- #macro keywords
- aaa accounting dot1x default start-stop group radius
- aaa accounting system default start-stop group radius
- access-group mode
- access-list hardware capture mode
- access-list hardware entries
- access-list hardware region
- action
- active
- ancp client port identifier
- ancp client server
- ancp mode client
- apply
- arp access-list
- attach module
- authentication control-direction
- authentication critical recovery delay
- authentication event
- authentication fallback
- authentication host-mode
- authentication logging verbose
- authentication open
- authentication order
- authentication periodic
- authentication port-control
- authentication priority
- authentication timer
- authentication violation
- auto qos classify
- auto qos classify police
- auto qos srnd4
- auto qos trust
- auto qos video
- auto qos voip
- auto qos voip cisco-softphone
- auto-sync
- average-packet-size (netflow-lite monitor submode)
- bandwidth
- call-home (global configuration)
- call-home request
- call-home send
- call-home send alert-group
- call-home test
- channel-group
- channel-protocol
- cisp enable
- class
- class-map
- clear counters
- clear errdisable interface
- clear hw-module slot password
- clear interface gigabitethernet
- clear interface vlan
- clear ip access-template
- clear ip arp inspection log
- clear ip arp inspection statistics
- clear ip dhcp snooping binding
- clear ip dhcp snooping database
- clear ip dhcp snooping database statistics
- clear ip igmp group
- clear ip igmp snooping membership
- clear ip mfib counters
- clear ip mfib fastdrop
- clear ip wccp
- clear lacp counters
- clear mac-address-table
- clear mac-address-table dynamic
- clear netflow-lite exporter statistics
- clear netflow-lite monitor statistics interface
- clear nmsp statistics
- clear pagp
- clear port-security
- clear pppoe intermediate-agent statistics
- clear qos
- clear switch virtual dual-active
- clear vlan counters
- clear vmps statistics
- control-plane
- cos (netflow-lite exporter submode)
- counter
- dbl
- debug adjacency
- debug backup
- debug condition interface
- debug condition standby
- debug condition vlan
- debug device-sensor
- debug dot1x
- debug etherchnl
- debug interface
- debug ipc
- debug ip dhcp snooping event
- debug ip dhcp snooping packet
- debug ip verify source packet
- debug lacp
- debug monitor
- debug nmsp
- debug nvram
- debug pagp
- debug platform packet protocol lacp
- debug platform packet protocol pagp
- debug pm
- debug port-security
- debug pppoe intermediate-agent
- debug redundancy
- debug spanning-tree
- debug spanning-tree backbonefast
- debug spanning-tree switch
- debug spanning-tree uplinkfast
- debug sw-vlan
- debug sw-vlan ifs
- debug sw-vlan notification
- debug sw-vlan vtp
- debug udld
- debug vqpc
- define interface-range
- deny
- destination (netflow-lite exporter submode)
- destination address
- destination message-size-limit bytes
- destination preferred-msg-format
- destination transport-method
- device-sensor filter-list
- device-sensor filter-list dhcp
- device-sensor filter-spec
- device-sensor notify
- diagnostic fpga soft-error recover
- diagnostic monitor action
- diagnostic start
- dot1x auth-fail max-attempts
- dot1x auth-fail vlan
- dot1x control-direction
- dot1x credentials (global configuration)
- dot1x critical
- dot1x critical eapol
- dot1x critical recovery delay
- dot1x critical vlan
- dot1x guest-vlan
- dot1x guest-vlan supplicant
- dot1x host-mode
- dot1x initialize
- dot1x logging verbose
- dot1x mac-auth-bypass
- dot1x max-reauth-req
- dot1x max-req
- dot1x port-control
- dot1x re-authenticate
- dot1x re-authentication
- dot1x system-auth-control
- dot1x timeout
- dscp (netflow-lite exporter submode)
- dual-active detection (virtual switch)
- dual-active fast-hello (virtual switch)
- dual-active recovery ip address
- duplex
- epm access control
- erase
- errdisable detect cause
- errdisable recovery
- export-protocol (netflow-lite exporter submode)
- exporter (netflow-lite monitor submode)
- flowcontrol
- hardware statistics
- hw-module beacon
- hw-module module start
- hw-module module stop
- hw-module port-group
- hw-module power
- hw-module system max-port-num-mode 1/2
- hw-module system max-port-num-mode 1/2 switch 1/2/all
- hw-module system max-queue-limit
- hw-module uplink mode
- hw-module uplink select
- instance
Cisco IOS Commands for the Catalyst 4500 Series Switches
This chapter contains an alphabetical listing of Cisco IOS commands for the Catalyst 4500 series switches. For information about Cisco IOS commands that are not included in this publication, refer to Cisco IOS Release 12.2 configuration guides and command references at this URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_product_indices_list.html
#macro keywords
To specify the help string for the macro keywords, use the # macro keywords command.
#macro keywords [ keyword1 ] [ keyword2 ] [ keyword3 ]
Syntax Description
Defaults
Command Modes
Command History
|
|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If you do not specify the mandatory keywords for a macro, the macro is to be considered invalid and fails when you attempt to apply it. By entering the # macro keywords command, you will receive a message indicating what you need to include to make the syntax valid.
Examples
This example shows how to specify the help string for keywords associated with a macro named test:
Related Commands
aaa accounting dot1x default start-stop group radius
To enable accounting for 802.1X authentication sessions, use the aaa accounting dot1x default start-stop group radius command. To disable accounting, use the no form of this command.
aaa accounting dot1x default start-stop group radius
no aaa accounting dot1x default start-stop group radius
Syntax Description
Defaults
Command Modes
Command History
|
|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
802.1X accounting requires a RADIUS server.
This command enables the Authentication, Authorization, and Accounting (AAA) client’s accounting feature to forward 802.1X update and watchdog packets from the 802.1X supplicant (workstation client) to the authentication (RADIUS) server. (Watchdog packets are defined as EAPOL-LOGON, EAPOL-LOGOFF, and EAPOL-INTERIM messages.) Successful authentication and authorization of the supplicant by the authentication server is required before these packets are considered valid and are forwarded. When the client is reauthenticated, an interim-update accounting notice is sent to the accounting server.
Examples
This example shows how to configure 802.1X accounting:
Note The RADIUS authentication server must be properly configured to accept and log update or watchdog packets from the AAA client.
Related Commands
|
|
---|---|
Receives the session termination messages after the switch reboots. |
aaa accounting system default start-stop group radius
To receive the session termination messages after the switch reboots, use the aaa accounting system default start-stop group radius command. To disable accounting, use the no form of this command.
aaa accounting system default start-stop group radius
no aaa accounting system default start-stop group radius
Syntax Description
Defaults
Command Modes
Command History
|
|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
802.1X accounting requires the RADIUS server.
This command enables the AAA client’s accounting feature to forward 802.1X update and watchdog packets from the 802.1X supplicant (workstation client) to the authentication (RADIUS) server. (Watchdog packets are defined as EAPOL-LOGON, EAPOL-LOGOFF, and EAPOL-INTERIM messages.) Successful authentication and authorization of the supplicant by the authentication server is required before these packets are considered valid and are forwarded. When the client is reauthenticated, an interim-update accounting notice is sent to the accounting server.
Examples
This example shows how to generate a logoff after a switch reboots:
Note The RADIUS authentication server must be properly configured to accept and log update or watchdog packets from the AAA client.
Related Commands
|
|
---|---|
access-group mode
To specify the override modes (for example, VACL overrides PACL) and the non-override modes (for example, merge or strict mode), use the access-group mode command. To return to preferred port mode, use the no form of this command.
access-group mode { prefer { port | vlan } | merge }
no access-group mode { prefer { port | vlan } | merge }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
On the Layer 2 interface, prefer port, prefer VLAN, and merge modes are supported. A Layer 2 interface can have one IP ACL applied in either direction (one inbound and one outbound).
Examples
This example shows how to make the PACL mode on the switch take effect:
This example shows how to merge applicable ACL features:
Related Commands
|
|
---|---|
access-list hardware capture mode
To select the mode of capturing control packets, use the access-list hardware capture mode command.
access-list hardware capture mode { global | vlan }
Syntax Description
Specifies the capture of control packets globally on all VLANs. |
|
Specifies the capture of control packets on a specific VLAN. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is not supported on the Supervisor Engine 6-E and the Catalyst 4900M chassis.
Before configuring the capture mode, it is best to examine and modify your configuration to globally disable features such as DHCP snooping or IGMP snooping, and instead enable them on specific VLANs.
When changing to path managed mode, be aware that control traffic may be bridged in hardware or dropped initially until the per-vlan CAM entries are programmed in hardware.
You must ensure that any access control configuration on a member port or VLAN does not deny or drop the control packets from being forwarded to the CPU for the features which are enabled on the VLAN. If control packets are not permitted then the specific feature does not function.
Examples
This example shows how to configure the switch to capture control packets on VLANs that are configured to enable capturing control packets:
This example shows how to configure the switch to capture control packets globally across all VLANs (using a static ACL):
This example shows another way to configure the switch to capture control packets globally across all VLANs:
access-list hardware entries
To designate how ACLs are programmed into the switch hardware, use the access-list hardware entries command.
access-list hardware entries { packed | scattered }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Two types of hardware resources are used when ACLs are programmed: entries and masks. If one of these resources is consumed, no additional ACLs can be programmed into the hardware. If the masks are consumed, but the entries are available, change the programming algorithm from packed to scattered to make the masks available. This action allows additional ACLs to be programmed into the hardware.
The goal is to use TCAM resources more efficiently; that is, to minimize the number of masks per ACL entries. To compare TCAM utilization when using the scattered or packed algorithms, use the
show platform hardware acl statistics utilization brief command. To change the algorithm from packed to scattered, use the access-list hardware entries command.
Examples
This example shows how to program ACLs into the hardware as packed. After they are programmed, you will need 89 percent of the masks to program only 49 percent of the ACL entries.
access-list hardware region
To modify the balance between TCAM regions in hardware, use the access-list hardware region command.
access-list hardware region { feature | qos } { input | output } balance { bal-num }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
PandV is a TCAM region containing entries which mask in both the port and VLAN tag portions of the flow label.
PorV is a TCAM region containing entries which mask in either the port or VLAN tag portion of the flow label, but not both.
A balance of 1 allocates the minimum number of PandV region entries and the maximum number of PorV region entries. A balance of 99 allocates the maximum number of PandV region entries and the minimum number of PorV region entries. A balance of 50 allocates equal numbers of PandV and PorV region entries in the specified TCAM.
Examples
This example shows how to enable the MAC notification trap when a MAC address is added to a port:
action
To specify an action to be taken when a match occurs in a VACL, use the action command. To remove an action clause, use the no form of this command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
In a VLAN access map, if at least one ACL is configured for a packet type (IP or MAC), the default action for the packet type is drop (deny).
If an ACL is not configured for a packet type, the default action for the packet type is forward (permit).
If an ACL for a packet type is configured and the ACL is empty or undefined, the configured action will be applied to the packet type.
Examples
This example shows how to define a drop action:
This example shows how to define a forward action:
Syntax Description
|
|
---|---|
Specifies a match clause by selecting one or more ACLs for a VLAN access-map sequence. |
|
Enters VLAN access-map command mode to create a VLAN access map. |
active
To enable the destination profile, use the active command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Examples
This example shows how to enable the destination profile:
Related Commands
ancp client port identifier
To create a mapping for an ANCP client to identify an interface on which ANCP should start or stop a multicast stream, use the ancp client port identifier command.
ancp client port identifier identifying name vlan vlan number interface interface
Syntax Description
Identifier used by the ANCP server to specify an interface member of a VLAN. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The ANCP server can use either the DHCP option 82 circuit ID or an identifier created with this commandto identify the port. Use only one of the two methods; do not interchange them. If you use the DHCP option 82, the port identifier used by the ANCP server should be (in hex) 0x01060004[vlan][intf]. For example, VLAN 19 and interface Fast Ethernet 2/3 will provide 0x0106000400130203. If you use the port identifier, however, use the exact string provided on the CLI.
Note This command is available only after you set the box in ANCP client mode with the ancp mode client configuration command.
Examples
This example shows how to identify interface FastEthernet 7/3 on VLAN 10 with the string NArmstrong:
Related Commands
|
|
---|---|
ancp client server
To set the IP address of the remote ANCP server, use the ancp client server command.
ancp client server ipaddr of server interface interface
Syntax Description
IP address of the ANCP server the client must connect with TCP. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The interface can be the direct interface connected towards the ANCP server (if only one) or a loopback interface if several interfaces are available for connecting to the server and proper routing is set. (An IP address must be configured on this interface and it should not be in shutdown state.) Along with the ancp mode client command, the ancp client server command is required in order to activate the ANCP client. Once you enter this command, the ANCP client tries to connect to the remote server.
Examples
This example shows how to indicate to the ANCP client the IP address of the ANCP server it needs to connect to:
Related Commands
|
|
---|---|
ancp mode client
To set the router to become an ANCP client, use the ancp mode client command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
To fully activate ANCP, the administrator must also set the ANCP server IP address to which the ANCP client must connect.
Examples
This example shows how to set the router to become an ANCP client:
Related Commands
|
|
---|---|
apply
To implement a new VLAN database, increment the configuration number, save the configuration number in NVRAM, and propagate the configuration number throughout the administrative domain, use the apply command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The apply command implements the configuration changes that you made after you entered VLAN database mode and uses them for the running configuration. This command keeps you in VLAN database mode.
You cannot use this command when the switch is in the VTP client mode.
You can verify that the VLAN database changes occurred by entering the show vlan command from privileged EXEC mode.
Examples
This example shows how to implement the proposed new VLAN database and to recognize it as the current database:
Switch(config-vlan)#
apply
Switch(config-vlan)#
Related Commands
arp access-list
To define an ARP access list or add clauses at the end of a predefined list, use the arp access-list command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to define an ARP access list named static-hosts:
Related Commands
attach module
To remotely connect to a specific module, use the attach module configuration command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command applies only to the Access Gateway Module on Catalyst 4500 series switches.
The valid values for mod depend on the chassis that are used. For example, if you have a Catalyst 4506 chassis, valid values for the module are from 2 to 6. If you have a 4507R chassis, valid values are from 3 to 7.
When you execute the attach module mod command, the prompt changes to Gateway#.
This command is identical in the resulting action to the session module mod and the remote login module mod commands.
Examples
This example shows how to remotely log in to an Access Gateway Module:
Related Commands
|
|
---|---|
Logs in to the standby supervisor engine using a virtual console. |
authentication control-direction
To change the port control to unidirectional or bidirectional, use the authentication control-direction command in interface configuration mode. To return to the default setting, use the no form of this command.
authentication control-direction { both | in }
no authentication control-direction
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The authentication control-direction command replaces the following dot1x command, which is deprecated in Cisco IOS Release 12.2(50)SG and later releases:
dot1x control-direction { both | in }
The IEEE 802.1X standard defines a client-server-based access control and authentication protocol that restricts unauthorized devices from connecting to a LAN through publicly accessible ports.
IEEE 802.1X controls network access by creating two distinct virtual access points at each port. One access point is an uncontrolled port; the other is a controlled port. All traffic through the single port is available to both access points. IEEE 802.1X authenticates each user device that connects to a switch port and assigns the port to a VLAN before making available any services that are offered by the switch or the LAN. Until the device authenticates, 802.1X access control allows only Extensible Authentication Protocol (EAP) over LAN (EAPOL) traffic through the port to which the device connects. After authentication succeeds, normal traffic can pass through the port.
- Unidirectional state—When you configure a port as unidirectional with the
dot1x control-direction interface configuration command, the port changes to the spanning-tree forwarding state.
When the unidirectional controlled port is enabled, the connected host is in sleeping mode or power-down state. The host does not exchange traffic with other devices in the network. If the host connected to the unidirectional port that cannot send traffic to the network, the host can only receive traffic from other devices in the network.
- Bidirectional state—When you configure a port as bidirectional with the dot1x control-direction interface configuration command, the port is access-controlled in both directions. In this state, the switch port sends only EAPOL.
Using the both keyword or using the no form of this command changes the port to its bidirectional default setting.
Setting the port as bidirectional enables 802.1X authentication with Wake-on-LAN (WoL).
You can verify your settings by entering the show authentication privileged EXEC command.
Examples
The following example shows how to enable unidirectional control:
The following example shows how to enable bidirectional control:
The following example shows how to return to the default settings:
Related Commands
|
|
---|---|
authentication critical recovery delay
To configure the 802.1X critical authentication parameters, use the authentication critical recovery delay command in global configuration mode. To return to the default settings, use the no form of this command.
authentication critical recovery delay milliseconds
no authentication critical recovery delay
Syntax Description
Specifies the recovery delay period in milliseconds to wait to reinitialize a critical port when an unavailable RADIUS server becomes available. The rang is 1 to 10000 milliseconds. |
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The authentication critical recovery delay command replaces the following dot1x command, which is deprecated in Cisco IOS Release 12.2(50)SG and later releases:
dot1x critical recovery delay milliseconds
You can verify your settings by entering the show authentication privileged EXEC command.
Examples
This example shows how to set the recovery delay period that the switch waits to reinitialize a critical port when an unavailable RADIUS server becomes available:
Related Commands
|
|
---|---|
authentication event
To configure the actions for authentication events, use the authentication event interface configuration command. To return to the default settings, use the no form of this command.
authentication event fail [retry count] action [authorize vlan vlan | next-method}
authentication event server { alive action reinitialize | dead action authorize [vlan vlan] | voice | dead action reinitialize [vlan vlan]}}
authentication event no-response action authorize vlan vlan]}
no authentication event { fail} | {server {alive | dead}} | {no-response}
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The authentication event fail command replaces the following 802.1X commands, which are deprecated in Cisco IOS Release 12.2(50)SG and later releases:
The authentication event fail command is supported only for 802.1X to signal authentication failures. By default, this failure type causes the authentication method to be retried. You can configure either to authorize the port in the configured VLAN or to failover to the next authentication method. Optionally, you can specify the number of authentication retries before performing this action.
The authentication event server command replaces the following 802.1X commands, which are deprecated in Cisco IOS Release 12.2(50)SG and later releases:
- [ no ] dot1x critical
- [ no ] dot1x critical vlan vlan
- [ no ] dot1x critical recover action initialize
The authentication event server command specifies the behavior when the AAA server becomes unreachable, ports are authorized in the specified VLAN.
The authentication server alive action command specifies the action to be taken once the AAA server becomes reachable again.
You can verify your settings by entering the show authentication privileged EXEC command.
The authentication event no-response command replaces the following 802.1X command, which is deprecated in Cisco IOS Release 12.2(50)SG and later releases:
The authentication event no-response command specifies the action to be taken when the client does not support 802.1X.
Examples
The following example shows how to specify that when an authentication fails due to bad user credentials, the process advances to the next authentication method:
The following example shows how to specify the AAA server alive actions as reinitialize all authorized clients for authentication events:
The following example shows how to specify the AAA server dead actions that authorize the port for authentication events:
The following example shows how to specify the conditions when a client doesn't support 802.1X to authorize the port for authentication events:
Related Commands
|
|
---|---|
authentication fallback
To enable WebAuth fallback and to specify the fallback profile to use when failing over to WebAuth, use the authentication fallback interface command. To return to the default setting, use the no form of this command.
authentication fallback profile
Syntax Description
Name to use when failing over to WebAuth (maximum of 200 characters). |
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
By default, if 802.1X times out and if MAB fails, WebAuth is enabled.
The authentication fallback command replaces the following dot1x command, which is deprecated in Cisco IOS Release 12.2(50)SG and later releases:
The Webauth fallback feature allows you to have those clients that do not have an 802.1X supplicant and are not managed devices to fall back to the WebAuth method.
You can verify your settings with the show authentication privileged EXEC command.
Examples
This example shows how to enable WebAuth fallback and specify the fallback profile to use when failing over to WebAuth:
This example shows how to disable WebAuth fallback:
Related Commands
|
|
---|---|
authentication host-mode
To define the classification of a session that will be used to apply the access-policies in host-mode configuration, use the authentication host-mode command in interface configuration mode. To return to the default settings, use the no form of this command.
authentication host-mode { single-host | multi-auth | multi-domain | multi-host } [ open ]
[no] authentication host-mode { single-host | multi-auth | multi-domain | multi-host } [ open ]
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Single-host mode classifies the session as an interface session (for example, one MAC per interface). Only one client is allowed on the port, and any policies that are downloaded for the client are applied to the whole port. A security violation is triggered if more than one client is detected.
Multi-host mode classifies the session as an interface session, but the difference with this host-mode is that it allows more than one client to attach to the port. Only the first client that is detected on the port will be authenticated and the rest will inherit the same access as the first client. The policies that are downloaded for the first client will be applied to the whole port.
Multi-domain mode classifies the session based on a combination of MAC address and domain, with the restriction that only one MAC is allowed per domain. The domain in the switching environment refers to the VLAN, and the two supported domains are the DATA domain and the voice domain. Only one client is allowed on a particular domain. So, only two clients (MACs) per port are supported. Each one is required to authenticate separately. Any policies that are downloaded for the client will be applied for that client’s MAC/IP only and will not affect the other on the same port. The clients can be authenticated using different methods (such as 802.1X for PC, MAB for IP phone, or vice versa). No restriction exists on the authentication order.
The only caveat with the above statement is that web-based authentication is only available for data devices because a user is probably operating the device and HTTP capability exists. Also, if web-based authentication is configured in MDA mode, the only form of enforcement for all types of devices is downloadable ACLs (dACL). The restriction is in place because VLAN assignment is not supported for web-based authentication. Furthermore, if you use dACLs for data devices and not for voice devices, when the user’s data falls back to webauth, voice traffic is affected by the ACL that is applied based on the fallback policy. Therefore if webauth is configured as a fallback on an MDA enabled port, dACL is the only supported enforcement method.
Multi-auth mode classifies the session as a MAC-based. No limit exists for the number of clients allowed on a port data domain. Only one client is allowed in a voice domain and each one is required to authenticate separately. Any policies that are downloaded for the client are applied for that client’s MAC or IP only and do not affect others on the same port.
The optional pre-authentication open access mode allows you to gain network access before authentication is performed.This is primarily required for the PXE boot scenario, but not limited to just that use case, where a device needs to access the network before PXE times out and downloads a bootable image possibly containing a supplicant.
The configuration related to this feature is attached to the host-mode configuration whereby the host-mode itself is significant for the control plane, while the open access configuration is significant for the data plane. Open-access configuration has absolutely no bearing on the session classification. The host-mode configuration still controls this. If the open-access is defined for single-host mode, the port still allows only one MAC address. The port forwards traffic from the start and is only restricted by what is configured on the port. Such configurations are independent of 802.1X. So, if there is no form of access-restriction configured on the port, the client devices have full access on the configured VLAN.
You can verify your settings with the show authentication privileged EXEC command.
Examples
This example shows how to define the classification of a session that are used to apply the access-policies using the host-mode configuration:
Related Commands
|
|
---|---|
authentication logging verbose
Use the authentication logging verbose global configuration command on the switch stack or on a standalone switch to filter detailed information from authentication system messages. Use the no form of this command to return to the default setting.
authentication logging verbose
no authentication logging verbose
Defaults
Syntax Description
Command Modes
Command History
|
|
---|---|
Usage Guidelines
This command filters details, such as anticipated success, from authentication system messages.
Examples
To filter verbose authentication system messages:
You can verify your settings by entering the show running-config privileged EXEC command.
Related Commands
|
|
---|---|
Filters details from MAC authentication bypass (MAB) system messages. |
authentication open
To enable open access on this port, use the authentication open command in interface configuration mode. To disable open access on this port, use the no form of this command.
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Open Access allows clients or devices to gain network access before authentication is performed.
You can verify your settings with the show authentication privileged EXEC command.
This command overrides the authentication host-mode session-type open global configuration mode command for the port only.
Examples
The following example shows how to enable open access to a port:
The following example shows how to enable open access to a port:
Related Commands
|
|
---|---|
authentication order
To specify the order in which authentication methods should be attempted for a client on an interface, use the authentication order command in interface configuration mode. To return to the default settings, use the no form of this command.
authentication order method1 [ method2 ] [ method3 ]
Syntax Description
Authentication method to be attempted. The valid values are as follows: |
|
(Optional) Authentication method to be attempted. The valid values are as follows: |
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Once you enter the authentication order command, only those methods explicitly listed will run. Each method may be entered only once in the run list and no methods may be entered after you enter the webauth keyword.
Authentication methods are applied in the configured (or default) order until authentication succeeds. For authentication fails, failover to the next authentication method occurs (subject to the configuration of authentication event handling).
You can verify your settings with the show authentication privileged EXEC command.
Examples
The following example shows how to specify the order in which authentication methods should be attempted for a client on an interface :
Related Commands
|
|
---|---|
authentication periodic
To enable reauthentication for this port, use the authentication periodic command in interface configuration mode. To disable reauthentication for this port, use the no form of this command.
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The authentication periodic command replaces the following dot1x command, which is deprecated in Cisco IOS Release 12.2(50)SG and later releases:
The reauthentication period can be set using the authentication timer command.
You can verify your settings by entering the show authentication privileged EXEC command.
Examples
The following example shows how to enable reauthentication for this port :
The following example shows how to disable reauthentication for this port :
Related Commands
|
|
---|---|
authentication port-control
To configure the port-control value, use the authentication port-control command in interface configuration mode. To return to the default setting, use the no form of this command.
authentication port-control [ auto | force-authorized | force-unauthorized ]
no authentication port-control
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
The authentication port-control command replaces the following dot1x command, which is deprecated in Cisco IOS Release 12.2(50)SG and later releases:
[no] dot1x port-control [ auto | force-authorized | force-unauthorized ]
The following guidelines apply to Ethernet switch network modules:
- The 802.1X protocol is supported on Layer 2 static-access ports.
- You can use the auto keyword only if the port is not configured as one of the following types:
– Trunk port—If you try to enable 802.1X on a trunk port, an error message appears, and 802.1X is not enabled. If you try to change the mode of an 802.1X-enabled port to trunk, the port mode is not changed.
– EtherChannel port—Before enabling 802.1X on the port, you must first remove it from the EtherChannel. If you try to enable 802.1X on an EtherChannel or on an active port in an EtherChannel, an error message appears, and 802.1X is not enabled. If you enable 802.1X on a not-yet active port of an EtherChannel, the port does not join the EtherChannel.
– Switch Port Analyzer (SPAN) destination port—You can enable 802.1X on a port that is a SPAN destination port; however, 802.1X is disabled until the port is removed as a SPAN destination. You can enable 802.1X on a SPAN source port.
To globally disable 802.1X on the device, you must disable it on each port. There is no global configuration command for this task.
You can verify your settings with the show authentication privileged EXEC command.
The auto keyword allows you to send and receive only Extensible Authentication Protocol over LAN (EAPOL) frames through the port. The authentication process begins when the link state of the port transitions from down to up or when an EAPOL-start frame is received. The system requests the identity of the client and begins relaying authentication messages between the client and the authentication server. Each client attempting to access the network is uniquely identified by the system through the client’s MAC address.
Examples
The following example shows that the authentication status of the client PC will be determined by the authentication process:
Related Commands
|
|
---|---|
authentication priority
To specify the priority of authentication methods on an interface, use the authentication priority command in interface configuration mode. To return to the default settings, use the no form of this command.
authentication priority method1 [ method2 ] [ method3 ]
Syntax Description
Authentication method to be attempted. The valid values are as follows: |
|
(Optional) Authentication method to be attempted. The valid values are as follows: |
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Configuring priorities for authentication methods allows a higher priority method (not currently running) to interrupt an authentication in progress with a lower priority method. Alternatively, if the client is already authenticated, an interrupt from a higher priority method can cause a client, which was previously authenticated using a lower priority method, to reauthenticate.
The default priority of a method is equivalent to its position in the order of execution list. If you do not configure a priority, the relative priorities (highest first) are dot1x, MAB and then webauth. If you enter the authentication order command, the default priorities are the same as the configured order.
You can verify your settings with the show authentication privileged EXEC command.
Examples
The following example shows how to specify the priority in which authentication methods should be attempted for a client on an interface :
Related Commands
|
|
---|---|
Specifies the order in which authentication methods should be attempted for a client on an interface. |
|
authentication timer
To configure the authentication timer, use the authentication timer command in interface configuration mode. To return to the default settings, use the no form of this command.
authentication timer {{ inactivity value } | { reauthenticate { server | value }} | { restart value }}
no authentication timer {{ inactivity value } | { reauthenticate value } | { restart value }}
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Reauthentication only occurs if it is enabled on the interface.
The authentication timer reauthenticate value command replaces the following dot1x command that is deprecated in Cisco IOS Release 12.2(50)SG and later releases:
[ no ] dot1x timeout { reauth-period seconds | quiet-period seconds | tx-period seconds | supp-timeout seconds | server-timeout seconds }
Note You should change the default values of this command only to adjust for unusual circumstances such as unreliable links or specific behavioral problems with certain clients or authentication servers.
During the inactivity period, the Ethernet switch network module does not accept or initiate any authentication requests. If you want to provide a faster response time to the user, enter a number less than the default.
The reauthenticate keyword affects the behavior of the Ethernet switch network module only if you have enabled periodic reauthentication with the authentication reauthentication global configuration command.
Examples
The following example shows how to specify that the reauthentication period value for the client should be obtained from the authentication, authorization, and accounting (AAA) server as Session-Timeout (RADIUS Attribute 27) :
Related Commands
|
|
---|---|
authentication violation
Use the authentication violation interface configuration command to configure the violation mode: restrict, shutdown, and replace.
In single-host mode, a security violation is triggered when more than one device are detected on the data vlan. In multidomain authentication mode, a security violation is triggered when more than one device are detected on the data or voice VLAN.
Security violation cannot be triggered in multiplehost or multiauthentication mode.
authentication violation { restrict | shutdown | replace}
no authentication violation {restrict | shutdown | replace}
Syntax Description
Error disables the [virtual] port on which an unexpected MAC address occurs. |
|
Replaces the existing host with the new host, instead of errordisabling or restricting the port. |
Defaults
Shut down the port. If the restrict keyword is configured, the port does not shutdown.
Command Modes
Command History
|
|
---|---|
Usage Guidelines
When a new host is seen in single or multiple- domain modes, replace mode tears down the old session and authenticates the new host.
Examples
This example shows how to configure violation mode shutdown on a switch:
A port is error-disabled when a security violation triggers on shutdown mode. The following syslog messages displays:
Related Commands
auto qos classify
To generate a QoS configuration for an untrusted interface, use the auto qos classify interface command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command generates a QoS configuration for untrusted interfaces. It places a service-policy to classify the traffic coming from untrusted desktops or devices and marks them accordingly. The service-policies generated do not police.
Global Level Commands Generated
The global templates are defined in A, B, C.
A. Template for ACLs and application classes used by the auto qos classify command.
AutoQos-4.0-VoIP-Data-Cos and AutoQos-4.0-VoIP-Signal-Cos are needed to handle instances when you connect an IP phone to an interface and call the auto qos voip cisco-phone command on that interface. In this situation, the input service policy on the interface must match VoIP and signaling packets solely on their CoS markings. This is because switching ASICs on Cisco IP Phones are limited to only remarking the CoS bits of VoIP and the signaling traffic. Matching DSCP markings results in a security vulnerability because a user whose PC was connected to an IP phone connected to a switch would be able to remark DSCP markings of traffic arising from their PC to dscp ef using the NIC on their PC. This causes incorrect placement of non real-time traffic in the priority queue in the egress direction.
B. Template for the auto qos classify command input service-policy
C. Template for egress queue classes along with the SRND4 output policy that uses the egress classes to allocate 8 queues. This template is required by all SRND4 commands:
Because police commands executed in policy map configuration mode do not allow the remarking of qos-groups for traffic flows that exceed defined rate limits, you must configure AutoQos-4.0-Scavenger-Queue to match either qos-group 7 or dscp af11. When you enter the auto qos classify police command, traffic flows that violate the defined rate limit are remarked to cs1 but retain their original qos-group classification because qos-groups cannot be remarked as an exceed action. However, because AutoQos-4.0-Scavenger-Queue is defined before all other queues in the output policy map, remarked packets fall into it, despite retaining their original qos-group labels.
Interface Level Commands Generated
Examples
This example shows how to generate a QoS configuration for the untrusted interface gigabitethernet1/1:
Related Commands
|
|
---|---|
Generate QoS configuration for interfaces connected to PCs running the Cisco IP SoftPhone application and marks police traffic coming from such interfaces. |
auto qos classify police
To police traffic form an untrusted interface, use the auto qos classify police interface command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command generates a QoS configuration for untrusted interfaces. It places a service-policy to classify the traffic arriving from these untrusted desktops or devices and marks them accordingly. The generated service-policies police and either mark-down or drop packets.
Global Level Commands Generated
Auto QoS srn4 commands, once applied to an interface, generate one or more of the following templates (A, B, and C) at the global configuration level. Typically, a command generates a series of class-maps that either match on ACLs or on DSCP or CoS values to differentiate traffic into application classes. An input policy is generated that matches the generated classes, sets qos-groups on the classes, and in some cases, polices the classes to a set bandwidth. (A qos-group is merely a numerical tag that allows different application classes to be treated as one unit. Outside the switch’s context, it has no significance.) Furthermore, eight egress-queue class-maps are generated, matching the qos-groups set in the input policy. The actual egress output policy assigns a queue to each one of these eight egress-queue class-maps.
The commands generate the following templates as needed. For example, on initial use of the a new command, global configurations that define the eight queue egress service-policy are generated (template C, below). Subsequently, auto qos commands applied to other interfaces do not generate templates for egress queuing because all auto qos commands rely on the same eight queue model after migration, and they will have already been generated from the first use of the command.
The global templates are defined in A, B, C.
A. Template for ACLs and application classes used by the auto qos classify police command
AutoQos-4.0-VoIP-Data-Cos and AutoQos-4.0-VoIP-Signal-Cos are needed to handle the case in which a user connects an IP phone to an interface and calls the auto qos voip cisco-phone command on that interface. In this situation, the input service policy on the interface must match VoIP and signaling packets solely on their CoS markings because switching ASICs on Cisco IP phones are limited to only remarking the CoS bits of VoIP and signaling traffic. Matching DSCP markings would cause a security vulnerability because user whose PC was connected to an IP phone connected to a switch would be able to re-mark DSCP markings of traffic arising from their PC to dscp ef using the NIC on their PC. This places non real-time traffic in the priority queue in the egress direction.
B. Template for the input service-policy of the auto qos classify police command
C. Template for egress queue classes along with the SRND4 output policy that uses the egress classes to allocate eight queues. This template is required by the four SRND4 commands:
AutoQos-4.0-Scavenger-Queue must be configured to match either qos-group 7 or dscp af11 to accomodate for the fact that police commands executed in policy map configuration mode do not allow the remarking of qos-groups for traffic flows that exceed defined rate limits. After entering the auto qos classify police command, traffic flows that violate the defined rate limit are remarked to cs1 but retain their original qos-group classification because qos-groups cannot be remarked as an exceed action. However, because AutoQos-4.0-Scavenger-Queue is defined before all other queues in the output policy map, remarked packets fall into it, despite retaining their original qos-group labels.
Interface Level Commands Generated
Examples
This example shows how to police traffic from an untrusted interface gigabitethernet1/1:
Related Commands
auto qos srnd4
To generate QoS configurations based on solution reference network design 4.0, use the auto qos srnd4 global command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is generated when any new auto-QoS command is configured on an interface.
AutoQos SRND4 commands, when applied to an interface, generate one or more of the following templates (A and B) at the global configuration level.
Typcally, a command generates a series of class-maps that either match on ACLs or on DSCP and CoS values to differentiate traffic into application classes. An input policy is also generated, which matches the generated classes, sets qos-groups on the classes, and in some cases, polices the classes to a set bandwidth. (A qos-group is a numerical tag that allows different application classes to be treated as one unit. It has no significance outside the context of the switch in which it was set.) Furthermore, eight egress-queue class-maps are generated, matching the qos-groups set in the input policy. The actual egress output policy assigns a queue to each of the eight egress-queue class-maps.
AutoQos srnd4 commands only generate a templates as needed. For example, the first time you use a new srnd4 command, global configurations that define the eight queue egress service-policy are generated (template B below). Subsequently, auto qos commands applied to other interfaces do not generate templates for egress queuing because all auto-QoS commands rely on the same eight queue models after migration, and they will have already been generated from the first use of the command.
For interfaces with auto qos voip trust enabled
—Global Level Commands Generated
The global templates are defined in A and B (below).
A. This template of application classes is used by the auto-QoS video cts, auto qos video ip-camera, and auto qos trust commands. This template class also includes the input service-policy for the auto qos video cts, auto qos video ip-camera, and auto qos trust commands. Because these three commands are the only ones that use AutoQos-4.0-Input-Policy, it makes sense to include that policy in the same template that defines the application classes used by the previous three commands.
The AutoQos-4.0-Signaling and AutoQos-4.0-VoIP classes must match on CoS to handle the situation when an IP phone is connected to an interface. (Cisco IP phones are only capable of re-marking CoS bits, not DSCP.)
B. This template for egress queue classes (along with the SRND4 output policy) allocates eight queues. This template is required by all SRND4 commands:
Because the police commands executed in policy map configuration mode do not allow the re-marking of qos-groups for traffic flows that exceed defined rate limits, you should configure AutoQos-4.0-Scavenger-Queue to match either qos-group 7 or dscp af11. When you enter the auto qos classify police command, traffic flows that violate the defined rate limit are remarked to cs1 but retain their original qos-group classificatio because such groups cannot be re-marked as an exceed action. However, because AutoQos-4.0-Scavenger-Queue is defined before all other queues in the output policy map, re-marked packets fall into it, despite retaining their original qos-group labels.
—Interface Level Commands Generated
For interfaces with auto qos voip cisco-phone enabled
—Global Level Commands Generated
The global templates defined in A and B (above).
—Interface Level Commands Generated
Examples
To generate QoS configurations based on solution reference network design 4.0, do the following:
Related Commands
|
|
---|---|
Generate QoS configuration for interfaces connected to PCs running the Cisco IP SoftPhone application and marks police traffic coming from such interfaces. |
auto qos trust
To generate QoS configurations for trusted interfaces, use the auto qos trust interface command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Global Level Commands Generated
After you apply auto-QoS srnd4 commands to an interface, they generate one or more of the following templates (A and B) at the global configuration level. Typically, a command generates a series of class-maps that either match on ACLs or on DSCP or CoS values to differentiate traffic into application classes. An input policy is generated, which matches the generated classes, sets qos-groups on the classes, and in some cases, polices the classes to a set bandwidth. (A qos-group is simply a numerical tag that allows different application classes to be treated as one unit. Outside the switch’s context, it has no significance.) Additionally, eight egress-queue class-maps are generated, matching the qos-groups set in the input policy. The actual egress output policy assigns a queue to each of these eight class-maps.
The command only generates templates as needed. For example, on first use of a new command, global configurations that define the eight queue egress service-policy are generated. Subsequently, auto-QoS commands applied to other interfaces do not generate templates for egress queuing. This is because all auto-qos commands rely on the same eight queue models after migration, and they will have already been generated from the first use of the command.
The global templates defined in A and B.
A. Template of application classes used by the auto qos trust command
This template also includes the input service-policy for the auto qos video cts, auto qos video ip-camera, and auto qos trust commands. Because these three commands are the only ones that use the AutoQos-4.0-Input-Policy, you should include that policy in the template that defines the application classes used by the commands.
The AutoQos-4.0-Signaling and AutoQos-4.0-VoIP classes must also match on CoS to handle the case when an IP phone is connected to an interface. (Cisco IP phones are only capable of remarking CoS bits, not DSCP.)
B. Templates for egress queue classes and the srnd4 output policy that uses the egress classes to allocate eight queues. This template is required by all srnd4 commands.
Because police commands executed in policy map configuration mode do not allow the remarking of qos-groups for traffic flows that exceed defined rate limits, AutoQos-4.0-Scavenger-Queue must be configured to match either qos-group 7 or dscp af11. When the auto qos classify police command executes, traffic flows that violate the defined rate limit are remarked to cs1 but retain their original qos-group classification. This is because qos-groups cannot be remarked as an exceed action. However, because AutoQos-4.0-Scavenger-Queue is defined before all other queues in the output policy map, remarked packets will fall into it, despite retaining their original qos-group labels.
Interface Level Commands Generated
Examples
This example shows how to police traffic from an untrusted interface gigabitethernet1/1:
Related Commands
auto qos video
To generate QOS configuration for cisco-telepresence or cisco-camera interfaces (conditional trust through CDP), use the auto qos video interface configuration command.
auto qos video {cts | ip-camera}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The auto qos video command trusts an interface only if Cisco TelePresence is detected. Else, the port is untrusted.
Global Level Commands Generated
When auto-Qos srnd4 commands are applied to an interface, they generate one or more of the following templates at the global configuration level. Typically, a command generates a series of class-maps that either match on ACLs or on DSCP (or CoS) values to differentiate traffic into application classes. An input policy is also generated, which matches the generated classes, sets qos-groups on the classes, and in some cases, polices the classes to a set bandwidth. (A qos-group is simply a numerical tag that allows different application classes to be treated as one unit. Outside the switch’s context, it has no significance.) Furthermore, eight egress-queue class-maps are generated, which match the qos-groups set in the input policy. The actual egress output policy assigns a queue to each of the eight egress-queue class-maps.
The srnd4 commsands generate the templates only as needed. For example, on first use of the new command, global configurations that define the eight queue egress service-policy are generated. Subsequently, auto-QoS commands applied to other interfaces do not generate templates for egress queuing. This is because all auto-QoS commnds rely on the same eight queue model after migration, already generated on first use of the command.
The global templates defined in A and B.
A. Template of application classes used by the auto qos video command
This template also includes the input service-policy for the auto qos video cts, auto qos video ip-camera, and auto qos trust commands. Because these three commands are the only ones that use the AutoQos-4.0-Input-Policy, we advise that you include that policy in the same template that defines the application classes used by the commands.
The AutoQos-4.0-Signaling and AutoQos-4.0-VoIP classes must also match on CoS to the case where an IP phone is connected to an interface. (Cisco IP phones are only capable of remarking CoS bits, not DSCP.)
B. Template for egress queue classes and the srnd4 output policy that uses the egress classes to allocate eight queues. This template is required by all srnd commands:
Because police commands executed in policy map configuration mode do not allow the remarking of qos-groups for traffic flows that exceed defined rate limits, AutoQos-4.0-Scavenger-Queue must be configured to match either qos-group 7 or dscp af11. When the auto qos classify police command has been executed, traffic flows that violate the defined rate limit are remarked to cs1 but retain their original qos-group classification because qos-groups cannot be remarked as an exceed action. However, because AutoQos-4.0-Scavenger-Queue is defined before all other queues in the output policy map, remarked packets will fall into it, despite retaining their original qos-group labels.
Interface Level Commands Generated
Examples
This example shows how to generate a QoS configuration on the cisco-telepresence interface gigabitethernet1/1:
This example shows how to generate QoS configuration for the cisco-camera interface gigabitethernet1/1:
Related Commands
|
|
---|---|
Generates QoS configurations based on solution reference network design 4.0. |
auto qos voip
To automatically configure quality of service (auto-QoS) for voice over IP (VoIP) within a QoS domain, use the auto qos voip interface configuration command. To change the auto-QoS configuration settings to the standard QoS defaults, use the no form of this command.
auto qos voip { cisco-phone | trust }
no auto qos voip { cisco-phone | trust }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Use this command to configure a QoS that is appropriate for VoIP traffic within the QoS domain, which includes the switch, the interior of the network, and the edge devices that can classify incoming traffic for QoS.
Apply the cisco-phone keyword on those ports (at the edge of the network) that are connected to Cisco IP phones. The switch detects the telephone through Cisco Discovery Protocol (CDP) and trusts those CoS labels in packets that are received from the telephone.
Apply the trust keyword on those ports that are connected to the interior of the network. Assume that the traffic has already been classified by the other edge devices. So, the CoS/DSCP labels in these packets are trusted.
When you enable the auto-QoS feature on the specified interface, these actions automatically occur:
- QoS is globally enabled (qos global configuration command).
- DBL is enabled globally (qos dbl global configuration command).
- When you enter the auto qos voip cisco-phone interface configuration command, the trusted boundary feature is enabled. It uses the Cisco Discovery Protocol (CDP) to detect the presence or absence of a Cisco IP phone. When a Cisco IP phone is detected, the ingress classification on the specific interface is set to trust the CoS label that is received in the packet because some older phones do not mark DSCP. When a Cisco IP phone is absent, the ingress classification is set to not trust the CoS label in the packet.
- When you enter the auto qos voip trust interface configuration command, the ingress classification on the specified interface is set to trust the CoS label that is received in the packet provided the specified interface is configured as Layer 2 (and is set to trust DSCP if the interface is configured as Layer 3).
You can enable auto-QoS on static, dynamic-access, voice VLAN access, and trunk ports.
To display the QoS configuration that is automatically generated when auto-QoS is enabled, enable debugging (before you enable auto-QoS) with the debug auto qos privileged EXEC command.
To disable auto-QoS on an interface, use the no auto qos voip interface configuration command. When you enter this command, the switch enables standard QoS and changes the auto-QoS settings to the standard QoS default settings for that interface. This action will not change any global configuration performed by auto-QoS; the global configuration remains the same.
Examples
This example shows how to enable auto-QoS and to trust the CoS and DSCP labels that are received in the incoming packets when the switch or router that is connected to Gigabit Ethernet interface 1/1 is a trusted device:
This example shows how to enable auto-QoS and to trust the CoS labels that are received in incoming packets when the device connected to Fast Ethernet interface 2/1 is detected as a Cisco IP phone:
This example shows how to display the QoS configuration that is automatically generated when auto-QoS is enabled on an interface on a Supervisor Engine 6-E:
You can verify your settings by entering the show auto qos interface command.
Related Commands
|
|
---|---|
Displays the automatic quality of service (auto-QoS) configuration that is applied. |
|
auto qos voip cisco-softphone
To generate QoS configuration for interfaces connected to PCs running the Cisco IP SoftPhone application and mark police traffic coming from such interfaces, use the auto qos voip interface configuration command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Ports configured with auto qos voip command are considered untrusted.
Global Level Commands Generated
After auto-QoS srnd4 commands are applied to an interface, they generate one or more of the following templates (A, B, and C) at the global configuration level. Typically, a command generates a series of class-maps that either match on ACLs or on DSCP (or CoS) values to differentiate traffic into application classes. An input policy is also generated, whch matches the generated classes, sets qos-groups on the classes, and in some cases, polices the classes to a set bandwidth. (A qos-group is a numerical tag that allows different application classes to be treated as one unit. Outside the switch’s context, it has no significance.) Furthermore, eight egress-queue class-maps are generated, matching the qos-groups set in the input policy. The actual egress output policy assigns a queue to each of these eight class-maps.
The commands generate templates only as needed. For example, on first use of a new commnand, global configurations that define the eight queue egress service-policy are generated. Subsequently, auto-QoS applied to other interfaces do not generate templates for egress queuing. This is because all auto-QoS commands rely on the same eight queue models after migration, already been generated from the first use of the new command.
The global template is defined by A, B, and C.
A. Template for ACLs and application classes used by the auto qos voip cisco-softphone command
AutoQos-4.0-VoIP-Data-Cos and AutoQos-4.0-VoIP-Signal-Cos handles those instances when a user connects an IP phone to an interface and enters the auto qos voip cisco-phone command on that interface. In this situation, the input service policy on the interface must match VoIP and signaling packets based solely on their CoS markings because switching ASICs on Cisco IP Phones are limited to only remarking the CoS bits of VoIP and signaling traffic. Matching DSCP markings would result in a security vulnerability because a user whose PC was connected to an IP phone connected to a switch would be able to remark DSCP markings of traffic arriving from their PC to DSCP ef using the NIC on their PC. This results in incorrectly placing non real-time traffic in the priority queue in the egress direction.
B. Template for the auto qos voip cisco-softphone command input service-policy
C. Template for egress queue classes and the srnd4 output policy that uses the egress classes to allocate eight queues. This template is required by all srnd4 commands:
Because the police commands executed in policy map configuration mode do not allow remarking of qos-groups for traffic flows that exceed defined rate limits, AutoQos-4.0-Scavenger-Queue must be configured to match either qos-group 7 or dscp af11. When the auto qos classify police command has been executed, traffic flows that violate the defined rate limit are remarked to cs1 but retain their original qos-group classification because qos-groups cannot be remarked as an exceed action. However, because AutoQos-4.0-Scavenger-Queue is defined before all other queues in the output policy map, remarked packets will fall into it, despite retaining their original qos-group labels.
Interface Level Commands Generated
Examples
This example shows how to generate QoS configuration for interfaces Gigabit Ethernet 1/1 connected to a PC that is running the Cisco IP SoftPhone application:
Related Commands
|
|
---|---|
Generate QoS configuration for interfaces connected to PCs running the Cisco IP SoftPhone application and marks police traffic coming from such interfaces. |
|
auto-sync
To enable automatic synchronization of the configuration files in NVRAM, use the auto-sync command. To disable automatic synchronization, use the no form of this command.
auto-sync { startup-config | config-register | bootvar | standard }
no auto-sync { startup-config | config-register | bootvar | standard }
Syntax Description
Defaults
Standard automatic synchronization of all configuration files
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch (Catalyst 4507R only). |
Usage Guidelines
If you enter the no auto-sync standard command, no automatic synchronizations occur.
Examples
This example shows how (from the default configuration) to enable automatic synchronization of the configuration register in the main CPU:
Switch#
config terminal
Switch (config)#
redundancy
Switch (config-r)#
main-cpu
Switch (config-r-mc)#
no auto-sync standard
Switch (config-r-mc)#
auto-sync configure-register
Switch (config-r-mc)#
Related Commands
|
|
---|---|
average-packet-size (netflow-lite monitor submode)
Note NetFlow-lite is only supported on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches.
To specify the average packet size at the observation point in netflow-lite monitor submode, use the average-packet-size command. To delete a sampler, use the no form of this command.
average-packet-size average-packet-size
no average-packet-size average-packet-size
Syntax Description
Specifies the average packet size in bytes expected at the observation point. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
You can enter this command in physical port interface mode, port channel interface, or config VLAN mode.
The packet sampling mechanism attempts random 1-in-N sampling. Internally, 2 levels of sampling are performed. The accuracy of the first sampling level depends on the size of the packets arriving at a given interface. Use the average-packet-size parameter to tune the accuracy of the algorithm.
The system automatically determines the average packet size at an interface based on observation of input traffic and uses that value in its first level of sampling.
The algorithm requires a range of packet sizes from 64 to 9216 bytes. A value of 0 means that you want an automatic determination of average packet size.
Examples
The following example shows how to configure a monitor on a port interface Gigabit 1/3:
You can verify your settings with the show netflow-lite exporter privileged EXEC command.
Related Commands
|
|
---|---|
Activates sampling on an interface in netflow-lite monitor submode. |
|
bandwidth
To specify or modify the minimum bandwidth provided to a class belonging to a policy map attached to a physical port, use the bandwidth policy-map class command. To return to the default setting, use the no form of this command.
bandwidth { bandwidth-kbps | percent percent | remaining percent percent }
Syntax Description
Defaults
Command Modes
Policy-map class configuration mode
Command History
|
|
---|---|
This command was introduced on the Catalyst 4500 series switch using a Supervisor Engine 6E. |
Usage Guidelines
Use the bandwidth command only in a policy map attached to a physical port.
The bandwidth command specifies the minimum bandwidth for traffic in that class when there is traffic congestion in the switch. If the switch is not congested, the class receives more bandwidth than you specify with this command.
When queuing class is configured without any explicit bandwidth configuration, since the queue is not guaranteed any minimum bandwidth, this queue will get a share of any unallocated bandwidth on the port.
If there is no unallocated bandwidth for the new queue or if the unallocated bandwidth is not sufficient to meet the minimum configurable rate for all queues which do not have any explicit bandwidth configuration, then the policy association is rejected.
These restrictions apply to the bandwidth command:
- If the percent keyword is used, the sum of the class bandwidth percentages within a single policy map cannot exceed 100 percent. Percentage calculations are based on the bandwidth available on the port.
- The amount of bandwidth configured should be large enough to accommodate Layer 2 overhead.
- A policy map can have all the class bandwidths specified in either kbps or in percentages, but not a mix of both.
Examples
This example shows how to set the minimum bandwidth to 2000 kbps for a class called silver-class . The class already exists in the switch configuration:
This example shows how to guarantee 30 percent of the bandwidth for class1 and 25 percent of the bandwidth for class2 when CBWFQ is configured. A policy map with two classes is created and is then attached to a physical port:
This example shows how bandwidth is guaranteed if low-latency queueing (LLQ) and bandwidth are configured. In this example, LLQ is enabled in a class called voice1.
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
call-home (global configuration)
To enter call home configuration submode, use the call-home command in global configuration mode.
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
This command was introduced on Supervisor Engine 6E and the Catalyst 4900M. |
Usage Guidelines
Once you enter the call-home command, the prompt changes to Switch (cfg-call-home)#, and you have access to the call home configuration commands as follows:
- alert-group —Enables or disables an alert group. See the alert-group command.
- contact - email-addr email-address —Assigns the system contact’s e-mail address. You can enter up to 128 alphanumeric characters in e-mail address format with no spaces.
- contract-id alphanumeric —Specifies the customer contract identification for Cisco AutoNotification. You can enter up to 64 alphanumeric characters. If you include spaces, you must enclose your entry in quotes (“ ”).
- copy profile source-profile target-profile —Creates a new destination profile ( target-profile) with the same configuration settings as the existing profile ( source-profile ).
- customer-id name —Provides customer identification for Cisco AutoNotify. You can enter up to 256 alphanumeric characters. If you include spaces, you must enclose your entry in quotes (“ ”).
- default —Sets a command to its defaults.
- exit —Exits call home configuration mode and returns to global configuration mode.
- mail-server { ipv4-address | name } priority priority —Assigns the customer’s e-mail server address and relative priority. You can enter an IP address or a fully qualified domain name (FQDN), and assign a priority from 1 (highest) to 100 (lowest).
You can define backup e-mail servers by repeating the mail-server command and entering different priority numbers.
- no —Negates a command or set its defaults.
- phone-number + phone-number —Specifies the phone number of the contact person. The phone-number value must begin with a plus (+) prefix, and may contain only dashes (-) and numbers. You can enter up to 16 characters. If you include spaces, you must enclose your entry in quotes (“ ”).
- profile name —Enters call-home profile configuration mode. See the profile command.
- rate-limit threshold —Configures the call-home message rate-limit threshold; valid values are from 1 to 60 messages per minute.
- sender { from | reply-to } email-address —Specifies the call-home message sender’s e-mail addresses. You can enter up to 128 alphanumeric characters in e-mail address format with no spaces.
- site-id alphanumeric —Specifies the site identification for Cisco AutoNotify. You can enter up to 256 alphanumeric characters. If you include spaces, you must enclose your entry in quotes (“ ”).
- street-address street-address —Specifies the street address for the RMA part shipments. You can enter up to 256 alphanumeric characters. If you include spaces, you must enclose your entry in quotes (“ ”).
- vrf —Specifies the VPN routing or forwarding instance name; limited to 32 characters.
Examples
This example show how to configure the contact information:
Switch(cfg-call-home)# contact-email-addr username@example.com
Switch(cfg-call-home)# phone-number +1-800-555-4567
Switch(cfg-call-home)# street-address “1234 Picaboo Street, Any city, Any state, 12345”
Switch(cfg-call-home)# customer-id Customer1234
Switch(cfg-call-home)# site-id Site1ManhattanNY
Switch(cfg-call-home)# contract-id Company1234
This example shows how to configure the call-home message rate-limit threshold:
This example shows how to set the call-home message rate-limit threshold to the default setting:
This example shows how to create a new destination profile with the same configuration settings as an existing profile:
This example shows how to configure the general e-mail parameters, including a primary and secondary e-mail server:
Switch(cfg-call-home)# mail-server smtp.example.com priority 1
Switch(cfg-call-home)# mail-server 192.168.0.1 priority 2
Switch(cfg-call-home)# sender from username@example.com
Switch(cfg-call-home)# sender reply-to username@example.com
This example shows how to specify MgmtVrf as the vrf name where the call-home email message is forwarded:
Related Commands
|
|
---|---|
call-home request
To submit information about your system to Cisco for report and analysis information from the Cisco Output Interpreter tool, use the call-home request command in privileged EXEC mode. An analysis report is sent by Cisco to a configured contact e-mail address.
call-home request { output-analysis “ show-command ” | config-sanity | bugs-list | command-reference | product-advisory } [ profile name ] [ ccoid user-id ]
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
This command was introduced on Supervisor Engine 6E and the Catalyst 4900M. |
Usage Guidelines
The recipient profile does not need to be enabled for the call-home request. The profile should specify the e-mail address where the transport gateway is configured so that the request message can be forwarded to the Cisco TAC and the user can receive the reply from the Smart Call Home service.
Based on the keyword specifying the type of report requested, the following information is returned in response to the request:
- config-sanity —Information on best practices as related to the current running configuration.
- bugs-list —Known bugs in the running version and in the currently applied features.
- command-reference —Reference links to all commands in the running configuration.
- product-advisory —Product Security Incident Response Team (PSIRT) notices, End of Life (EOL) or End of Sales (EOS) notices, or field notices (FN) that may affect devices in your network.
Examples
This example shows a request for analysis of a user-specified show command:
Related Commands
Sends a CLI command to be executed, with the command output to be sent by e-mail. |
|
call-home send
To execute a CLI command and e-mail the command output, use the call-home send command in privileged EXEC mode.
call-home send “ cli-command ” { email email-addr [ service-number SR ] | service-number SR }
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
This command was introduced on Supervisor Engine 6E and the Catalyst 4900M. |
Usage Guidelines
This command causes the specified CLI command to be executed on the system. The specified CLI command must be enclosed in quotes (“”), and can be any run or show command, including commands for all modules.
The command output is then sent by e-mail to the specified e-mail address. If no e-mail address is specified, the command output is sent to the Cisco TAC at attach@cisco.com. The e-mail is sent in long text format with the service number, if specified, in the subject line.
Examples
This example shows how to send a CLI command and have the command output e-mailed:
Related Commands
call-home send alert-group
To send a specific alert group message, use the call-home send alert-group command in privileged EXEC mode.
call-home send alert-group { configuration | diagnostic module number | inventory } [ profile profile-name ]
Syntax Description
Sends the configuration alert-group message to the destination profile. |
|
Sends the diagnostic alert-group message to the destination profile for a specific module number. |
|
Command Default
Command Modes
Command History
|
|
---|---|
This command was introduced on Supervisor Engine 6E and the Catalyst 4900M. |
Usage Guidelines
When you enter the module number, you can enter the number of the module.
If you do not specify the profile profile-name , the message is sent to all subscribed destination profiles.
Only the configuration, diagnostic, and inventory alert groups can be manually sent. The destination profile need not be subscribed to the alert group.
Examples
This example shows how to send the configuration alert-group message to the destination profile:
This example shows how to send the diagnostic alert-group message to the destination profile for a specific module number:
This example shows how to send the diagnostic alert-group message to all destination profiles for a specific module number:
This example shows how to send the inventory call-home message:
Related Commands
call-home test
To manually send a Call Home test message, use the call-home test command in privileged EXEC mode.
call-home test [ “ test-message ” ] profile profile-nam e
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
This command was introduced on Supervisor Engine 6E and the Catalyst 4900M. |
Usage Guidelines
This command sends a test message to the specified destination profile. If you enter test message text, you must enclose the text in quotes (“”) if it contains spaces. If you do not enter a message, a default message is sent.
Examples
This example shows how to manually send a Call Home test message:
Related Commands
channel-group
To assign and configure an EtherChannel interface to an EtherChannel group, use the channel-group command. To remove a channel group configuration from an interface, use the no form of this command.
channel-group number mode { active | on | auto [ non-silent ]} | { passive | desirable [ non-silent ]}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
You do not have to create a port-channel interface before assigning a physical interface to a channel group. If a port-channel interface has not been created, it is automatically created when the first physical interface for the channel group is created.
If a specific channel number is used for the PAgP-enabled interfaces of a channel group, that same channel number cannot be used for configuring a channel that has LACP-enabled interfaces or vice versa.
You can also create port channels by entering the interface port-channel command. This will create a Layer 3 port channel. To change the Layer 3 port channel into a Layer 2 port channel, use the switchport command before you assign physical interfaces to the channel group. A port channel cannot be changed from Layer 3 to Layer 2 or vice versa when it contains member ports.
You do not have to disable the IP address that is assigned to a physical interface that is part of a channel group, but we recommend that you do so.
Any configuration or attribute changes that you make to the port-channel interface are propagated to all interfaces within the same channel group as the port channel (for example, configuration changes are also propagated to the physical interfaces that are not part of the port channel, but are part of the channel group).
You can create in on mode a usable EtherChannel by connecting two port groups together.
Examples
This example shows how to add Gigabit Ethernet interface 1/1 to the EtherChannel group that is specified by port-channel 45:
Switch(config-if)#
channel-group 45 mode on
Switch(config-if)#
Related Commands
|
|
---|---|
show interfaces port-channel (refer to Cisco IOS documentation) |
channel-protocol
To enable LACP or PAgP on an interface, use the channel-protocol command. To disable the protocols, use the no form of this command.
channel-protocol { lacp | pagp }
no channel-protocol { lacp | pagp }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
You can also select the protocol using the channel-group command.
If the interface belongs to a channel, the no form of this command is rejected.
All ports in an EtherChannel must use the same protocol; you cannot run two protocols on one module.
PAgP and LACP are not compatible; both ends of a channel must use the same protocol.
You can manually configure a switch with PAgP on one side and LACP on the other side in the on mode.
You can change the protocol at any time, but this change causes all existing EtherChannels to reset to the default channel mode for the new protocol. You can use the channel-protocol command to restrict anyone from selecting a mode that is not applicable to the selected protocol.
Configure all ports in an EtherChannel to operate at the same speed and duplex mode (full duplex only for LACP mode).
For a complete list of guidelines, refer to the “Configuring EtherChannel” section of the Catalyst 4500 Series Switch Cisco IOS Software Configuration Guide .
Examples
This example shows how to select LACP to manage channeling on the interface:
Related Commands
|
|
---|---|
Assigns and configures an EtherChannel interface to an EtherChannel group. |
|
cisp enable
Use the cisp enable global configuration command to enable Client Information Signalling Protocol (CISP) on a switch.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
You must enable the CISP protocol (with the global cisp enable command) on both the authenticator and supplicant switch. The CISP protocol is crucial because it conveys the client information from the supplicant switch to the authenticator switch thereby providing access for the clients of the supplicant switch through the authenticator switch.
Examples
This example shows how to enable CISP:
Related Commands
|
|
---|---|
class
To specify the name of the class whose traffic policy you want to create or change, use the class policy-map configuration command. To delete an existing class from a policy map, use the no form of this command.
Syntax Description
Name of the predefined traffic class for which you want to configure or modify a traffic policy. The class was previously created through the class-map class-map-name global configuration command. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Before using the class command, you must create a class map for matching packets to the class by using the class-map global configuration command. You also must use the policy-map global configuration command to identify the policy map and to enter policy-map configuration mode. After specifying a policy map, you can configure a traffic policy for new classes or modify a traffic policy for any existing classes in that policy map. The class name that you specify with the class command in the policy map ties the characteristics for that class (its policy) to the class map and its match criteria, as configured through the class-map global configuration command. You attach the policy map to a port by using the service-policy (interface configuration) configuration command.
After you enter the class command, the switch enters policy-map class configuration mode, and these configuration commands are available:
- bandwidth S pecifies or modifies the minimum bandwidth provided to a class belonging to a policy map. For more information, see the bandwidth command.
- dbl Enables dynamic buffer limiting for traffic hitting this class. For details on dbl parameters refer to the show qos dbl command.
- exit Exits policy-map class configuration mode and returns to policy-map configuration mode.
- no R eturns a command to its default setting.
- police C onfigures a single-rate policer, an aggregate policer, or a two-rate traffic policer that uses the committed information rate (CIR) and the peak information rate (PIR) for a class of traffic. The policer specifies the bandwidth limitations and the action to take when the limits are exceeded. For more information, see the police command. For more information about the two-rate policer, see the police (two rates) and the police (percent) command.
- priority Enables the strict priority queue for a class of traffic. For more information, see the priority command.
- service-policy (policy-map class) Creates a service policy as a quality of service (QoS) policy within a policy map (called a hierarchical service policy). For more information, see the service-policy (policy-map class) command. This command is effective only in a hierarchical policy map attached to an interface.
- set Classifies IP traffic by setting a class of service (CoS), a Differentiated Services Code Point (DSCP) or IP-precedence in the packet. For more information, see the set command.
- shape (class-based queueing) Sets the token bucket committed information rate (CIR) in a policy map. For more information, see the shape (class-based queueing) command.
- trust D efines a trust state for a traffic class. For more information, see the trust command. This command is not supported on the Supervisor Engine 6-E and the Catalyst 4900M chassis.
The switch supports up to 256 classes, including the default class, in a policy map. Packets that fail to meet any of the matching criteria are classified as members of the default traffic class. You configure the default traffic class by specifying class-default as the class name in the class policy-map class configuration command. You can manipulate the default traffic class (for example, set policies to police or to shape it) just like any other traffic class, but you cannot delete it.
To return to policy-map configuration mode, use the exit command. To return to privileged EXEC mode, use the end command.
Examples
This example shows how to create a policy map called policy1. When attached to an ingress port, the policy matches all the inbound traffic defined in class1, sets the IP DSCP to 10, and polices the traffic at an average rate of 1 Mbps and bursts of 20 KB. Traffic exceeding the profile is marked down to a Traffic exceeding the profile is marked down to a DSCP value obtained from the policed-DSCP map and then sent.
You can verify your settings by entering the show policy-map privileged EXEC command.
Related Commands
class-map
To create a class map to be used for matching packets to the class whose name you specify and to enter class-map configuration mode, use the class-map global configuration command. To delete an existing class map and to return to global configuration mode, use the no form of this command.
class-map [ match-all | match-any ] class-map-name
no class-map [ match-all | match-any ] class-map-name
Syntax Description
Defaults
If neither the match-all nor the match-any keyword is specified, the default is match-all.
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Use this command to specify the name of the class for which you want to create or modify class-map match criteria and to enter class-map configuration mode. Packets are checked against the match criteria configured for a class map to decide if the packet belongs to that class. If a packet matches the specified criteria, the packet is considered a member of the class and is forwarded according to the quality of service (QoS) specifications set in the traffic policy.
After you enter the class-map command, the switch enters class-map configuration mode, and these configuration commands are available:
- description Describes the class map (up to 200 characters). The show class-map privileged EXEC command displays the description and the name of the class map.
- exit E xits from QoS class-map configuration mode.
- match Configures classification criteria. For more information, see the match (class-map configuration) command.
- no Removes a match statement from a class map.
Examples
This example shows how to configure the class map called class1 with one match criterion, which is an access list called 103 :
This example shows how to delete the class1 class map:
You can verify your settings by entering the show class-map privileged EXEC command.
Related Commands
clear counters
To clear the interface counters, use the clear counters command.
clear counters [{ FastEthernet interface_number } | { GigabitEthernet interface_number } |
{ null interface_number } | { port-channel number } | { vlan vlan_id }]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
This command clears all the current interface counters from all the interfaces unless you specify an interface.
Note This command does not clear the counters that are retrieved using SNMP, but only those seen when you enter the show interface counters command.
Examples
This example shows how to clear all the interface counters:
Switch#
clear counters
Switch#
This example shows how to clear the counters on a specific interface:
Switch#
clear counters vlan 200
Switch#
Related Commands
|
|
---|---|
clear errdisable interface
Use the clear errdisable interface privileged EXEC command on an interface to re-enable a VLAN that was error disabled.
clear errdisable interface interface-id vlan [vlan-list]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
If a VLAN range is not specified, all VLANs on the specified interface are re-enabled. The clear errdisable command recovers the disabled VLANs on an interface.
Clearing the error-disabled state from a virtual port does not change the link state of the physical port, and it does not affect other VLAN ports on the physical port. It does post an event to STP, and spanning tree goes through its normal process of bringing that VLAN port to the appropriate blocking or forwarding state.
You can re-enable a port by using the shutdown and no shutdown interface configuration commands, or you can clear error disable for VLANs by using the clear errdisable interface command.
Examples
This example shows how to re-enable all VLANs that were error-disabled on Gigabit Ethernet port 4/0/2.
Switch#
clear errdisable interface gigabitethernet4/0/2 vlan
This example shows how to re-enable a range of disabled VLANs on an interaface:
Switch#
clear errdisable interface ethernet2 vlan 10-15
Switch#
Related Commands
|
|
---|---|
Enables error-disabled detection for a specific cause or all causes. |
|
Displays interface status of a list of interfaces in error-disabled state. |
clear hw-module slot password
To clear the password on an intelligent line module, use the clear hw-module slot password command.
clear hw-module slot slot_num password
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
You only need to change the password once unless the password is reset.
Examples
This example shows how to clear the password from slot 5 on a line module:
Related Commands
|
|
---|---|
clear interface gigabitethernet
To clear the hardware logic from a Gigabit Ethernet IEEE 802.3z interface, use the clear interface gigabitethernet command.
Note This command does not increment interface resets as displayed with the show interface gigabitethernet mod/port command.
clear interface gigabitethernet mod/port
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear the hardware logic from a Gigabit Ethernet IEEE 802.3z interface:
Switch#
clear interface gigabitethernet 1/1
Switch#
Related Commands
|
|
---|---|
clear interface vlan
To clear the hardware logic from a VLAN, use the clear interface vlan command.
Syntax Description
Number of the VLAN interface; valid values are from 1 to 4094. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Examples
This example shows how to clear the hardware logic from a specific VLAN:
Switch#
clear interface vlan 5
Switch#
Related Commands
|
|
---|---|
clear ip access-template
To clear the statistical information in access lists, use the clear ip access-template command.
clear ip access-template access-list
Syntax Description
Number of the access list; valid values are from 100 to 199 for an IP extended access list, and from 2000 to 2699 for an expanded range IP extended access list. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear the statistical information for an access list:
Switch#
clear ip access-template 201
Switch#
clear ip arp inspection log
To clear the status of the log buffer, use the clear ip arp inspection log command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear the contents of the log buffer:
Switch#
clear ip arp inspection log
Switch#
Related Commands
|
|
---|---|
Defines an ARP access list or adds clauses at the end of a predefined list. |
|
clear ip arp inspection statistics
To clear the dynamic ARP inspection statistics, use the clear ip arp inspection statistics command.
clear ip arp inspection statistics [ vlan vlan-range ]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear the DAI statistics from VLAN 1 and how to verify the removal:
Related Commands
|
|
---|---|
Defines an ARP access list or adds clauses at the end of a predefined list. |
|
clear ip dhcp snooping binding
To clear the DHCP snooping binding, use the clear ip dhcp snooping binding command.
clear ip dhcp snooping binding [ * ] [ ip-address ] [ vlan vlan_num ] [ interface interface_num ]
Syntax Description
(Optional) IP address for the DHCP snooping binding entries. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
These commands are mainly used to clear DHCP snooping binding entries.
DHCP snooping is enabled on a VLAN only if both the global snooping and the VLAN snooping are enabled.
Examples
This example shows how to clear all the DHCP snoop binding entries:
This example shows how to clear a specific DHCP snoop binding entry:
This example shows how to clear all the DHCP snoop binding entries on the GigabitEthernet interface 1/1:
This example shows how to clear all the DHCP snoop binding entries on VLAN 40:
Related Commands
|
|
---|---|
Sets up and generates a DHCP binding configuration to restore bindings across reboots. |
|
clear ip dhcp snooping database
To clear the DHCP binding database, use the clear ip dhcp snooping database command.
clear ip dhcp snooping database
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear the DHCP binding database:
Switch#
clear ip dhcp snooping database
Switch#
Related Commands
|
|
---|---|
Sets up and generates a DHCP binding configuration to restore bindings across reboots. |
|
clear ip dhcp snooping database statistics
To clear the DHCP binding database statistics, use the clear ip dhcp snooping database statistics command.
clear ip dhcp snooping database statistics
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear the DHCP binding database:
Switch#
clear ip dhcp snooping database statistics
Switch#
Related Commands
|
|
---|---|
Sets up and generates a DHCP binding configuration to restore bindings across reboots. |
|
clear ip igmp group
To delete the IGMP group cache entries, use the clear ip igmp group command.
clear ip igmp group [{ fastethernet mod/port } | { GigabitEthernet mod/port } | { host_name | group_address } { Loopback interface_number } | { null interface_number } |
{ port-channel number } | { vlan vlan_id }]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The IGMP cache contains a list of the multicast groups of which hosts on the directly connected LAN are members.
To delete all the entries from the IGMP cache, enter the clear ip igmp group command with no arguments.
Examples
This example shows how to clear the entries for a specific group from the IGMP cache:
This example shows how to clear the IGMP group cache entries from a specific interface:
Related Commands
clear ip igmp snooping membership
To clear the explicit host-tracking database, use the clear ip igmp snooping membership command.
clear ip igmp snooping membership [vlan vlan_id ]
Syntax Description
(Optional) Specifies a VLAN; valid values are from 1 to 1001 and from 1006 to 4094. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
By default, the explicit host tracking database maintains a maximum of 1-KB entries. After you reach this limit, no additional entries can be created in the database. To create more entries, you will need to delete the database with the clear ip igmp snooping statistics vlan command.
Examples
This example shows how to display the IGMP snooping statistics for VLAN 25:
Switch#
Related Commands
|
|
---|---|
clear ip mfib counters
To clear the global MFIB counters and the counters for all active MFIB routes, use the clear ip mfib counters command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear all the active MFIB routes and global counters:
Related Commands
|
|
---|---|
Displays all active Multicast Forwarding Information Base (MFIB) routes. |
clear ip mfib fastdrop
To clear all the MFIB fast-drop entries, use the clear ip mfib fastdrop command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If new fast-dropped packets arrive, the new fast-drop entries are created.
Examples
This example shows how to clear all the fast-drop entries:
Related Commands
|
|
---|---|
Displays all currently active fast-drop entries and shows whether fast drop is enabled. |
clear ip wccp
To remove Web Cache Communication Protocol (WCCP) statistics (counts) maintained on the switch for a particular service, use the clear ip wccp command in privileged EXEC mode.
clear ip wccp [ vrf vrf-name { web-cache | service-number} ] [ web-cache | service-number ]
Syntax Description
(Optional) Directs the router to remove statistics for the web cache service. |
|
(Optional) Number of the cache service to be removed. The number can be from 0 to 99. |
Defaults
Command Modes
Command History
|
|
---|---|
This command was introduced on Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 4900M, and Catalyst 4948E. |
Usage Guidelines
Use the show ip wccp and show ip wccp detail commands to display WCCP statistics.
Use the clear ip wccp command to clear the WCCP counters for all WCCP services in all VRFs.
Examples
The following example shows how to clear all statistics associated with the web cache service:
Switch#
clear ip wccp web-cache
Related Commands
|
|
---|---|
Enables support of the specified WCCP service for participation in a service group. |
|
clear lacp counters
To clear the statistics for all the interfaces belonging to a specific channel group, use the clear lacp counters command.
clear lacp [ channel-group ] counters
Syntax Description
(Optional) Channel-group number; valid values are fr om 1 to 64. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If you do not specify a channel group, all channel groups are cleared.
If you enter this command for a channel group that contains members in PAgP mode, the command is ignored.
Examples
This example shows how to clear the statistics for a specific group:
Related Commands
|
|
---|---|
clear mac-address-table
To clear the global counter entries from the Layer 2 MAC address table, use the clear mac-address-table command.
clear mac-address-table {dynamic [{ address mac_addr } | { interface interface }] [ vlan vlan_id ] | notification }
Syntax Description
(Optional) Specifies the interface and clears the entries associated with it; valid values are FastEthernet and GigabitEthernet. |
|
(Optional) Specifies the VLANs; valid values are from 1 to 4094. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
Enter the clear mac-address-table dynamic command with no arguments to remove all dynamic entries from the table.
The clear mac-address-table notification command only clears the global counters which are displayed with show mac-address-table notification command. It does not clear the global counters and the history table of the CISCO-MAC-NATIFICATION-MIB.
Examples
This example shows how to clear all the dynamic Layer 2 entries for a specific interface (gi1/1):
Switch#
clear mac-address-table dynamic interface gi1/1
Switch#
This example shows how to clear the MAC address notification counters:
Switch#
clear mac-address-table notification
Switch#
Related Commands
|
|
---|---|
Clears the dynamic address entries from the Layer 2 MAC address table. |
|
Enters the main CPU submode and manually synchronizes the configurations on two supervisor engines. |
|
clear mac-address-table dynamic
To clear the dynamic address entries from the Layer 2 MAC address table, use the clear mac-address-table dynamic command.
clear mac-address-table dynamic [{ address mac_addr } | { interface interface }] [ vlan vlan_id ]
Syntax Description
(Optional) Specifies the interface and clears the entries associated with it; valid values are FastEthernet and GigabitEthernet. |
|
(Optional) Specifies the VLANs; valid values are from 1 to 4094. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
Enter the clear mac-address-table dynamic command with no arguments to remove all dynamic entries from the table.
Examples
This example shows how to clear all the dynamic Layer 2 entries for a specific interface (gi1/1):
Switch#
clear mac-address-table dynamic interface gi1/1
Switch#
Related Commands
|
|
---|---|
Enters the main CPU submode and manually synchronizes the configurations on two supervisor engines. |
|
clear netflow-lite exporter statistics
Note NetFlow-lite is only supported on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches.
To clear the collector statistics, use the clear netflow-lite exporter statistics command.
clear netflow-lite exporter exporter-name statistics
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Command introduced on on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches. |
Examples
The following examples show how to clear statistics of a packet sampler at a monitor:
Related Commands
|
|
---|---|
clear netflow-lite monitor statistics interface
Note NetFlow-lite is only supported on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches.
To clear statistics of a packet sampler at a monitor, use the clear netflow-lite monitor statistics interface command.
clear netflow-lite monitor statistics interface vlan-id
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Command introduced on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches. |
Examples
The following examples show how to clear statistics of a packet sampler at a monitor:
Related Commands
|
|
---|---|
clear nmsp statistics
To clear the Network Mobility Services Protocol (NMSP) statistics, use the clear nmsp statistics command. This command is available only when your switch is running the cryptographic (encrypted) software image.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear NMSP statistics:
You can verify that information was deleted by entering the show nmsp statistics command.
Related Commands
|
|
---|---|
clear pagp
To clear the port-channel information, use the clear pagp command.
clear pagp { group-number | counters }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear the port-channel information for a specific group:
Switch#
clear pagp 32
Switch#
This example shows how to clear all the port-channel traffic filters:
Switch#
clear pagp counters
Switch#
Related Commands
|
|
---|---|
clear port-security
To delete all configured secure addresses or a specific dynamic or sticky secure address on an interface from the MAC address table, use the clear port-security command.
clear port-security dynamic [ address mac-addr [ vlan vlan-id ]] | [ interface interface-id ] [ vlan access | voice ]
Syntax Description
Defaults
Command Modes
Usage Guidelines
If you enter the clear port-security all command, the switch removes all the dynamic secure MAC addresses from the MAC address table.
Note You can clear sticky and static secure MAC addresses one at a time with the no switchport port-security mac-address command.
If you enter the clear port-security dynamic interface interface-id command, the switch removes all the dynamic secure MAC addresses on an interface from the MAC address table.
Command History
|
|
---|---|
This command was first introduced on the Catalyst 4500 series switch. |
|
Examples
This example shows how to remove all the dynamic secure addresses from the MAC address table:
This example shows how to remove a dynamic secure address from the MAC address table:
This example shows how to remove all the dynamic secure addresses learned on a specific interface:
You can verify that the information was deleted by entering the show port-security command.
Related Commands
|
|
---|---|
clear pppoe intermediate-agent statistics
To clear PPPoE Intermediate Agent statistics (packet counters), use the clear pppoe intermediate-agent statistics command.
clear ppoe intermediate-agent statistics
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to clear PPPoE Intermediate Agent statistics:
Related Commands
|
|
---|---|
Displays PPPoE Intermediate Agent statistics (packet counters). |
clear qos
To clear the global and per-interface aggregate QoS counters, use the clear qos command.
clear qos [ aggregate-policer [ name ] | interface {{ fastethernet | GigabitEthernet } { mod/interface }} | vlan { vlan_num } | port-channel { number }]
Syntax Description
(Optional) Specifies the channel interface; valid values are from 1 to 64. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is not supported on the Supervisor Engine 6-E and the Catalyst 4900M chassis.
Note When you enter the clear qos command, the way that the counters work is affected and the traffic that is normally restricted could be forwarded for a short period of time.
The clear qos command resets the interface QoS policy counters. If no interface is specified, the clear qos command resets the QoS policy counters for all interfaces.
Examples
This example shows how to clear the global and per-interface aggregate QoS counters for all the protocols:
Switch#
clear qos
Switch#
This example shows how to clear the specific protocol aggregate QoS counters for all the interfaces:
Switch#
clear qos aggregate-policer
Switch#
Related Commands
|
|
---|---|
clear switch virtual dual-active
To clear counters related to fast-hello interfaces for a virtual switching system (VSS), use the clear switch virtual dual-active fast-hello command in EXEC mode.
clear switch virtual dual-active fast-hello [counters | packet]
Syntax Description
Command Default
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use this command to clear fast-hello counters and packet statistics.
Examples
The following example shows how to clear counters related to fast-hello interfaces:
Related Commands
|
|
---|---|
Configures the VSS domain number and enter the virtual switch domain configuration submode. |
clear vlan counters
To clear the software-cached counter values to start from zero again for a specified VLAN or all existing VLANs, use the clear vlan counters command.
clear vlan [ vlan-id ] counters
Syntax Description
(Optional) VLAN number; see the “Usage Guidelines” section for valid values. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If you do not specify a vlan-id value; the software-cached counter values for all the existing VLANs are cleared.
Examples
This example shows how to clear the software-cached counter values for a specific VLAN:
Related Commands
|
|
---|---|
clear vmps statistics
To clear the VMPS statistics, use the clear vmps statistics command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
Related Commands
|
|
---|---|
Changes the reconfirmation interval for the VLAN Query Protocol (VQP) client. |
control-plane
To enter control-plane configuration mode, which allows users to associate or modify attributes or parameters (such as a service policy) that are associated with the control plane of the device, use the control-plane command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support on Supervisor 6-E and Catalyst 4900M was introduced. |
|
Usage Guidelines
After you enter the control-plane command, you can define control plane services for your route processor. For example, you can associate a service policy with the control plane to police all traffic that is destined to the control plane.
Examples
These examples show how to configure trusted hosts with source addresses 10.1.1.1 and 10.1.1.2 to forward Telnet packets to the control plane without constraint, while allowing all remaining Telnet packets to be policed at the specified rate:
10.1.1.2
trusted host traffic.
Related Commands
cos (netflow-lite exporter submode)
Note NetFlow-lite is only supported on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches.
To specify a CoS value for the NetFlow-lite collector, use the cos command. To delete the value, use the no form of this command.
Syntax Description
Specifies a CoS value for the NetFlow-lite collector. Valid values from 0 to 7. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches. |
Usage Guidelines
This option allows you to set the CoS value of VLAN tags for packet samples exported by the fpga alone.
Examples
This example shows how to specify a CoS value for the NetFlow-lite collector:
You can verify your settings with the show netflow-lite exporter privileged EXEC command.
Related Commands
counter
To assign counters to a Layer 3 interface, use the counter interface command. To remove a counter assignment, use the no form of this command.
counter { ipv4 | ipv6 | ipv4 ipv6 separate }
Note Supervisor Engine 6-E and Supervisor Engine 6L-E do not support Layer 3 interface counters.
Syntax Description
Enables collection of IPv4 and IPv6 statistics and displays them individually. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
Entering the counter command without keywords displays the statistics as a sum.
The total number of switch ports that can possess transmit and receive counters is 4092.
When you change a Layer 3 port assigned with a counter to a Layer 2 port, the hardware counters are cleared. This action is similar to entering the no counter command.
Examples
The following example shows how to enable counters on interface VLAN 1:
Note To remove the counter assignment, use the no counter command.
If you have already assigned the maximum number of counters, the counter command fails, displaying the following error message:
In this situation, you must release a counter from another interface so the new interface can use it.
dbl
To enable active queue management on a transmit queue used by a class of traffic, use the dbl command. Use the no form of this command to return to the default setting.
Syntax Description
Defaults
Command Modes
Policy-map class configuration
Command History
|
|
---|---|
This command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
The semantics of the DBL configuration is similar to the WRED algorithm. The dbl command can operate alone on class-default; otherwise, it requires you to configure the bandwidth or shape commands on the class.
Examples
This example shows how to enable dbl action in a class:
Related Commands
debug adjacency
To display information about the adjacency debugging, use the debug adjacency command. To disable debugging output, use the no form of this command.
Syntax Description
(Optional) Displays the IPC entries in the adjacency database. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to display the information in the adjacency database:
Related Commands
|
|
---|---|
debug backup
To debug the backup events, use the debug backup command. To disable the debugging output, use the no form of this command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to debug the backup events:
Related Commands
|
|
---|---|
debug condition interface
To limit the debugging output of interface-related activities, use the debug condition interface command. To disable the debugging output, use the no form of this command.
debug condition interface { fastethernet mod/port | GigabitEthernet mod/port |
null interface_num | port-channel interface-num | vlan vlan_id }
no debug condition interface { fastethernet mod/port | GigabitEthernet mod/port | null interface_num | port-channel interface-num | vlan vlan_id }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Examples
This example shows how to limit the debugging output to VLAN interface 1:
Related Commands
|
|
---|---|
Abbreviates the entry of the debug condition interface command. |
|
undebug condition interface (same as no debug condition interface) |
debug condition standby
To limit the debugging output for the standby state changes, use the debug condition standby command. To disable the debugging output, use the no form of this command.
debug condition standby { fastethernet mod/port | GigabitEthernet mod/port |
port-channel interface-num | vlan vlan_id group-number }
no debug condition standby { fastethernet mod/port | GigabitEthernet mod/port |
port-channel interface-num | vlan vlan_id group-number }
Syntax Description
Limits the debugging output to port-channel interfaces; valid values are from 1 to 64. |
|
Limits the debugging of a condition on a VLAN interface; valid values are from 1 to 4094. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
If you attempt to remove the only condition set, you will be prompted with a message asking if you want to abort the removal operation. You can enter n to abort the removal or y to proceed with the removal. If you remove the only condition set, an excessive number of debugging messages might occur.
Examples
This example shows how to limit the debugging output to group 0 in VLAN 1:
This example shows the display if you try to turn off the last standby debug condition:
Related Commands
|
|
---|---|
undebug condition standby (same as no debug condition standby) |
debug condition vlan
To limit the VLAN debugging output for a specific VLAN, use the debug condition vlan command. To disable the debugging output, use the no form of this command.
debug condition vlan { vlan_id }
no debug condition vlan { vlan_id }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Usage Guidelines
If you attempt to remove the only VLAN condition set, you will be prompted with a message asking if you want to abort the removal operation. You can enter n to abort the removal or y to proceed with the removal. If you remove the only condition set, it could result in the display of an excessive number of messages.
Examples
This example shows how to limit the debugging output to VLAN 1:
This example shows the message that is displayed when you attempt to disable the last VLAN debug condition:
Related Commands
|
|
---|---|
debug device-sensor
To enable debugging for Device Sensor, use the debug device-sensor command in privileged EXEC mode.
debug device-sensor errors events
Syntax Description
Displays messages for events such as protocol packet arrivals, identity updates, and release events sent to the session manager. |
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
Use the debug device-sensor command in conjunction with the debug authentication all command to troubleshoot scenarios where device sensor cache entries are not being created for the connected devices
Examples
The following is sample output from the debug device-sensor events command. The debug output shows how Cisco Discovery Protocol packets and TLVs are received from the device connected to the GigabitEthernet 2/1 interface:
Related Commands
debug dot1x
To enable the debugging for the 802.1X feature, use the debug dot1x command. To disable the debugging output, use the no form of this command.
debug dot1x { all | errors | events | packets | registry | state-machine }
no debug dot1x { all | errors | events | packets | registry | state-machine }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable the 802.1X debugging for all conditions:
Related Commands
|
|
---|---|
debug etherchnl
To debug EtherChannel, use the debug etherchnl command. To disable the debugging output, use the no form of this command.
debug etherchnl [ all | detail | error | event | idb | linecard ]
Syntax Description
(Optional) Displays the detailed EtherChannel debug messages. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If you do not specify a keyword, all debug messages are displayed.
Examples
This example shows how to display all the EtherChannel debug messages:
This example shows how to display the EtherChannel IDB debug messages:
This example shows how to disable the debugging:
Related Commands
|
|
---|---|
debug interface
To abbreviate the entry of the debug condition interface command, use the debug interface command. To disable debugging output, use the no form of this command.
debug interface { FastEthernet mod/port | GigabitEthernet mod/port | null |
port-channel interface-num | vlan vlan_id }
no debug interface { FastEthernet mod/port | GigabitEthernet mod/port | null |
port-channel interface-num | vlan vlan_id }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
|
Examples
This example shows how to limit the debugging to interface VLAN 1:
Related Commands
|
|
---|---|
Limits the debugging output of interface-related activities. |
|
debug ipc
To debug the IPC activity, use the debug ipc command. To disable the debugging output, use the no form of this command.
debug ipc { all | errors | events | headers | packets | ports | seats }
no debug ipc { all | errors | events | headers | packets | ports | seats }
Syntax Description
Enables the debugging of the creation and deletion of ports. |
|
Enables the debugging of the creation and deletion of nodes. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable the debugging of the IPC events:
Related Commands
|
|
---|---|
debug ip dhcp snooping event
To debug the DHCP snooping events, use the debug ip dhcp snooping event command. To disable debugging output, use the no form of this command.
no debug ip dhcp snooping event
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable the debugging for the DHCP snooping events:
This example shows how to disable the debugging for the DHCP snooping events:
Related Commands
|
|
---|---|
debug ip dhcp snooping packet
To debug the DHCP snooping messages, use the debug ip dhcp snooping packet command. To disable the debugging output, use the no form of this command.
no debug ip dhcp snooping packet
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable the debugging for the DHCP snooping packets:
This example shows how to disable the debugging for the DHCP snooping packets:
Related Commands
|
|
---|---|
debug ip verify source packet
To debug the IP source guard messages, use the debug ip verify source packet command. To disable the debugging output, use the no form of this command.
no debug ip verify source packet
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable debugging for the IP source guard:
This example shows how to disable debugging for the IP source guard:
Related Commands
|
|
---|---|
debug lacp
To debug the LACP activity, use the debug lacp command. To disable the debugging output, use the no form of this command.
debug lacp [ all | event | fsm | misc | packet ]
Syntax Description
(Optional) Enables the debugging of the LACP finite state machine. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is supported only by the supervisor engine and can be entered only from the Catalyst 4500 series switch console.
Examples
This example shows how to enable the LACP miscellaneous debugging:
Related Commands
|
|
---|---|
debug monitor
To display the monitoring activity, use the debug monitor command. To disable the debugging output, use the no form of this command.
debug monitor { all | errors | idb-update | list | notifications | platform | requests }
no debug monitor { all | errors | idb-update | list | notifications | platform | requests }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to debug the monitoring errors:
Related Commands
|
|
---|---|
debug nmsp
To the enable debugging of the Network Mobility Services Protocol (NMSP) on the switch, use the debug nmsp command. This command is available only when your switch is running the cryptographic (encrypted) software image. Use the no form of this command to disable debugging.
debug nmsp { all | connection | error | event | packet | rx | tx }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The undebug nmsp command is the same as the no debug nmsp command.
Related Commands
|
|
---|---|
Displays information about the types of debugging that are enabled. |
|
debug nvram
To debug the NVRAM activity, use the debug nvram command. To disable the debugging output, use the no form of this command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to debug NVRAM:
Related Commands
|
|
---|---|
debug pagp
To debug the PAgP activity, use the debug pagp command. To disable the debugging output, use the no form of this command.
debug pagp [ all | dual-active | event | fsm | misc | packet ]
Syntax Description
(Optional) Enables the debugging of the PAgP finite state machine. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is supported only on the supervisor engine and can be entered only from the Catalyst 4500 series switch console.
Examples
This example shows how to enable the PAgP miscellaneous debugging:
Related Commands
|
|
---|---|
debug platform packet protocol lacp
To debug the LACP protocol packets, use the debug platform packet protocol lacp command. To disable the debugging output, use the no form of this command.
debug platform packet protocol lacp [ receive | transmit | vlan ]
no debug platform packet protocol lacp [ receive | transmit | vlan ]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable all PM debugging:
Related Commands
|
|
---|---|
undebug platform packet protocol lacp (same as no debug platform packet protocol lacp) |
debug platform packet protocol pagp
To debug the PAgP protocol packets, use the debug platform packet protocol pagp command. To disable the debugging output, use the no form of this command.
debug platform packet protocol pagp [ receive | transmit | vlan ]
no debug platform packet protocol pagp [ receive | transmit | vlan ]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable all PM debugging:
Related Commands
|
|
---|---|
undebug platform packet protocol pagp (same as no debug platform packet protocol pagp) |
debug pm
To debug the port manager (PM) activity, use the debug pm command. To disable the debugging output, use the no form of this command.
debug pm { all | card | cookies | etherchnl | messages | port | registry | scp | sm | span | split |
vlan | vp }
no debug pm { all | card | cookies | etherchnl | messages | port | registry | scp | sm | span | split |
vlan | vp }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable all PM debugging:
Related Commands
|
|
---|---|
debug port-security
To debug port security, use the debug port-security command. To disable the debugging output, use the no form of this command.
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable all PM debugging:
Related Commands
|
|
---|---|
debug pppoe intermediate-agent
To turn on debugging of the PPPoE Intermediate Agent feature, use the debug pppoe intermediate-agent command. To turn off debugging, use the no form of this command.
debug pppoe intermediate-agent {event | packet | all}
no debug pppoe intermediate-agent {event | packet | all}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to turn on packet debugging:
This example shows how to turn off packet debugging:
Related Commands
|
|
---|---|
Enables the PPPoE Intermediate Agent feature on an interface. |
|
Limits the rate of the PPPoE Discovery packets arriving on an interface. |
|
debug redundancy
To debug supervisor engine redundancy, use the debug redundancy command. To disable the debugging output, use the no form of this command.
debug redundancy { errors | fsm | kpa | msg | progression | status | timer }
Syntax Description
Enables the redundancy facility for messaging event debugging. |
|
Enables the redundancy facility for progression event debugging. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch (Catalyst 4507R only). |
Examples
This example shows how to debug the redundancy facility timer event debugging:
debug spanning-tree
To debug the spanning tree activities, use the debug spanning-tree command. To disable the debugging output, use the no form of this command.
debug spanning-tree { all | backbonefast | bpdu | bpdu-opt | etherchannel | config | events | exceptions | general | ha | mstp | pvst+ | root | snmp | switch | synchronization | uplinkfast }
no debug spanning-tree { all | bpdu | bpdu-opt | etherchannel | config | events | exceptions | general | mst | pvst+ | root | snmp }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to debug the spanning-tree PVST+:
Related Commands
|
|
---|---|
debug spanning-tree backbonefast
To enable debugging of the spanning tree BackboneFast events, use the debug spanning-tree backbonefast command. To disable the debugging output, use the no form of this command.
debug spanning-tree backbonefast [ detail | exceptions ]
no debug spanning-tree backbonefast
Syntax Description
(Optional) Displays the detailed BackboneFast debugging messages. |
|
(Optional) Enables the debugging of spanning tree BackboneFast exceptions. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is supported only on the supervisor engine and enterable only from the switch console.
Examples
This example shows how to enable the debugging and to display the detailed spanning tree BackboneFast debugging information:
Related Commands
|
|
---|---|
undebug spanning-tree backbonefast (same as no debug spanning-tree backbonefast) |
debug spanning-tree switch
To enable the switch shim debugging, use the debug spanning-tree switch command. To disable the debugging output, use the no form of this command.
debug spanning-tree switch { all | errors | general | pm | rx { decode | errors | interrupt |
process } | state | tx [ decode ]}
no debug spanning-tree switch { all | errors | general | pm | rx { decode | errors | interrupt | process } | state | tx [ decode ]}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is supported only on the supervisor engine and enterable only from the switch console.
Examples
This example shows how to enable the transmit BPDU debugging on the spanning tree switch shim:
Related Commands
|
|
---|---|
undebug spanning-tree switch (same as no debug spanning-tree switch) |
debug spanning-tree uplinkfast
To enable the debugging of the spanning-tree UplinkFast events, use the debug spanning-tree uplinkfast command. To disable the debugging output, use the no form of this command.
debug spanning-tree uplinkfast [ exceptions ]
no debug spanning-tree uplinkfast
Syntax Description
(Optional) Enables the debugging of the spanning tree UplinkFast exceptions. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is supported only on the supervisor engine and enterable only from the switch console.
Examples
This example shows how to debug the spanning tree UplinkFast exceptions:
Related Commands
|
|
---|---|
undebug spanning-tree uplinkfast (same as no debug spanning-tree uplinkfast) |
debug sw-vlan
To debug the VLAN manager activities, use the debug sw-vlan command. To disable the debugging output, use the no form of this command.
debug sw-vlan { badpmcookies | events | management | packets | registries }
no debug sw-vlan { badpmcookies | events | management | packets | registries }
Syntax Description
Displays the VLAN manager incidents of bad port manager cookies. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to debug the software VLAN events:
Related Commands
|
|
---|---|
debug sw-vlan ifs
To enable the VLAN manager Cisco IOS file system (IFS) error tests, use the debug sw-vlan ifs command. To disable the debugging output, use the no form of this command.
debug sw-vlan ifs { open { read | write } | read { 1 | 2 | 3 | 4 } | write }
no debug sw-vlan ifs { open { read | write } | read { 1 | 2 | 3 | 4 } | write }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Examples
This example shows how to debug the TLV data errors during a file-read operation:
Related Commands
|
|
---|---|
debug sw-vlan notification
To enable the debugging of the messages that trace the activation and deactivation of the ISL VLAN IDs, use the debug sw-vlan notification command. To disable the debugging output, use the no form of this command.
debug sw-vlan notification { accfwdchange | allowedvlancfgchange | fwdchange | linkchange | modechange | pruningcfgchange | statechange }
no debug sw-vlan notification { accfwdchange | allowedvlancfgchange | fwdchange | linkchange | modechange | pruningcfgchange | statechange }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to debug the software VLAN interface mode change notifications:
Related Commands
|
|
---|---|
undebug sw-vlan notification (same as no debug sw-vlan notification) |
debug sw-vlan vtp
To enable the debugging of messages to be generated by the VTP protocol code, use the debug sw-vlan vtp command. To disable the debugging output, use the no form of this command.
debug sw-vlan vtp { events | packets | pruning [ packets | xmit ] | xmit }
no debug sw-vlan vtp { events | packets | pruning [ packets | xmit ] | xmit }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If you do not enter any more parameters after entering pruning, the VTP pruning debugging messages are displayed.
Examples
This example shows how to debug the software VLAN outgoing VTP packets:
Related Commands
|
|
---|---|
debug udld
To enable the debugging of UDLD activity, use the debug udld command. To disable the debugging output, use the no form of this command.
debug udld { events | packets | registries }
no debug udld { events | packets | registries }
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command is supportedonly on the supervisor engine and enterable only from the switch console.
Examples
This example shows how to debug the UDLD events:
This example shows how to debug the UDLD packets:
This example shows how to debug the UDLD registry events:
Related Commands
|
|
---|---|
debug vqpc
To debug the VLAN Query Protocol (VQP), use the debug vqpc command. To disable the debugging output, use the no form of this command.
debug vqpc [ all | cli | events | learn | packet ]
no debug vqpc [ all | cli | events | learn | packet ]
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Examples
This example shows how to enable all VQP debugging:
Related Commands
|
|
---|---|
Immediately sends VLAN Query Protocol (VQP) queries to reconfirm all the dynamic VLAN assignments with the VLAN Membership Policy Server (VMPS). |
define interface-range
To create a macro of interfaces, use the define interface-range command.
define interface-range macro-name interface-range
Syntax Description
List of valid ranges when specifying interfaces; see the “Usage Guidelines” section. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The macro name is a character string of up to 32 characters.
A macro can contain up to five ranges. An interface range cannot span modules.
Examples
This example shows how to create a multiple-interface macro:
Switch(config)#
define
interface-range macro1 gigabitethernet 4/1-6, fastethernet 2/1-5
Switch(config)#
Related Commands
|
|
---|---|
deny
To deny an ARP packet based on matches against the DHCP bindings, use the deny command. To remove the specified ACEs from the access list, use the no form of this command.
deny {[ request ] ip { any | host sender-ip | sender-ip sender-ip-mask } mac { any | host sender-mac | sender-mac sender-mac-mask } | response ip { any | host sender-ip | sender-ip sender-ip-mask } [{ any | host target-ip | target-ip target-ip-mask }] mac { any | host sender-mac | sender-mac sender-mac-mask } [{ any | host target-mac | target-mac target-mac-mask }]} [ log ]
no deny {[ request ] ip { any | host sender-ip | sender-ip sender-ip-mask } mac { any | host sender-mac | sender-mac sender-mac-mask } | response ip { any | host sender-ip | sender-ip sender-ip-mask } [{ any | host target-ip | target-ip target-ip-mask }] mac { any | host sender-mac | sender-mac sender-mac-mask } [{ any | host target-mac | target-mac target-mac-mask }]} [ log ]
Syntax Description
Defaults
At the end of the ARP access list, there is an implicit deny ip any mac any command.
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Deny clauses can be added to forward or drop ARP packets based on some matching criteria.
Examples
This example shows a host with a MAC address of 0000.0000.abcd and an IP address of 1.1.1.1. This example shows howto deny both requests and responses from this host:
Related Commands
destination (netflow-lite exporter submode)
Note NetFlow-lite is only supported on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches.
To specify a destination address in netflow-lite submode, use the destination command. To delete an exporter, use the no form of this command.
destination destination-address
no destination destination-address
Syntax Description
Specifies a destination address of a NetFlow-lite collector. |
Defaults
Command Modes
Command History
|
|
---|---|
Support for this command was introduced on on the Catalyst 4948E and Catalyst 4948E-F Ethernet switches. |
Usage Guidelines
One of the mandatory parameters for a minimally configured exporter along with the source Layer 3 interface and the UDP destination port of the collector.
Examples
This example shows how to specify a destination address in netflow-lite submode:
You can verify your settings with the show netflow-lite exporter privileged EXEC command.
Related Commands
destination address
To configure the destination e-mail address or URL to which Call Home messages will be sent, use the destination address command.
destination address {email email-address | http url}
Syntax Description
Specifies the destination e-mail address in 1 to 200 characters. |
|
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
To enter profile call-home configuration submode, use the profile command in call-home configuration mode.
When entering the https:// destination URL for the secure server, you must also configure a trustpoint CA.
Examples
This example shows how to set the destination to the e-mail address callhome@cisco.com:
Related Commands
destination message-size-limit bytes
To configure a maximum destination message size for the destination profile, use the destination message-size-limit bytes command.
destination message-size-limit bytes
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
To enter profile call-home configuration submode, use the profile command in call-home configuration mode.
Examples
This example shows how to configure the maximum message size for the destination profile as 3000000:
Related Commands
destination preferred-msg-format
To configure a preferred message format, use the destination preferred-msg-format command.
destination preferred-msg-format {long-text | short-text | xml}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
To enter profile call-home configuration submode, use the profile command in call-home configuration mode.
Examples
This example shows how to configure the preferred message format as long text:
Related Commands
destination transport-method
To enable the message transport method, use the destination transport-method command.
destination transport-method {email | http}
Syntax Description
Defaults
Command Modes
Command History
|
|
---|---|
Usage Guidelines
To enter profile call-home configuration submode, use the profile command in call-home configuration mode.
Examples
This example shows how to set the transport method to HTTP: