command:
This is an example of output from the show access-lists hardware counters command:
Related Commands
show archive status
Use the show archive status privileged EXEC command to display the status of a new image being downloaded to a switch with the HTTP or the TFTP protocol.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you use the archive download-sw privileged EXEC command to download an image to a TFTP server, the output of the archive download-sw command shows the status of the download.
If you do not have a TFTP server, you can use Network Assistant or the embedded device manager to download the image by using HTTP. The show archive status command shows the progress of the download.
Examples
These are examples of output from the show archive status command:
Related Commands
|
|
---|---|
show arp access-list
Use the show arp access-list user EXEC command to display detailed information about Address Resolution Protocol (ARP) access control (lists).
show arp access-list [ acl-name ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show arp access-list command:
Related Commands
show authentication
Use the show authentication command (in either user EXEC or privileged EXEC mode) to display information about authentication manager events on the switch.
show authentication {interface interface-id | registrations | sessions [session-id session-id] [handle handle] [interface interface-id] [mac mac ] [method method ] | statistics [summary]}
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Table 2-25 describes the significant fields shown in the output of the show authentication command.
Note The possible values for the status of sessions are shown below. For a session in terminal state, Authz Success or Authz Failed is displayed along with No methods if no method has provided a result.
Table 2-26 lists the possible values for the state of methods. For a session in a terminal state, Authc Success, Authc Failed, or Failed over are displayed. Failed over means that an authentication method ran and then failed over to the next method, which did not provide a result. Not run appears for sessions that synchronized on standby.
The output of the show authentications sessions interface command shows fields for Security Policy and Security Status. These fields apply only if Media Access Control Security (MACsec) is supported and enabled.
Examples
This is an example the show authentication registrations command:
The is an example of the show authentication interface interface-id command:
This is an example of the show authentication sessions command:
This is an example of the show authentication sessions command for a specified interface:
This is an example of the show authentication sessions command for a specified MAC address:
This is an example of the show authentication session method command for a specified method:
Related Commands
show auto qos
Use the show auto qos user EXEC command to display the quality of service (QoS) commands entered on the interfaces on which automatic QoS (auto-QoS) is enabled.
show auto qos [ interface [ interface-id ]]
Syntax Description
(Optional) Display auto-QoS information for the specified port or for all ports. Valid interfaces include physical ports. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show auto qos command output shows only the auto-QoS command entered on each interface. The show auto qos interface interface-id command output shows the auto-QoS command entered on a specific interface.
Use the show running-config privileged EXEC command to display the auto-QoS configuration and the user modifications.
Beginning in Cisco IOS Release 12.2(40)SE, the show auto qos command output shows the service policy information for the Cisco IP phone.
To display information about the QoS configuration that might be affected by auto-QoS, use one of these commands:
Examples
This is an example of output from the show auto qos command after the auto qos voip cisco-phone and the auto qos voip cisco-softphone interface configuration commands are entered:
This is an example of output from the show auto qos interface interface-id command when the auto qos voip cisco-phone interface configuration command is entered:
This is an example of output from the show running-config privileged EXEC command when the auto qos voip cisco-phone and the auto qos voip cisco-softphone interface configuration commands are entered:
This is an example of output from the show auto qos interface interface-id command when the auto qos voip cisco-phone interface configuration command is entered:
These are examples of output from the show auto qos command when auto-QoS is disabled on the switch:
These are examples of output from the show auto qos i nterface interface-id command when auto-QoS is disabled on an interface:
Related Commands
|
|
---|---|
show boot
Use the show boot privileged EXEC command to display the settings of the boot environment variables.
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show boot command for all stack members. Table 2-27 describes each field in the display. An example image_name is c3750x-universal-mz.122-53.SE2
|
|
---|---|
Displays a semicolon separated list of executable files to try to load and execute when automatically booting. If the BOOT environment variable is not set, the system attempts to load and execute the first executable image it can find by using a recursive, depth-first search through the flash file system. In a depth-first search of a directory, each encountered subdirectory is completely searched before continuing the search in the original directory. If the BOOT variable is set but the specified images cannot be loaded, the system attempts to boot the first bootable file that it can find in the flash file system. |
|
Displays the filename that Cisco IOS uses to read and write a nonvolatile copy of the system configuration. |
|
Displays the filename that Cisco IOS uses to read and write a nonvolatile copy of the system configuration. |
|
Displays whether a break during booting is enabled or disabled. If it is set to yes, on, or 1, you can interrupt the automatic boot process by pressing the Break key on the console after the flash file system is initialized. |
|
Displays whether the switch automatically or manually boots. If it is set to no or 0, the boot loader attempts to automatically boot up the system. If it is set to anything else, you must manually boot up the switch from the boot loader mode. |
|
Displays a semicolon separated list of loadable files to dynamically load during the boot loader initialization. Helper files extend or patch the functionality of the boot loader. |
|
In a switch stack, displays whether the switch stack is set to automatically copy its software version to an incompatible switch so that it can join the stack. A switch in version-mismatch (VM) mode is a switch that has a different stack protocol version than the version on the switch stack. Switches in VM mode cannot join the switch stack. If the switch stack has an image that can be copied to a switch in VM mode, and if the boot auto-copy-sw feature is enabled, the switch stack automatically copies the image from another stack member to the switch in VM mode. The switch then exits VM mode, reboots, and joins the switch stack. |
|
In a switch stack, displays the buffer size that Cisco IOS uses to hold a copy of the configuration file in memory. The configuration file cannot be larger than the buffer size allocation. |
Related Commands
show cable-diagnostics tdr
Use the show cable-diagnostics tdr privileged EXEC command to display the Time Domain Reflector (TDR) results.
show cable-diagnostics tdr interface interface-id
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
TDR is supported only on 10/100/100 copper Ethernet ports. It is not supported on 10-Gigabit Ethernet ports and small form-factor pluggable (SFP) module ports. For more information about TDR, see the software configuration guide for this release.
Examples
This is an example of output from the show cable-diagnostics tdr interface interface-id command on a switch:
Gi1/0/23 1000M Pair A 1 +/- 1 meters Pair A Normal
Table 2-28 lists the descriptions of the fields in the show cable-diagnostics tdr command output.
This is an example of output from the show interface interface-id command when TDR is running:
This is an example of output from the show cable-diagnostics tdr interface interface-id command when TDR is not running:
If an interface does not support TDR, this message appears:
Related Commands
|
|
---|---|
show cdp forward
To display the CDP forwarding table, use the show cdp forward user EXEC command.
show cdp forward [ entry | forward | interface interface-id | neighbor | traffic ]
Note This command is not supported on switches running the LAN base feature set.
Syntax Description
(Optional) Displays information about a specific neighbor entry. |
|
(Optional) Displays the CDP interface status and configuration. |
|
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show cdp forward command output shows the number of CDP packets forwarded on each ingress-port- to-egress-port mapping and the statistics for forwarded and dropped packets.
Examples
Related Commands
|
|
---|---|
Configures the ingress and egress switch ports for CDP traffic. |
show cisp
Use the show cisp privileged EXEC command to display CISP information for a specified interface.
show cisp { [ interface interface-id ] | clients | summary}
Syntax Description
(Optional) Display CISP information about the specified interface. Valid interfaces include physical ports and port channels. |
|
Command Modes
Command History
|
|
---|---|
Examples
This example shows output from the show cisp interface command:
This example shows output from the show cisp summary command:
Related Commands
|
|
---|---|
show class-map
Use the show class-map user EXEC command to display quality of service (QoS) class maps, which define the match criteria to classify traffic.
show class-map [ class-map-name ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show class-map command:
Related Commands
|
|
---|---|
Creates a class map to be used for matching packets to the class whose name you specify. |
|
show cluster
Use the show cluster user EXEC command to display the cluster status and a summary of the cluster to which the switch belongs. This command can be entered on the cluster command switch and cluster member switches.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you enter this command on a switch that is not a cluster member, the error message Not a management cluster member
appears.
On a cluster member switch, this command displays the identity of the cluster command switch, the switch member number, and the state of its connectivity with the cluster command switch.
On a cluster command switch stack or cluster command switch, this command displays the cluster name and the total number of members. It also shows the cluster status and time since the status changed. If redundancy is enabled, it displays the primary and secondary command-switch information.
Examples
This is an example of output when the show cluster command is entered on the active cluster command switch:
This is an example of output when the show cluster command is entered on a cluster member switch:
This is an example of output when the show cluster command is entered on a cluster member switch that is configured as the standby cluster command switch:
This is an example of output when the show cluster command is entered on the cluster command switch that has lost connectivity with member 1:
This is an example of output when the show cluster command is entered on a cluster member switch that has lost connectivity with the cluster command switch:
Related Commands
|
|
---|---|
Enables a command-capable switch as the cluster command switch, assigns a cluster name, and optionally assigns a member number to it. |
|
show cluster candidates
Use the show cluster candidates privileged EXEC command on a switch stack or on a cluster command switch to display a list of candidate switches.
show cluster candidates [ detail | mac-address H.H.H. ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This command is available only on the cluster command switch stack or cluster command switch.
If the switch is not a cluster command switch, the command displays an empty line at the prompt.
The SN in the display means switch member number. If E appears in the SN column, it means that the switch is discovered through extended discovery. If E does not appear in the SN column, it means that the switch member number is the upstream neighbor of the candidate switch. The hop count is the number of devices the candidate is from the cluster command switch.
Examples
This is an example of output from the show cluster candidates command:
This is an example of output from the show cluster candidates command that uses the MAC address of a cluster member switch directly connected to the cluster command switch:
This is an example of output from the show cluster candidates command that uses the MAC address of a cluster member switch three hops from the cluster edge:
This is an example of output from the show cluster candidates detail command:
Related Commands
|
|
---|---|
Displays the cluster status and a summary of the cluster to which the switch belongs. |
|
show cluster members
Use the show cluster members privileged EXEC command on a switch stack or on a cluster command switch to display information about the cluster members.
show cluster members [ n | detail ]
Syntax Description
(Optional) Number that identifies a cluster member. The range is 0 to 15. |
|
(Optional) Display detailed information for all cluster members. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This command is available only on the cluster command switch stack or cluster command switch.
If the cluster has no members, this command displays an empty line at the prompt.
Examples
This is an example of output from the show cluster members command. The SN in the display means switch number.
This is an example of output from the show cluster members for cluster member 3:
This is an example of output from the show cluster members detail command:
Related Commands
|
|
---|---|
Displays the cluster status and a summary of the cluster to which the switch belongs. |
|
show controllers cpu-interface
Use the show controllers cpu-interface privileged EXEC command to display the state of the CPU network interface ASIC and the send and receive statistics for packets reaching the CPU.
show controllers cpu-interface
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This display provides information that might be useful for Cisco technical support representatives troubleshooting the switch.
Examples
This is a partial output example from the show controllers cpu-interface command:
Related Commands
show controllers ethernet-controller
Use the show controllers ethernet-controller privileged EXEC command without keywords to display per-interface send and receive statistics read from the hardware. Use with the phy keyword to display the interface internal registers or the port-asic keyword to display information about the port ASIC.
show controllers ethernet-controller [ interface-id ] [ phy [ detail ]] [ port-asic { configuration | statistics }]
Syntax Description
Command Modes
Privileged EXEC (only supported with the interface-id keywords in user EXEC mode)
Command History
|
|
---|---|
Usage Guidelines
This display without keywords provides traffic statistics, basically the RMON statistics for all interfaces or for the specified interface.
When you enter the phy or port-asic keywords, the displayed information is useful primarily for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers ethernet-controller command for an interface. Table 2-29 describes the Transmit fields, and Table 2-30 describes the Receive fields.
|
|
---|---|
The number of frames dropped on the egress port because the packet aged out. |
|
The number of frames that are not sent after the time exceeds 2*maximum-packet time. |
|
The number of frames that are larger than the maximum allowed frame size. |
|
The number of frames that are successfully sent on an interface after one collision occurs. |
|
The number of frames that are successfully sent on an interface after two collisions occur. |
|
The number of frames that are successfully sent on an interface after three collisions occur. |
|
The number of frames that are successfully sent on an interface after four collisions occur. |
|
The number of frames that are successfully sent on an interface after five collisions occur. |
|
The number of frames that are successfully sent on an interface after six collisions occur. |
|
The number of frames that are successfully sent on an interface after seven collisions occur. |
|
The number of frames that are successfully sent on an interface after eight collisions occur. |
|
The number of frames that are successfully sent on an interface after nine collisions occur. |
|
The number of frames that are successfully sent on an interface after ten collisions occur. |
|
The number of frames that are successfully sent on an interface after 11 collisions occur. |
|
The number of frames that are successfully sent on an interface after 12 collisions occur. |
|
The number of frames that are successfully sent on an interface after 13 collisions occur. |
|
The number of frames that are successfully sent on an interface after 14 collisions occur. |
|
The number of frames that are successfully sent on an interface after 15 collisions occur. |
|
The number of frames that could not be sent on an interface after 16 collisions occur. |
|
After a frame is sent, the number of frames dropped because late collisions were detected while the frame was sent. |
|
The number of frames dropped on an interface because the CFI1 bit is set. |
|
The number of frames that are not sent after the time exceeds the maximum-packet time. |
|
The total number of frames sent on an interface that are 64 bytes. |
|
The total number of frames sent on an interface that are from 65 to 127 bytes. |
|
The total number of frames sent on an interface that are from 128 to 255 bytes. |
|
The total number of frames sent on an interface that are from 256 to 511 bytes. |
|
The total number of frames sent on an interface that are from 512 to 1023 bytes. |
|
The total number of frames sent on an interface that are from 1024 to 1518 bytes. |
|
The number of frames sent on an interface that are larger than the maximum allowed frame size. |
|
The number of frames that are successfully sent on an interface after one collision occurs. This value does not include the number of frames that are not successfully sent after one collision occurs. |
|
|
|
---|---|
The total amount of memory (in bytes) used by frames received on an interface, including the FCS2 value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total number of frames successfully received on the interface that are directed to unicast addresses. |
|
The total number of frames successfully received on the interface that are directed to multicast addresses. |
|
The total number of frames successfully received on an interface that are directed to broadcast addresses. |
|
The total amount of memory (in bytes) used by unicast frames received on an interface, including the FCS value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total amount of memory (in bytes) used by multicast frames received on an interface, including the FCS value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total amount of memory (in bytes) used by broadcast frames received on an interface, including the FCS value and the incorrectly formed frames. This value excludes the frame header bits. |
|
The total number of frames received on an interface that have alignment errors. |
|
The total number of frames received on an interface that have a valid length (in bytes) but do not have the correct FCS values. |
|
The number of frames received on an interface that are larger than the maximum allowed frame size. |
|
The number of frames received on an interface that are smaller than 64 bytes. |
|
The total number of frames that are from 1024 to 1518 bytes. |
|
The total number of overrun frames received on an interface. |
|
The number of frames received on an interface that have symbol errors. |
|
The number of frames received that were larger than maximum allowed MTU3 size (including the FCS bits and excluding the frame header) and that have either an FCS error or an alignment error. |
|
The number of frames received on an interface that are larger than the maximum allowed frame size. |
|
The number of frames received that are smaller than 64 bytes (including the FCS bits and excluding the frame header) and that have either an FCS error or an alignment error. |
|
The number of frames received on an interface that are smaller than 64 bytes (or 68 bytes for VLAN-tagged frames) and that have valid FCS values. The frame size includes the FCS bits but excludes the frame header bits. |
|
The number of frames dropped on the ingress port because the packet aged out. |
|
The number of frames received on an interface that are larger than the maximum allowed frame size and have valid FCS values. The frame size includes the FCS value but does not include the VLAN tag. |
|
The total number of frames received on an interface that have a valid length (in bytes) but that do not have the correct FCS values. |
|
The total number of frames received on an interface that are dropped because the ingress queue is full. |
|
This is an example of output from the show controllers ethernet-controller phy command for a specific interface:
This is an example of output from the show controllers ethernet-controller tengigabitethernet1/0/1 phy command:
-----------------------------------------------------------
Non-Volatile Register (NVR) Fields
X2 MSA Version supported :0x1E
NVR Size in bytes :0x100
Number of bytes used :0x100
Basic Field Address :0xB
Customer Field Address :0x77
Vendor Field Address :0xA7
Extended Vendor Field Address :0x100
Reserved :0x0
Transceiver type :0x2 =X2
Optical connector type :0x1 =SC
Bit encoding:0x1 =NRZ
Normal BitRate in multiple of 1M b/s :0x2848
Protocol Type:0x1 =10GgE
10GbE Code Byte 0 :0x4 =10GBASE-ER
10GbE Code Byte 1 :0x0
SONET/SDH Code Byte 0:0x0
SONET/SDH Code Byte 1:0x0
SONET/SDH Code Byte 2:0x0
SONET/SDH Code Byte 3:0x0
10GFC Code Byte 0 :0x0
10GFC Code Byte 1 :0x0
10GFC Code Byte 2 :0x0
10GFC Code Byte 3 :0x0
Transmission range in10m :0xFA0
Fibre Type :
Fibre Type Byte 0 :0x20 =SM, Generic
Fibre Type Byte 1 :0x0 =Unspecified
This is an example of output from the show controllers ethernet-controller port-asic configuration command:
This is an example of output from the show controllers ethernet-controller port-asic statistics command:
Related Commands
show controllers ethernet-controller fastethernet
Use the show controllers ethernet-controller fastethernet privileged EXEC command to display information about the Ethernet management port, including the port status and the per-interface send and receive statistics read from the hardware.
show controllers ethernet-controller fastethernet 0 [ phy [ detail ] | stack ]
Syntax Description
Command Modes
Privileged EXEC (only supported with the fastethernet 0 keywords in user EXEC mode)
Command History
|
|
---|---|
Usage Guidelines
The output display provides information that might be useful for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers ethernet-controller fastethernet 0 command. See Table 2-29 and Table 2-30 for descriptions of the Transmit and Receive fields.
This is an example of output from the show controllers ethernet-controller fastethernet 0 phy command on a switch:
This is an example of output from the show controllers ethernet-controller fastethernet 0 stack command on a stack member:
Related Commands
|
|
---|---|
show controllers ethernet phy macsec
Use the show controllers ethernet phy macsec privileged EXEC command to display the internal Media Access Control Security (MACsec) counters or registers on the switch or the specified interface.
show controllers ethernet [ interface-id ] phy macsec { counters | registers }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The displayed information is useful s for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example output from the show controllers ethernet phy macsec counters command:
This is an example output from the show controllers ethernet phy macsec registers command:
Related Commands
|
|
---|---|
show controllers power inline
Use the show controllers power inline user EXEC command to display the values in the registers of the specified Power over Ethernet (PoE) controller.
show controllers power inline [ instance ] [ module switch-number ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Though visible on all switches, this command is valid only for PoE switches. It provides no information for switches that do not support PoE.
The output provides information that might be useful for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers power inline command:
Related Commands
|
|
---|---|
Configures the power management mode for the specified PoE port or for all PoE ports. |
|
Displays the PoE status for the specified PoE port or for all PoE ports. |
show controllers tcam
Use the show controllers tcam privileged EXEC command to display the state of the registers for all hardware memory in the system and for all hardware interface ASICs that are content-addressable memory-controllers.
show controllers tcam [ asic [ number ]] [ detail ]
Syntax Description
(Optional) Display information for the specified port ASIC number. The range is from 0 to 15. |
|
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This display provides information that might be useful for Cisco technical support representatives troubleshooting the switch.
Examples
This is an example of output from the show controllers tcam command:
Related Commands
show controllers utilization
Use the show controllers utilization user EXEC command to display bandwidth utilization on the switch or specific ports.
show controllers [ interface-id ] utilization
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show controllers utilization command.
This is an example of output from the show controllers utilization command on a specific port:
Related Commands
|
|
---|---|
show device-sensor cache
To display Device Sensor cache entries, use the show device-sensor cache command in privileged EXEC mode.
show device-sensor cache { mac mac-address | all }
Syntax Description
Specifies the MAC address of the device for which the sensor cache entries are to be displayed. |
|
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show device-sensor cache command to display a list of TLV fields or options received from a particular device or from all devices.
Examples
The following is sample output from the show device-sensor cache mac mac-address command:
The following is sample output from the show device-sensor cache all command:
The following table describes the significant fields shown in the display:
|
|
---|---|
MAC address of the device and the interface which it is connected to. |
|
Protocol from which the endpoint device data is being gleaned. |
|
Related Commands
show diagnostic
Use the show diagnostic user EXEC command to display the online diagnostic test results and the supported test suites.
show diagnostic content switch [ number | all ]
show diagnostic result switch [ number | all ] [ detail | test { name | test-id | test-id-range | all } [ detail ]]
show diagnostic schedule switch [ number | all ]
show diagnostic switch [ number | all ] [ detail ]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show diagnostic post command output is the same as the show post command output.
In Catalyst 3750-X switch stacks, if you do not enter the switch number parameter with the content, result, schedule, and switch keywords, information for all stack members is displayed.
On Catalyst 3750-X switches, the show diagnostic result switch [ number | all ] [ detail ] command output is the same as the show diagnostic switch [ number | all ] [ detail ] command output.
On Catalyst 3560-X switches, the show diagnostic result [ detail ] command output is the same as the show diagnostic switch [ detail ] command output.
Examples
This example shows how to display the online diagnostics that are configured on all the PoE-capable switches in a stack:
Note If you enter the show diagnostic content switch all command on a non-PoE-capable switch, information about test 7, TestInlinePwrCtlr, does not appear in the command output.
This example shows how to display the diagnostic test results on a switch. You can also use the show diagnostic switch command to display these diagnostic results.
This example shows how to display the running tests in a switch stack:
This example shows how to display the online diagnostic test schedule for a switch:
This example shows how to display the detailed switch results for all the switches in stack. You can also use the show diagnostic result switch all detail command to display these results.
Related Commands
|
|
---|---|
Sets the scheduling of test-based online diagnostic testing. |
|
show dot1q-tunnel
Use the show dot1q-tunnel user EXEC command to display information about IEEE 802.1Q tunnel ports.
show dot1q-tunnel [ interface interface-id ]
Note This command is not supported on switches running the LAN base feature set.
Syntax Description
(Optional) Specify the interface for which to display IEEE 802.1Q tunneling information. Valid interfaces include physical ports and port channels. |
Command Modes
Command History
|
|
---|---|
Examples
These are examples of output from the show dot1q-tunnel command:
Related Commands
|
|
---|---|
show vlan dot1q tag native |
|
switchport mode dot1q-tunnel |
show dot1x
Use the show dot1x user EXEC command to display IEEE 802.1x statistics, administrative status, and operational status for the switch or for the specified port.
show dot1x [{ all [ summary ] | interface interface-id } [ details | statistics ]]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you do not specify a port, global parameters and a summary appear. If you specify a port, details for that port appear.
If the port control is configured as unidirectional or bidirectional control and this setting conflicts with the switch configuration, the show dot1x { all | interface interface-id } privileged EXEC command output has this information:
Examples
This is an example of output from the show dot1x user EXEC command:
This is an example of output from the show dot1x all user EXEC command:
This is an example of output from the show dot1x all summary user EXEC command:
This is an example of output from the show dot1x interface interface-id user EXEC command:
This is an example of output from the show dot1x interface interface-id details user EXEC command:
This is an example of output from the show dot1x interface interface-id details commmand when a port is assigned to a guest VLAN and the host mode changes to multiple-hosts mode:
This is an example of output from the show dot1x interface interface-id statistics command. Table 2-32 describes the fields in the display.
Related Commands
|
|
---|---|
show dtp
Use the show dtp privileged EXEC command to display Dynamic Trunking Protocol (DTP) information for the switch or for a specified interface.
show dtp [ interface interface-id ]
Syntax Description
(Optional) Display port security settings for the specified interface. Valid interfaces include physical ports (including type, stack member (stacking-capable switches only) module, and port number). |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show dtp command:
This is an example of output from the show dtp interface command:
Related Commands
|
|
---|---|
show interfaces trunk |
show eap
Use the show eap privileged EXEC command to display Extensible Authentication Protocol (EAP) registration and session information for the switch or for the specified port.
show eap {{ registrations [ method [ name ] | transport [ name ]]} | { sessions [ credentials name [ interface interface-id ] | interface interface-id | method name | transport name ]}} [ credentials name | interface interface-id | transport name ]
Syntax Description
(Optional) Display the EAP information for the specified port (including type, stack member (stacking-capable switches only) module, and port number). |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
When you use the show eap registrations privileged EXEC command with these keywords, the command output shows this information:
- None—All the lower levels used by EAP and the registered EAP methods.
- method name keyword—The specified method registrations.
- transport name keyword—The specific lower-level registrations.
When you use the show eap sessions privileged EXEC command with these keywords, the command output shows this information:
Examples
This is an example of output from the show eap registrations privileged EXEC command:
This is an example of output from the show eap registrations transport privileged user EXEC command:
This is an example of output from the show eap sessions privileged EXEC command:
This is an example of output from the show eap sessions interface interface-id privileged EXEC command:
Related Commands
|
|
---|---|
Clears EAP session information for the switch or for the specified port. |
show env
Use the show env user EXEC command to display fan, temperature, redundant power system (RPS) availability, and power information for the switch or the switch stack.
show env { all | fan | power [ all | switch [ switch-number ] ] | rps | stack [ switch-number ] | temperature [ status ] | xps }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show env user EXEC command to display the information for the switch being accessed—a standalone switch or the stack master. Use this command with the stack and switch keywords to display all information for the stack or for the specified stack member.
If you enter the show env temperature status command, the command output shows the switch temperature state and the threshold level.
You can also use the show env temperature command to display the switch temperature status. The command output shows the green and yellow states as OK and the red state as FAULTY. If you enter the show env all command, the command output is the same as the show env temperature status command output.
Examples
This is an example of output from the show env all command on a standalone switch:
This is an example of output from the show env fan command:
This is an example of output from the show env power all command on a stack master:
This is an example of output from the show env stack command on a stack master:
This example shows how to display the temperature value, state, and the threshold values on a standalone switch. Table 2-33 describes the temperature states in the command output.
Related Commands
|
|
---|---|
Configures and manages the power supply modules on the switch. |
|
show env xps
To display budgeting, configuration, power, and system power information for the Cisco eXpandable Power System (XPS) 2200, use the show env xps command in privileged EXEC mode.
show env xps { budgeting | configuration | port [ all | number ] | power | system | thermal | upgrade | version }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show env xps privileged EXEC command to display the information for XPS 2200.
Examples
This is an example of output from the show env xps budgeting command:
This is an example of output from the show env xps configuration command:
This is an example of output from the show env xps port all command:
This is an example of output from the show env xps power command:
This is an example of output from the show env xps system command:
This is an example of output from the show env xps thermal command:
This is an example of output from the show env xps upgrade command when no upgrade is occurring:
These are examples of output from the show env xps upgrade command when an upgrade is in process:
This is an example of output from the show env xps version command:
Related Commands
|
|
---|---|
show errdisable detect
Use the show errdisable detect user EXEC command to display error-disabled detection status.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
A displayed gbic-invalid
error reason refers to an invalid small form-factor pluggable (SFP) module.
The error-disable reasons in the command output are listed in alphabetical order. The mode column shows how error disable is configured for each feature.
Examples
This is an example of output from the show errdisable detect command:
Related Commands
|
|
---|---|
Enables error-disabled detection for a specific cause or all causes. |
|
show interfaces status |
Displays interface status or a list of interfaces in error-disabled state. |
show errdisable flap-values
Use the show errdisable flap-values user EXEC command to display conditions that cause an error to be recognized for a cause.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The Flaps column in the display shows how many changes to the state within the specified time interval will cause an error to be detected and a port to be disabled. See the “Examples” section for an example of the display.
Examples
This is an example of output from the show errdisable flap-values command, which shows that an error will be assumed and the port shut down if three Dynamic Trunking Protocol (DTP)-state (port mode access/trunk) or Port Aggregation Protocol (PAgP) flap changes occur during a 30-second interval, or if 5 link-state (link up/down) changes occur during a 10-second interval:
Related Commands
|
|
---|---|
Enables error-disabled detection for a specific cause or all causes. |
|
show interfaces status |
Displays interface status or a list of interfaces in error-disabled state. |
show errdisable recovery
Use the show errdisable recovery user EXEC command to display the error-disabled recovery timer information.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
A gbic-invalid error-disable reason refers to an invalid small form-factor pluggable (SFP) module interface.
Examples
This is an example of output from the show errdisable recovery command:
ErrDisable Reason Timer Status
----------------- --------------
udld Disabled
bpduguard Disabled
security-violatio Disabled
channel-misconfig Disabled
vmps Disabled
pagp-flap Disabled
dtp-flap Disabled
link-flap Enabled
l2ptguard Disabled
psecure-violation Disabled
gbic-invalid Disabled
dhcp-rate-limit Disabled
unicast-flood Disabled
storm-control Disabled
arp-inspection Disabled
loopback Disabled
Timer interval:300 seconds
Interfaces that will be enabled at the next timeout:
Interface Errdisable reason Time left(sec)
--------- ----------------- --------------
Gi1/0/2 link-flap 279
Note Though visible in the output, the unicast-flood field is not valid.
Related Commands
|
|
---|---|
show interfaces status |
Displays interface status or a list of interfaces in error-disabled state. |
show etherchannel
Use the show etherchannel user EXEC command to display EtherChannel information for a channel.
show etherchannel [ channel-group-number { detail | port | port-channel | protocol | summary }] { detail | load-balance | port | port-channel | protocol | summary }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you do not specify a channel-group , all channel groups are displayed.
In the output, the Passive port list field is displayed only for Layer 3 port channels. This field means that the physical port, which is still not up, is configured to be in the channel group (and indirectly is in the only port channel in the channel group).
Note Layer 3 port channels are not supported when the switch is running the LAN base feature set.
Examples
This is an example of output from the show etherchannel 1 detail command:
This is an example of output from the show etherchannel 1 summary command:
This is an example of output from the show etherchannel 1 port-channel command:
This is an example of output from show etherchannel protocol command:
Related Commands
|
|
---|---|
show fallback profile
Use the show fallback profile privileged EXEC command to display the fallback profiles that are configured on a switch.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show fallback profile privileged EXEC command to display profiles that are configured on the switch.
Examples
This is an example of output from the show fallback profile command:
Related Commands
|
|
---|---|
Configure a port to use web authentication as a fallback method for clients that do not support IEEE 802.1x authentication. |
|
show dot1x [ interface interface-id ] |
show flowcontrol
Use the show flowcontrol user EXEC command to display the flow control status and statistics.
show flowcontrol [ interface interface-id | module number ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display the flow control status and statistics on the switch or for a specific interface.
Use the show flowcontrol command to display information about all the switch interfaces. For a standalone switch, the output from the show flowcontrol command is the same as the output from the show flowcontrol module number command.
Use the show flowcontrol interface interface-id command to display information about a specific interface.
Examples
This is an example of output from the show flowcontrol command.
This is an example of output from the show flowcontrol interface interface-id command:
Related Commands
|
|
---|---|
show hw-module switch
To display the configured port speed on the 10-Gigabit Ethernet slots on C3KX-NM-10GT network modules, use the show hw-module switch command in privileged EXEC mode.
show hw-module switch { switch-number | all } port-group { switch-number | all }
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The 10-Gigabit slots can operate either in 1 Gigabit per second (Gb/s) or 10 Gb/s.
Examples
This is sample output showing the speed set for both port groups for all switches in a stack. The Active column specifies the speed at which the port is operating:
This is sample output showing the speed set for only port group 1 for all switches in a stack. The Active column specifies the speed at which the port is operating.
This is sample output showing the speed set for both port groups on switch 2 in the stack:
Related Commands
|
|
---|---|
show idprom interface
Use the show idprom user EXEC command to display the IDPROM information for the specified interface.
show idprom interface interface-id [ detail ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This command applies only to 10-Gigabit Ethernet interfaces and to the SFP module interfaces.
Examples
This is an example of output from the show idprom interface tengigabitethernet1/0/1 command for the 10-Gigabit Ethernet interface.
Non-Volatile Register (NVR) Fields
X2 MSA Version supported :0xA
NVR Size in bytes :0x100
Number of bytes used :0x100
Basic Field Address :0xB
Customer Field Address :0x77
Vendor Field Address :0xA7
Extended Vendor Field Address :0x100
Reserved :0x0
Transceiver type :0x2 =X2
Optical connector type :0x0 =Unspecified
Bit encoding :0x1 =NRZ
Normal BitRate in multiple of 1M b/s :0x2848
Protocol Type :0x1 =10GgE
10GbE Code Byte 0 :0x0 =Unspecified
10GbE Code Byte 1 :0x0
SONET/SDH Code Byte 0 :0x0
SONET/SDH Code Byte 1 :0x0
SONET/SDH Code Byte 2 :0x0
SONET/SDH Code Byte 3 :0x0
10GFC Code Byte 0 :0x0
10GFC Code Byte 1 :0x0
10GFC Code Byte 2 :0x0
10GFC Code Byte 3 :0x0
Transmission range in 10m :0x0
Fibre Type :
Fibre Type Byte 0 :0x0 =Unspecified
Fibre Type Byte 1 :0x0 =Unspecified
Centre Optical Wavelength in 0.01nm steps - Channel 1 :0x0 0x0 0x0
Centre Optical Wavelength in 0.01nm steps - Channel 2 :0x0 0x0 0x0
Centre Optical Wavelength in 0.01nm steps - Channel 3 :0x0 0x0 0x0
Package Identifier OUI :0xC09802
Transceiver Vendor OUI :0x3400B01
Transceiver vendor name :CISCO-OPNEXT,INC
Part number provided by transceiver vendor :TRTC010EN-BMC
Revision level of part number provided by vendor :00
Vendor serial number :OSA093900JK
Vendor manufacturing date code :2005092800
Basic Field Checksum :0x63
0x00: 58 32 2D 31 30 47 42 2D 43 58 34 20 20 20 20 20
0x10: 20 56 30 31 20 4F 53 41 30 39 33 39 30 30 4A 4B
0x20: 31 30 2D 32 31 30 35 2D 30 31 20 20 41 30 20 20
0x00: 1F 01 1C 02 00 00 00 00 00 00 00 00 00 00 00 00
0x10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x30: 00 00 01 00 11 B3 39 9F 5A 51 52 C3 2B 93 E2 A3
0x40: 19 81 34 33 16 00 00 00 00 00 00 00 00 00 AC 76
0x50: 37 FF 00 00 00 00 00 00 00
Related Commands
|
|
---|---|
Displays per-interface send and receive statistics read from the hardware, interface internal registers, or port ASIC information. |
show interfaces
Use the show interfaces privileged EXEC command to display the administrative and operational status of all interfaces or a specified interface.
show interfaces [ interface-id | vlan vlan-id ] [ accounting | capabilities [ module number ] | counters | description | etherchannel | flowcontrol | private-vlan mapping | pruning | stats | status [ err-disabled ] | switchport [ backup | module number ] | tengigabitethernet interface-id | transceiver [ detail | properties | supported-list ] [ module number ] | trunk ]
Syntax Description
(Optional) Valid interfaces include physical ports (including type, stack member (stacking-capable switches only) module, and port number) and port channels. The port-channel range is 1 to 48. |
|
(Optional) Display accounting information on the interface, including active protocols and input and output packets and octets. Note The display shows only packets processed in software; hardware-switched packets do not appear. |
|
(Optional) Display the capabilities of all interfaces or the specified interface, including the features and options that you can configure on the interface. Though visible in the command line help, this option is not available for VLAN IDs. |
|
(Optional) Display capabilities, switchport configuration, or transceiver characteristics (depending on preceding keyword) of all interfaces on the switch or specified stack member. On Catalyst 3750-X switches, the range is 1 to 9. On Catalyst 3560-X switches, the only valid module number is 1. This option is not available if you entered a specific interface ID. |
|
(Optional) See the show interfaces counters command. |
|
(Optional) Display the administrative status and description set for an interface. |
|
(Optional) Display private-VLAN mapping information for the VLAN switch virtual interfaces (SVIs). This keyword is not available if the switch is running the LAN base feature set. |
|
(Optional) Display the input and output packets by switching path for the interface. |
|
(Optional) Display the status of the interface. A status of unsupported in the Type field means that a non-Cisco small form-factor pluggable (SFP) module is inserted in the module slot. |
|
(Optional) Display the administrative and operational status of a switching (nonrouting) port, including port blocking and port protection settings. |
|
(Optional) Display Flex Link backup interface configuration and status for the specified interface or all interfaces on the switch or the stack. |
|
See the show interfaces transceivers command. |
|
Display interface trunk information. If you do not specify an interface, only information for active trunking ports appears. |
Note Though visible in the command-line help strings, the crb, fair-queue, irb, mac-accounting, precedence, random-detect, rate-limit, and shape keywords are not supported.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show interfaces capabilities command with different keywords has these results:
- On Catalyst 3750-X switches, use the show interface capabilities module number command to display the capabilities of all interfaces on that switch in the stack. If there is no switch with that module number in the stack, there is no output.
- On Catalyst 3560-X switches, use the show interface capabilities module 1 command to display the capabilities of all interfaces on the switch. Any other number is invalid.
- Use the show interfaces interface-id capabilities to display the capabilities of the specified interface.
- On Catalyst 3750-X switches, use the show interfaces capabilities (with no module number or interface ID) to display the capabilities of all interfaces in the stack.
- On Catalyst 3560-X switches, use the show interfaces capabilities (with no module number or interface ID) to display the capabilities of all interfaces on the switch.
- On Catalyst 3750-X switches, use the show interface switchport module number command to display the switch port characteristics of all interfaces on that switch in the stack. If there is no switch with that module number in the stack, there is no output.
- On Catalyst 3560-X switches, use the show interface switchport module 1 to display the switch port characteristics of all interfaces on the switch. Any other number is invalid.
Examples
This is an example of output from the show interfaces command for an interface on stack member 3:
This is an example of output from the show interfaces accounting command.
This is an example of output from the show interfaces capabilities command for an interface.
This is an example of output from the show interfaces interface description command when the interface has been described as Connects to Marketing by using the description interface configuration command.
This is an example of output from the show interfaces etherchannel command when port channels are configured on the switch:
This is an example of output from the show interfaces interface-id pruning command when pruning is enabled in the VTP domain:
This is an example of output from the show interfaces stats command for a specified VLAN interface.
This is an example of partial output from the show interfaces status command. It displays the status of all interfaces.
These are examples of output from the show interfaces status command for a specific interface when private VLANs are configured. Port 22 is configured as a private-VLAN host port. It is associated with primary VLAN 20 and secondary VLAN 25.
In this example, port 20 is configured as a private-VLAN promiscuous port. The display shows only the primary VLAN 20.
This is an example of output from the show interfaces status err-disabled command. It displays the status of interfaces in the error-disabled state.
This is an example of output from the show interfaces switchport command for a port. Table 2-34 describes the fields in the display.
Note Private VLAN trunks are not supported in this release, so those fields are not applicable.
This is an example of output from the show interfaces switchport command for a port configured as a private VLAN promiscuous port. The primary VLAN 20 is mapped to secondary VLANs 25, 30 and 35:
This is an example of output from the show interfaces switchport backup command:
This is an example of output from the show interfaces interface-id pruning command:
This is an example of output from the show interfaces swit chport backup command. In this example, VLANs 1 to 50, 60, and 100 to 120 are configured on the switch:
When both interfaces are up, Gi2/0/8 forwards traffic for VLANs 60, 100 to 120, and Gi2/0/6 will forward traffic for VLANs 1 to 50.
When a Flex Link interface goes down (LINK_DOWN), VLANs preferred on this interface are moved to the peer interface of the Flex Link pair. In this example, if interface Gi2/0/6 goes down, Gi2/0/8 carries all VLANs of the Flex Link pair.
When a Flex Link interface comes up, VLANs preferred on this interface are blocked on the peer interface and moved to the forwarding state on the interface that has just come up. In this example, if interface Gi2/0/6 comes up, then VLANs preferred on this interface are blocked on the peer interface Gi2/0/8 and forwarded on Gi2/0/6.
This is an example of out put from the show interfaces switchport backup command when a Flex Link interface goes down (LINK_DOWN), and VLANs preferred on this interface are moved to the peer interface of the Flex Link pair. In this example, if interface Gi2/0/6 goes down, Gi2/0/8 carries all VLANs of the Flex Link pair.
This is an example of output from the show interfaces interface-id trunk command. It displays trunking information for the port.
This is an example of output from the show interfaces interface-id transceiver properties command:
This is an example of output from the show interfaces interface-id transceiver detail command:
This is an example of output from the show interfaces tengigabitethernet interface-id transceiver detail command:
This is an example of output from the show interfaces tengigabitethernet interface-id transceiver properties command:
Related Commands
|
|
---|---|
Configures a port as a static-access or a dynamic-access port. |
|
Blocks unknown unicast or multicast traffic on an interface. |
|
Configures Flex Links, a pair of Layer 2 interfaces that provide mutual backup. |
|
switchport mode private-vlan |
Configures a port as a private-VLAN host or a promiscuous port. |
Defines private-VLAN association for a host port or private-VLAN mapping for a promiscuous port. |
|
Isolates unicast, multicast, and broadcast traffic at Layer 2 from other protected ports on the same switch. |
|
switchport trunk pruning |
Configures the VLAN pruning-eligible list for ports in trunking mode. |
show interfaces counters
Use the show interfaces counters privileged EXEC command to display various counters for the switch or for a specific interface.
show interfaces [ interface-id | vlan vlan-id ] counters [ errors | etherchannel | module switch- number | protocol status | trunk ]
Syntax Description
Note Though visible in the command-line help string, the vlan vlan-id keyword is not supported.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If you do not enter any keywords, all counters for all interfaces are included.
Examples
This is an example of partial output from the show interfaces counters command. It displays all counters for the switch.
This is an example of partial output from the show interfaces counters module command for stack member 2. It displays all counters for the specified switch in the stack.
This is an example of partial output from the show interfaces counters protocol status command for all interfaces.
This is an example of output from the show interfaces counters trunk command. It displays trunk counters for all interfaces.
Related Commands
|
|
---|---|
show interfaces rep
To display Resilient Ethernet Protocol (REP) configuration and status for a specified interface or for all interfaces, use the show interfaces rep user EXEC command.
show interfaces [ interface-id ] rep [ detail ]
Syntax Description
(Optional) Displays REP configuration and status for a specified physical interface or port channel ID. |
|
(Optional) Displays detailed REP configuration and status information. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
In the output for the show interface rep [ detail ] command, in addition to an Open, Fail, or AP (alternate port) state, the Port Role might show as Fail Logical Open (FailLogOpen) or Fail No Ext Neighbor (FailNoNbr). These states indicate that the port is physically up, but REP is not configured on the neighboring port. In this case, one port goes into a forwarding state for the data path to help maintain connectivity during configuration. The Port Role for this port shows as Fail Logical Open; the port forwards all data traffic on all VLANs. The other failed Port Role shows as Fail No Ext Neighbor; this port blocks traffic for all VLANs.
When the external neighbors for the failed ports are configured, the failed ports go through the alternate port state transitions and eventually go to an Open state or remain as the alternate port, based on the alternate port election operation.
Examples
This is sample output from the show interface rep command:
This is sample output from the show interface rep command when external neighbors are not configured:
This is sample output from the show interface rep detail command for a specified interface:
Related Commands
|
|
---|---|
Enables REP on an interface and assigns a segment ID. This command is also used to configure a port as an edge port, a primary edge port, or a preferred port. |
|
show rep topology [ detail ] |
Displays information about all ports in the segment, including which one was configured and selected as the primary edge port. |
show interfaces transceivers
Use the show interfaces transceivers privileged EXEC command to display the physical properties of a small form-factor pluggable (SFP) module interface.
show interfaces [ interface-id] transceiver [ detail | supported-list | module number | properties | threshold-table ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show interfaces interface-id transceiver properties command:
This is an example of output from the show interfaces interface-id transceiver detail command:
This is an example of output from the show interfaces transceiver supported-list command:
This is an example of output from the show interfaces transceiver threshold-table command:
Related Commands
|
|
---|---|
show inventory
Use the show inventory user EXEC command to display product identification (PID) information for the hardware.
show inventory [ entity-name | raw ]
Syntax Description
(Optional) Display the specified entity. For example, enter the interface (such as gigabitethernet1/0/1) into which a small form-factor pluggable (SFP) module is installed. |
|
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The command is case sensitive. With no arguments, the show inventory command produces a compact dump of all identifiable entities that have a product identifier. The compact dump displays the entity location (slot identity), entity description, and the unique device identifier (UDI) (PID, VID, and SN) of that entity.
Note If there is no PID, no output appears when you enter the show inventory command.
Examples
This is example output from the show inventory command:
show ip arp inspection
Use the show ip arp inspection privileged EXEC command to display the configuration and the operating state of dynamic Address Resolution Protocol (ARP) inspection or the status of this feature for all VLANs or for the specified interface or VLAN.
show ip arp inspection [ interfaces [ interface-id ] | log | statistics [ vlan vlan-range ] | vlan vlan-range ]
This command is available only if your switch is running the IP services feature set.
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip arp inspection command
This is an example of output from the show ip arp inspection interfaces command:
This is an example of output from the show ip arp inspection interfaces interface-id command:
This is an example of output from the show ip arp inspection log command. It shows the contents of the log buffer before the buffers are cleared:
If the log buffer overflows, it means that a log event does not fit into the log buffer, and the display for the show ip arp inspection log privileged EXEC command is affected. A -- in the display appears in place of all data except the packet count and the time. No other statistics are provided for the entry. If you see this entry in the display, increase the number of entries in the log buffer, or increase the logging rate in the ip arp inspection log-buffer global configuration command.
This is an example of output from the show ip arp inspection statistics command. It shows the statistics for packets that have been processed by dynamic ARP inspection for all active VLANs.
For the show ip arp inspection statistics command, the switch increments the number of forwarded packets for each ARP request and response packet on a trusted dynamic ARP inspection port. The switch increments the number of ACL or DHCP permitted packets for each packet that is denied by source MAC, destination MAC, or IP validation checks, and the switch increments the appropriate failure count.
This is an example of output from the show ip arp inspection statistics vlan 5 command. It shows statistics for packets that have been processed by dynamic ARP for VLAN 5.
This is an example of output from the show ip arp inspection vlan 5 command. It shows the configuration and the operating state of dynamic ARP inspection for VLAN 5.
Related Commands
|
|
---|---|
show ip dhcp snooping
Use the show ip dhcp snooping user EXEC command to display the DHCP snooping configuration.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This command displays only the results of global configuration. Therefore, in this example, the circuit ID suboption appears in its default format of vlan - mod - port, even if a string is configured for the circuit ID.
Examples
This is an example of output from the show ip dhcp snooping command:
Related Commands
|
|
---|---|
show ip dhcp snooping binding
Use the show ip dhcp snooping binding user EXEC command to display the DHCP snooping binding database and configuration information for all interfaces on a switch.
show ip dhcp snooping binding [ ip-address ] [ mac-address ] [ interface interface-id ] [ vlan vlan-id ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show ip dhcp snooping binding command output shows only the dynamically configured bindings. Use the show ip source binding privileged EXEC command to display the dynamically and statically configured bindings in the DHCP snooping binding database.
If DHCP snooping is enabled and an interface changes to the down state, the switch does not delete the statically configured bindings.
Examples
This example shows how to display the DHCP snooping binding entries for a switch:
This example shows how to display the DHCP snooping binding entries for a specific IP address:
This example shows how to display the DHCP snooping binding entries for a specific MAC address:
This example shows how to display the DHCP snooping binding entries on a port:
This example shows how to display the DHCP snooping binding entries on VLAN 20:
Table 2-35 describes the fields in the show ip dhcp snooping binding command output:
Related Commands
|
|
---|---|
show ip dhcp snooping database
Use the show ip dhcp snooping database user EXEC command to display the status of the DHCP snooping binding database agent.
show ip dhcp snooping database [ detail ]
This command is available only if your switch is running the IP services feature set.
Syntax Description
(Optional) Display detailed status and statistics information. |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip dhcp snooping database command:
This is an example of output from the show ip dhcp snooping database detail command:
Related Commands
|
|
---|---|
Configures the DHCP snooping binding database agent or the binding file. |
|
show ip dhcp snooping statistics
Use the show ip dhcp snooping statistics user EXEC command to display DHCP snooping statistics in summary or detail form.
show ip dhcp snooping statistics [ detail ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
In a switch stack, all statistics are generated on the stack master. If a new stack master is elected, the statistics counters reset.
Examples
This is an example of output from the show ip dhcp snooping statistics command:
This is an example of output from the show ip dhcp snooping statistics detail command:
Table 2-36 shows the DHCP snooping statistics and their descriptions:
Related Commands
|
|
---|---|
Clears the DHCP snooping binding database, the DHCP snooping binding database agent statistics, or the DHCP snooping statistics counters. |
show ip igmp profile
Use the show ip igmp profile privileged EXEC command to display all configured Internet Group Management Protocol (IGMP) profiles or a specified IGMP profile.
show ip igmp profile [ profile number ]
Syntax Description
(Optional) The IGMP profile number to be displayed. The range is 1 to 4294967295. If no profile number is entered, all IGMP profiles are displayed. |
Command Modes
Command History
|
|
---|---|
Examples
These are examples of output from the show ip igmp profile privileged EXEC command, with and without specifying a profile number. If no profile number is entered, the display includes all profiles configured on the switch.
Related Commands
|
|
---|---|
show ip igmp snooping
Use the show ip igmp snooping user EXEC command to display the Internet Group Management Protocol (IGMP) snooping configuration of the switch or the VLAN.
show ip igmp snooping [ groups | mrouter | querier ] [ vlan vlan-id ]
Syntax Description
(Optional) See the show ip igmp snooping groups command. |
|
(Optional) See the show ip igmp snooping mrouter command. |
|
(Optional) See the show ip igmp snooping querier command. |
|
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094 (available only in privileged EXEC mode). |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display snooping configuration for the switch or for a specific VLAN.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Examples
This is an example of output from the show ip igmp snooping vlan 1 command. It shows snooping characteristics for a specific VLAN.
This is an example of output from the show ip igmp snooping command. It displays snooping characteristics for all VLANs on the switch.
Related Commands
show ip igmp snooping groups
Use the show ip igmp snooping groups privileged EXEC command to display the Internet Group Management Protocol (IGMP) snooping multicast table for the switch or the multicast information. Use with the vlan keyword to display the multicast table for a specified multicast VLAN or specific multicast information.
show ip igmp snooping groups [count | dynamic [count] | user [count]]
show ip igmp snooping groups vlan vlan-id [ip_address | count | dynamic [ count ] | user [ count ]]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display multicast information or the multicast table.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
Examples
This is an example of output from the show ip igmp snooping groups command without any keywords. It displays the multicast table for the switch.
This is an example of output from the show ip igmp snooping groups count command. It displays the total number of multicast groups on the switch.
This is an example of output from the show ip igmp snooping groups dynamic command. It shows only the entries learned by IGMP snooping.
This is an example of output from the show ip igmp snooping groups vlan vlan-id ip-address command. It shows the entries for the group with the specified IP address.
Related Commands
show ip igmp snooping mrouter
Use the show ip igmp snooping mrouter privileged EXEC command to display the Internet Group Management Protocol (IGMP) snooping dynamically learned and manually configured multicast router ports for the switch or for the specified multicast VLAN.
show ip igmp snooping mrouter [ vlan vlan-id ]
Syntax Description
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display multicast router ports on the switch or for a specific VLAN.
VLAN IDs 1002 to 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in IGMP snooping.
When multicast VLAN registration (MVR) is enabled, the show ip igmp snooping mrouter command displays MVR multicast router information and IGMP snooping information.
Examples
This is an example of output from the show ip igmp snooping mrouter command. It shows how to display multicast router ports on the switch.
Related Commands
show ip igmp snooping querier
Use the show ip igmp snooping querier detail user EXEC command to display the configuration and operation information for the IGMP querier configured on a switch.
show ip igmp snooping querier [ detail | vlan vlan-id [ detail ]]
Syntax Description
Optional) Display IGMP querier information for the specified VLAN. The range is 1 to 1001 and 1006 to 4094. Use the detail keyword to display detailed information. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show ip igmp snooping querier command to display the IGMP version and the IP address of a detected device, also called a querier , t hat sends IGMP query messages. A subnet can have multiple multicast routers but has only one IGMP querier. In a subnet running IGMPv2, one of the multicast routers is elected as the querier. The querier can be a Layer 3 switch.
The show ip igmp snooping querier command output also shows the VLAN and the interface on which the querier was detected. If the querier is the switch, the output shows the Port field as Router. If the querier is a router, the output shows the port number on which the querier is learned in the Port field.
The show ip igmp snooping querier detail user EXEC command is similar to the show ip igmp snooping querier command. However, the show ip igmp snooping querier command displays only the device IP address most recently detected by the switch querier.
The show ip igmp snooping querier detail command di splays the device IP address most recently detected by the switch querier and this additional information:
Examples
This is an example of output from the show ip igmp snooping querier command:
This is an example of output from the show ip igmp snooping querier detail command:
Related Commands
|
|
---|---|
Displays IGMP snooping multicast router ports for the switch or for the specified multicast VLAN. |
show ip source binding
Use the show ip source binding user EXEC command to display the IP source bindings on the switch.
show ip source binding [ ip-address ] [ mac-address ] [ dhcp-snooping | static ] [ interface interface-id ] [ vlan vlan-id ]
Note This command is available only if your switch is running the IP services feature set.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show ip source binding command output shows the dynamically and statically configured bindings in the DHCP snooping binding database. Use the show ip dhcp snooping binding privileged EXEC command to display only the dynamically configured bindings.
Examples
This is an example of output from the show ip source binding command:
Related Commands
|
|
---|---|
show ip verify source
Use the show ip verify source user EXEC command to display the IP source guard configuration on the switch or on a specific interface.
show ip verify source [ interface interface-id ]
Syntax Description
(Optional) Display IP source guard configuration on a specific interface. |
Command Modes
Command History
|
|
---|---|
Examples
This is an example of output from the show ip verify source command:
In the previous example, this is the IP source guard configuration:
- On the Gigabit Ethernet 1/0/1 interface, DHCP snooping is enabled on VLANs 10 to 20. For VLAN 10, IP source guard with IP address filtering is configured on the interface, and a binding exists on the interface. For VLANs 11 to 20, the second entry shows that a default port access control lists (ACLs) is applied on the interface for the VLANs on which IP source guard is not configured.
- The Gigabit Ethernet 1/0/2 interface is configured as trusted for DHCP snooping.
- On the Gigabit Ethernet 1/0/3 interface, DHCP snooping is not enabled on the VLANs to which the interface belongs.
- On the Gigabit Ethernet 1/0/4 interface, IP source guard with source IP and MAC address filtering is enabled, and static IP source bindings are configured on VLANs 10 and 11. For VLANs 12 to 20, the default port ACL is applied on the interface for the VLANs on which IP source guard is not configured.
- On the Gigabit Ethernet 1/0/5 interface, IP source guard with source IP and MAC address filtering is enabled and configured with a static IP binding, but port security is disabled. The switch cannot filter source MAC addresses.
This is an example of output on an interface on which IP source guard is disabled:
Related Commands
|
|
---|---|
show ipc
Use the show ipc user EXEC command to display Interprocess Communications Protocol (IPC) configuration, status, and statistics on a switch stack or a standalone switch.
show ipc { mcast { appclass | groups | status } | nodes | ports [ open ] | queue | rpc | session { all | rx | tx } [ verbose ] | status [ cumlulative ] | zones }
Note This command is not supported on switches running the LAN base feature set.
Syntax Description
Command Modes
Command History
|
|
---|---|
Examples
This example shows how to display the IPC routing status:
This example shows how to display the participating nodes:
This example shows how to display the local IPC ports:
This example shows how to display the contents of the IPC retransmission queue:
This example shows how to display all the IPC session statistics:
This example shows how to display the status of the local IPC server:
Related Commands
|
|
---|---|
show ipv6 access-list
Use the show ipv6 access-list user EXEC command to display the contents of all current IPv6 access lists.
show ipv6 access-list [ access-list-name ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The show ipv6 access-list command provides output similar to the show ip access-list command, except that it is IPv6-specific.
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | vlan ) global configuration command and reload the switch.
Examples
The following output from the show ipv6 access-list command shows IPv6 access lists named inbound and outbound:
Table 2-37 describes the significant fields shown in the display.
Related Commands
show ipv6 dhcp conflict
Use the show ipv6 dhcp conflict privileged EXEC command on the switch stack or on a standalone switch to display address conflicts found by a Dynamic Host Configuration Protocol for IPv6 (DHCPv6) server when addresses are offered to the client.
Note This command is available only if you have configured a dual IPv4 and IPv6 Switch Database Management (SDM) template on the switch. The command is not supported on switches running the LAN base feature set.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | vlan ) global configuration command, and reload the switch.
When you configure the DHCPv6 server to detect conflicts, it uses ping. The client uses neighbor discovery to detect clients and reports to the server through a DECLINE message. If an address conflict is detected, the address is removed from the pool, and the address is not assigned until the administrator removes the address from the conflict list.
Examples
This is an example of the output from the show ipv6 dhcp conflict command:
Related Commands
|
|
---|---|
Configures a DHCPv6 pool and enters DHCPv6 pool configuration mode. |
|
show ipv6 mld snooping
Use the show ipv6 mld snooping user EXEC command to display IP version 6 (IPv6) Multicast Listener Discovery (MLD) snooping configuration of the switch or the VLAN.
show ipv6 mld snooping [ vlan vlan-id ]
Syntax Description
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display MLD snooping configuration for the switch or for a specific VLAN.
VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in MLD snooping.
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | vlan ) global configuration command and reload the switch.
Examples
This is an example of output from the show ipv6 mld snooping vlan command. It shows snooping characteristics for a specific VLAN.
Global MLD Snooping configuration:
-------------------------------------------
MLD snooping : Enabled
MLDv2 snooping (minimal) : Enabled
Listener message suppression : Enabled
TCN solicit query : Disabled
TCN flood query count : 2
Robustness variable : 3
Last listener query count : 2
Last listener query interval : 1000
Vlan 100:
--------
MLD snooping : Disabled
MLDv1 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
Robustness variable : 3
Last listener query count : 2
Last listener query interval : 1000
This is an example of output from the show ipv6 mld snooping command. It displays snooping characteristics for all VLANs on the switch.
Switch
>
show ipv6 mld snooping
Global MLD Snooping configuration:
-------------------------------------------
MLD snooping : Enabled
MLDv2 snooping (minimal) : Enabled
Listener message suppression : Enabled
TCN solicit query : Disabled
TCN flood query count : 2
Robustness variable : 3
Last listener query count : 2
Last listener query interval : 1000
Vlan 1:
--------
MLD snooping : Disabled
MLDv1 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
Robustness variable : 1
Last listener query count : 2
Last listener query interval : 1000
<output truncated>
Vlan 951:
--------
MLD snooping : Disabled
MLDv1 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
Robustness variable : 3
Last listener query count : 2
Last listener query interval : 1000
Related Commands
|
|
---|---|
Enables and configures MLD snooping on the switch or on a VLAN. |
|
Configures an SDM template to optimize system resources based on how the switch is being used. |
show ipv6 mld snooping address
Use the show ipv6 mld snooping address user EXEC command to display all or specified IP Version 6 (IPv6) multicast address information maintained by Multicast Listener Discovery (MLD) snooping.
show ipv6 mld snooping address [[ vlan vlan-id ] [ ipv6 address ]] [ vlan vlan-id ] [ count | dynamic | user ]
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display IPv6 multicast address information.
You can enter an IPv6 multicast address only after you enter a VLAN ID.
VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in MLD snooping.
Use the dynamic keyword to display information only about groups that are learned. Use the user keyword to display information only about groups that have been configured.
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | vlan ) global configuration command and reload the switch.
Examples
This is an example of output from the show snooping address user EXEC command:
This is an example of output from the show snooping address count user EXEC command:
This is an example of output from the show snooping address user user EXEC command:
Related Commands
|
|
---|---|
Configures an SDM template to optimize system resources based on how the switch is being used. |
show ipv6 mld snooping mrouter
Use the show ipv6 mld snooping mrouter user EXEC command to display dynamically learned and manually configured IP version 6 (IPv6) Multicast Listener Discovery (MLD) router ports for the switch or a VLAN.
show ipv6 mld snooping mrouter [ vlan vlan-id ]
Syntax Description
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to display MLD snooping router ports for the switch or for a specific VLAN.
VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in MLD snooping.
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | vlan ) global configuration command and reload the switch.
Examples
This is an example of output from the show ipv6 mld snooping mrouter command. It displays snooping characteristics for all VLANs on the switch that are participating in MLD snooping.
This is an example of output from the show ipv6 mld snooping mrouter vlan command. It shows multicast router ports for a specific VLAN.
Related Commands
|
|
---|---|
Enables and configures MLD snooping on the switch or on a VLAN. |
|
ipv6 mld snooping vlan mrouter interface |
|
Configures an SDM template to optimize system resources based on how the switch is being used. |
show ipv6 mld snooping querier
Use the show ipv6 mld snooping querier user EXEC command to display IP version 6 (IPv6) Multicast Listener Discovery (MLD) snooping querier-related information most recently received by the switch or the VLAN.
show ipv6 mld snooping querier [ vlan vlan-id ] [ detail ]
Syntax Description
(Optional) Specify a VLAN; the range is 1 to 1001 and 1006 to 4094. |
|
(Optional) Display MLD snooping detailed querier information for the switch or for the VLAN. |
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show ipv6 mld snooping querier command to display the MLD version and IPv6 address of a detected device that sends MLD query messages, which is also called a querier. A subnet can have multiple multicast routers but has only one MLD querier. The querier can be a Layer 3 switch.
The show ipv6 mld snooping querier command output also shows the VLAN and interface on which the querier was detected. If the querier is the switch, the output shows the Port field as Router. If the querier is a router, the output shows the port number on which the querier is learned in the Port field.
The output of the show ipv6 mld snoop querier vlan command displays the information received in response to a query message from an external or internal querier. It does not display user-configured VLAN values, such as the snooping robustness variable on the particular VLAN. This querier information is used only on the MASQ message that is sent by the switch. It does not override the user-configured robustness variable that is used for aging out a member that does not respond to query messages.
VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in MLD snooping.
To configure the dual IPv4 and IPv6 template, enter the sdm prefer dual-ipv4-and-ipv6 { default | vlan ) global configuration command and reload the switch.
Examples
This is an example of output from the show ipv6 mld snooping querier command:
This is an example of output from the show ipv6 mld snooping querier detail command:
This is an example of output from the show ipv6 mld snooping querier vlan command:
Related Commands
show ipv6 route updated
Use the show ipv6 route updated command in user EXEC command to display the current contents of the IPv6 routing table.
show ipv6 route [ protocol ] updated [ boot-up ] { hh:mm | day { month [ hh:mm ]} [{ hh:mm | day { month [ hh:mm ]}]
Note This command is not supported on switches running the LAN base feature set.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the show ipv6 route privileged EXEC command to display the current contents of the IPv6 routing table.
Examples
This is an example of output from the show ipv6 route updated rip command.
Related Commands
show l2protocol-tunnel
Use the show l2protocol-tunnel user EXEC command to display information about Layer 2 protocol tunnel ports. Displays information for interfaces with protocol tunneling enabled.
show l2protocol-tunnel [ interface interface-id ] [ summary ]
Note This command is not supported on switches running the LAN base feature set.
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
After enabling Layer 2 protocol tunneling on an access or IEEE 802.1Q tunnel port by using the l2protocol-tunnel interface configuration command, you can configure some or all of these parameters:
If you enter the show l2protocol-tunnel [ interface interface-id ] command, only information about the active ports on which all the parameters are configured appears.
If you enter the show l2protocol-tunnel summary command, only information about the active ports on which some or all of the parameters are configured appears.
Examples
This is an example of output from the show l2protocol-tunnel command:
This is an example of output from the show l2protocol-tunnel summary command: