show access-group mode interface
To display the ACL configuration on a Layer 2 interface, use the show access-group mode interface command.
show access-group mode interface [ interface interface-number ]
Syntax Description
interface |
(Optional) Interface type; valid values are ethernet , fastethernet , gigabitethernet , tengigabitethernet , and port-channel . |
interface-number |
(Optional) Interface number. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(19)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(25)EW |
Support for the 10-Gigabit Ethernet interface was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The valid values for the port number depend on the chassis used.
Examples
The following example shows how to display the ACL configuration on the Fast Ethernet interface 6/1:
Switch# show access-group mode interface fa6/1
Interface FastEthernet6/1:
Access group mode is: merge
Related Commands
|
|
access-group mode |
Specifies the override modes (for example, VACL overrides PACL) and the non-override modes (for example, merge or strict mode). |
show adjacency
To display information about the Layer 3 switching adjacency table, use the show adjacency command.
show adjacency [{ interface interface-number } | { null interface-number } | { port-channel number } | { vlan vlan-id } | detail | internal | summary ]
Syntax Description
interface |
(Optional) Interface type; possible valid values are ethernet , fastethernet , gigabitethernet , tengigabitethernet , pos , ge-wan , and atm. |
interface-number |
(Optional) Module and port number; see the “Usage Guidelines” section for valid values. |
null interface-number |
(Optional) Specifies the null interface; the valid value is 0. |
port-channel number |
(Optional) Specifies the channel interface; valid values are a maximum of 64 values ranging from 1 to 256. |
vlan vlan-id |
(Optional) Specifies the VLAN; valid values are from 1 to 4094. |
detail |
(Optional) Displays the information about the protocol detail and timer. |
internal |
(Optional) Displays the information about the internal data structure. |
summary |
(Optional) Displays a summary of CEF-adjacency information. |
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.2(25)EW |
Extended to include the 10-Gigabit Ethernet interface. |
Usage Guidelines
The interface-number argument designates the module and port number. Valid values for interface-number depend on the specified interface type and the chassis and module that are used. For example, if you specify a Gigabit Ethernet interface and have a 48-port 10/100BASE-T Ethernet module that is installed in a 13-slot chassis, valid values for the module number are from 1 to 13, and valid values for the port number are from 1 to 48.
Hardware Layer 3 switching adjacency statistics are updated every 60 seconds.
The following information is contained in the show adjacency command:
- Protocol interface.
- Type of routing protocol that is configured on the interface.
- Interface address.
- Method of adjacency that was learned.
- MAC address of the adjacent router.
- Time left before the adjacency rolls out of the adjacency table. After it rolls out, a packet must use the same next hop to the destination.
Examples
The following example shows how to display adjacency information:
Protocol Interface Address
IP FastEthernet2/3 172.20.52.1(3045)
IP FastEthernet2/3 172.20.52.22(11)
The following example shows how to display a summary of adjacency information:
Switch# show adjacency summary
Adjacency Table has 2 adjacencies
Interface Adjacency Count
The following example shows how to display protocol detail and timer information:
Switch# show adjacency detail
Protocol Interface Address
IP FastEthernet2/3 172.20.52.1(3045)
000000000FF920000380000000000000
00000000000000000000000000000000
00605C865B2800D0BB0F980B0800
IP FastEthernet2/3 172.20.52.22(11)
000000000FF920000380000000000000
00000000000000000000000000000000
00801C93804000D0BB0F980B0800
The following example shows how to display adjacency information for a specific interface:
Switch# show adjacency fastethernet2/3
Protocol Interface Address
IP FastEthernet2/3 172.20.52.1(3045)
IP FastEthernet2/3 172.20.52.22(11)
show ancp multicast
To display multicast streams activated by Access Node Control Protocol (ANCP), use the show ancp multicast command.
show ancp multicast [group groupaddr] [source sourceaddr] | [ interface interfacename]
Syntax Description
group groupaddr |
(Optional) Specifies a multicast group address. |
source sourceaddr |
(Optional) Specifies a multicast source address. |
interface interfacename |
(Optional) Specifies a multicast flowing on a specific interface. |
Command Default
Displays all the multicast streams activated with ANCP.
Command Modes
Privileged EXEC
Command History
|
|
12.2(50)SG |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display multicast streams activated by ANCP:
ANCP-Client# show ancp mul
ClientID VLAN Interface Joined on
0x01060004000A0703 10 Fa7/3 18:27:35 UTC Sat Sep 13 2008
0x0106000400140703 20 Fa7/3 18:27:35 UTC Sat Sep 13 2008
0x01060004000A0704 10 Fa7/4 18:25:43 UTC Sat Sep 13 2008
0x0106000400140704 20 Fa7/4 18:25:43 UTC Sat Sep 13 2008
0x01060004000A0703 10 Fa7/3 18:27:37 UTC Sat Sep 13 2008
0x0106000400140703 20 Fa7/3 18:27:35 UTC Sat Sep 13 2008
0x01060004000A0704 10 Fa7/4 18:25:43 UTC Sat Sep 13 2008
0x0106000400140704 20 Fa7/4 18:25:43 UTC Sat Sep 13 2008
show arp access-list
To display detailed information on an ARP access list, use the show arp command.
show arp access-list
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.1(19)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the ARP ACL information for a switch:
Switch# show arp access-list
permit ip 10.101.1.1 0.0.0.255 mac any
permit ip 20.3.1.0 0.0.0.255 mac any
Related Commands
|
|
access-group mode |
Specifies the override modes (for example, VACL overrides PACL) and the non-override modes (for example, merge or strict mode). |
arp access-list |
Defines an ARP access list or adds clauses at the end of a predefined list. |
ip arp inspection filter vlan |
Permits ARPs from hosts that are configured for static IP when DAI is enabled, defines an ARP access list, and applies the access list to a VLAN. |
show authentication
To display the Auth Manager information, use the show authentication command in EXEC or Privileged EXEC mode.
show authentication { interface interface | registrations | sessions [ session-id session-id ] [ handle handle ] [ interface interface ] [ mac mac ] [ method method ] [ interface interface [details | policy] ]
Syntax Description
interface interface |
Displays all of the Auth Manager details associated with the specified interface. |
registrations |
Displays details of all methods registered with the Auth Manager. |
sessions |
Displays details of the current Auth Manager sessions (for example, client devices). If you do not enter any optional specifiers, all current active sessions are displayed. You can enter the specifiers singly or in combination to display a specific session (or group of sessions). |
session-id session-id |
(Optional) Specifies an Auth Manager session. |
handle handle |
(Optional) Specifies the particular handle for which Auth Manager information is displayed. Range is 1 to 4294967295. |
mac mac |
(Optional) Displays Auth Manager session information for a specified MAC address. |
method method |
(Optional) Displays all clients authorized by a specified authentication method. Valid values are as follows:
|
interface interface details |
(Optional) Displays detailed information. |
interface interface policy] |
(Optional) Displays policies applied on the interface. |
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.2(50)SG |
This command was introduced. |
Usage Guidelines
Do not enter the show authentication sessions and the clear authentication sessions commands in succession and repeatedly - it causes the switch to shutdown. These commands must not be used this way in scripts either. If you have to enter the commands again, wait for one minute between repetitions.
Table 2-19 describes the significant fields shown in the show authentication display.
Note
The possible values for the status of sessions are given below. For a session in terminal state, “Authz Success” or “Authz Failed” are displayed. “No methods” is displayed if no method has provided a result.
Table 2-19 show authentication Command Output
|
|
Idle |
The session has been initialized and no methods have run yet. |
Running |
A method is running for this session. |
No methods |
No method has provided a result for this session. |
Authc Success |
A method has resulted in authentication success for this session. |
Authc Failed |
A method has resulted in authentication fail for this session. |
Authz Success |
All features have been successfully applied for this session. |
Authz Failed |
A feature has failed to be applied for this session. |
Table 2-20 lists the possible values for the state of methods. For a session in terminal state, “Authc Success,” “Authc Failed,” or “Failed over” are displayed (the latter indicates a method ran and failed over to the next method which did not provide a result. “Not run” is displayed in the case of sessions that are synchronized on standby.
Table 2-20 State Method Values
|
|
|
Not run |
Terminal |
The method has not run for this session. |
Running |
Intermediate |
The method is running for this session. |
Failed over |
Terminal |
The method has failed and the next method is expected to provide a result. |
Authc Success |
Terminal |
The method has provided a successful authentication result for the session. |
Authc Failed |
Terminal |
The method has provided a failed authentication result for the session. |
Examples
The following example shows how to display authentication methods registered with Auth Manager:
Switch# show authentication registrations
Auth Methods registered with the Auth Manager:
The following example shows how to display Auth Manager details for a specific interface:
Switch# show authentication interface gigabitethernet1/23
MAC Address Domain Status Handle Interface
000e.84af.59bd DATA Authz Success 0xE0000000 GigabitEthernet1/0/23
The following example shows how to display all Auth Manager sessions on the switch:
Switch# show authentication sessions
Interface MAC Address Method Domain Status Session ID
Gi3/45 (unknown) N/A DATA Authz Failed 0908140400000007003651EC
Gi3/46 (unknown) N/A DATA Authz Success 09081404000000080057C274
The following example shows how to display all Auth Manager sessions on an interface:
Switch# show authentication sessions int gi 3/46
Interface: GigabitEthernet3/46
Oper host mode: multi-host
Authorized By: Guest Vlan
Common Session ID: 09081404000000080057C274
Acct Session ID: 0x0000000A
The following example shows how to display Auth Manager session for a specified MAC address:
Switch# show authentication sessions mac 000e.84af.59bd
Interface: GigabitEthernet1/23
MAC Address: 000e.84af.59bd
Oper host mode: single-host
Authorized By: Authentication Server
The following example shows how to display all clients authorized via a specified auth method:
Switch# show authentication sessions method mab
No Auth Manager contexts match supplied criteria
Switch# show authentication sessions method dot1x
MAC Address Domain Status Handle Interface
000e.84af.59bd DATA Authz Success 0xE0000000 GigabitEthernet1/23
The following example displays the policies applied on interface e0/0:
AUTH# show authentication sessions interface e0/0 policy
MAC Address: aabb.cc01.ff00
Security Policy: Should Secure
Security Status: Unsecure
Oper host mode: multi-host
Common Session ID: 0D0102330000000D0003329A
Current Policy: POLICY_Et0/0
Template: SVC_1 (priority 10)
Template: SVC_3 (priority 20)
Related Commands
|
|
authentication control-direction |
Changes the port control to unidirectional or bidirectional. |
authentication critical recovery delay |
Configures the 802.1X critical authentication parameters. |
authentication event |
Configures the actions for authentication events. |
authentication fallback |
Enables the Webauth fallback and specifies the fallback profile to use when failing over to Webauth. |
authentication host-mode |
Defines the classification of a session that will be used to apply the access-policies using the host-mode configuration. |
authentication open |
Enables open access on this port. |
authentication order |
Specifies the order in which authentication methods should be attempted for a client on an interface. |
authentication periodic |
Enables reauthentication for this port. |
authentication port-control |
Configures the port-control value. |
authentication priority |
Specifies the priority of authentication methods on an interface. |
authentication timer |
Configures the authentication timer. |
authentication violation |
Specifies the action to be taken when a security violation exists on a port. |
show auto install status
To display the status of an automatic installation, use the show auto install status command.
show auto install status
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.2(20)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the IP address of the TFTP server and to display whether or not the switch is currently acquiring the configuration file on the TFTP server:
Switch# show auto install status
Status : Downloading config file
Config File Fetched : Undetermined
The first IP address in the display indicates the server that is used for the automatic installation. The second IP address indicates the TFTP server that provided the configuration file.
show auto qos
To display the automatic quality of service (auto-QoS) configuration that is applied, use the show auto qos user EXEC command.
show auto qos [ interface [ interface-id ]] [ { begin | exclude | include } expression ]
Syntax Description
interface interface-id |
(Optional) Displays auto-QoS information for the specified interface or for all interfaces. Valid interfaces include physical ports. |
begin |
(Optional) Begins with the line that matches the expression. |
exclude |
(Optional) Excludes lines that match the expression. |
include |
(Optional) Includes lines that match the specified expression. |
expression |
(Optional) Expression in the output to use as a reference point. |
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(19)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The show auto qos interface interface-id command displays the auto-QoS configuration; it does not display any user changes to the configuration that might be in effect.
To display information about the QoS configuration that might be affected by auto-QoS on a non-Supervisor Engine 6-E, use one of these commands:
- show qos
- show qos map
- show qos interface interface-id
- show running-config
Expressions are case sensitive. For example, if you enter exclude outpu t, the lines that contain output do not appear, but the lines that contain Output appear.
Examples
The following example shows output from the show auto qos command when auto-QoS is enabled:
auto qos voip cisco-phone
Related Commands
|
|
auto qos voip |
Automatically configures quality of service (auto-QoS) for Voice over IP (VoIP) within a QoS domain. |
show auto security
To display the auto security (configuration), use the show auto security command.
show auto security [configuration]
Syntax Description
configuration |
Displays the CLIs that are applied with AS. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
3.6.0E |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows the output of the show auto security command when AS is disabled globally:
Switch# show auto security
Auto Secure is Disabled globally
AutoSecure is Enabled on below interface(s):
--------------------------------------------
The following example shows how to enable auto security on an uplink port:
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# int g1/0/15
Switch(config-if)# auto security-port uplink
Auto Secure is Enabled globally
AutoSecure is Enabled on below interface(s):
--------------------------------------------
The following example shows how to enable auto security on an access port:
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# int g1/0/18
Switch(config-if)# auto security-port host
Apr 5 22:16:41.725: %SYS-5-CONFIG_I: Configured from console by consolesh auto security
Switch# show auto security
Auto Secure is Enabled globally
AutoSecure is Enabled on below interface(s):
--------------------------------------------
The following example shows how to display the CLIs that are applied with AS:
Switch# show auto security configuration
%AutoSecure provides a single CLI config 'auto secure'
to enable Base-line security Features like
DHCP snooping, ARP inspection and Port-Security
Auto Secure CLIs applied globally:
---------------------------------
ip dhcp snooping vlan 2-1005
no ip dhcp snooping information option
ip arp inspection vlan 2-1005
Auto Secure CLIs applied on Access Port:
----------------------------------------
switchport port-security maximum 2
switchport port-security maximum 1 vlan access
switchport port-security maximum 1 vlan voice
switchport port-security violation restrict
switchport port-security aging time 2
switchport port-security aging type inactivity
ip arp inspection limit rate 100
ip dhcp snooping limit rate 100
Auto Secure CLIs applied on Trunk Port:
--------------------------------------
switchport port-security maximum 100
switchport port-security violation restrict
show bootflash:
To display information about the bootflash: file system, use the show bootflash: command.
show bootflash: [ all | chips | filesys ]
Syntax Description
all |
(Optional) Displays all possible Flash information. |
chips |
(Optional) Displays Flash chip information. |
filesys |
(Optional) Displays file system information. |
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display file system status information:
Switch>
show bootflash: filesys
-------- F I L E S Y S T E M S T A T U S --------
DEVICE INFO BLOCK: bootflash
Magic Number = 6887635 File System Vers = 10000 (1.0)
Length = 1000000 Sector Size = 40000
Programming Algorithm = 39 Erased State = FFFFFFFF
File System Offset = 40000 Length = F40000
MONLIB Offset = 100 Length = C628
Bad Sector Map Offset = 3FFF8 Length = 8
Squeeze Log Offset = F80000 Length = 40000
Squeeze Buffer Offset = FC0000 Length = 40000
Bytes Used = 917CE8 Bytes Available = 628318
Bad Sectors = 0 Spared Sectors = 0
OK Files = 2 Bytes = 917BE8
Deleted Files = 0 Bytes = 0
Files w/Errors = 0 Bytes = 0
The following example shows how to display system image information:
-# - ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name
1.. image 8C5A393A 237E3C 14 2063804 Aug 23 1999 16:18:45 c4-boot-mz
2.. image D86EE0AD 957CE8 9 7470636 Sep 20 1999 13:48:49 rp.halley
The following example shows how to display all bootflash information:
Switch>
show bootflash: all
-# - ED --type-- --crc--- -seek-- nlen -length- -----date/time------ name
1.. image 8C5A393A 237E3C 14 2063804 Aug 23 1999 16:18:45 c4-boot-
2.. image D86EE0AD 957CE8 9 7470636 Sep 20 1999 13:48:49 rp.halley
6456088 bytes available (9534696 bytes used)
-------- F I L E S Y S T E M S T A T U S --------
DEVICE INFO BLOCK: bootflash
Magic Number = 6887635 File System Vers = 10000 (1.0)
Length = 1000000 Sector Size = 40000
Programming Algorithm = 39 Erased State = FFFFFFFF
File System Offset = 40000 Length = F40000
MONLIB Offset = 100 Length = C628
Bad Sector Map Offset = 3FFF8 Length = 8
Squeeze Log Offset = F80000 Length = 40000
Squeeze Buffer Offset = FC0000 Length = 40000
Bytes Used = 917CE8 Bytes Available = 628318
Bad Sectors = 0 Spared Sectors = 0
OK Files = 2 Bytes = 917BE8
Deleted Files = 0 Bytes = 0
Files w/Errors = 0 Bytes = 0
show bootvar
To display BOOT environment variable information, use the show bootvar command.
show bootvar
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display BOOT environment variable information:
CONFIG_FILE variable does not exist
BOOTLDR variable does not exist
Configuration register is 0x0
show cable-diagnostics tdr
To display the test results for the TDR cable diagnostics, use the show cable-diagnostics tdr command.
show cable-diagnostics tdr { interface { interface interface-number }}
Note
This command will be deprecated in future Cisco IOS releases; use the diagnostic start command instead.
Syntax Description
interface interface |
Interface type; valid values are fastethernet and gigabitethernet. |
interface-number |
Module and port number. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.2(25)SG |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The TDR test is supported on Catalyst 4500 series switches running Cisco IOS Release 12.2(25)SG for the following line cards only:
- WS-X4548-GB-RJ45
- WS-X4548-GB-RJ45V
- WS-X4524-GB-RJ45V
- WS-X4013+TS
- WS-C4948
- WS-C4948-10GE
The distance to the fault is displayed in meters (m).
Examples
The following example shows how to display information about the TDR test:
Switch# show cable-diagnostics tdr interface gi4/13
Interface Speed Local pair Cable length Remote channel Status
Gi4/13 0Mbps 1-2 102 +-2m Unknown Fault
3-6 100 +-2m Unknown Fault
4-5 102 +-2m Unknown Fault
7-8 102 +-2m Unknown Fault
Table 2-21 describes the fields in the show cable-diagnostics tdr command output.
Table 2-21 show cable-diagnostics tdr Command Output Fields
|
|
Interface |
Interface tested. |
Speed |
Current line speed. |
Pair |
Local pair name. |
Cable Length |
Distance to the fault in meters (m). |
Channel |
Pair designation (A, B, C, or D). |
Status |
Pair status displayed is one of the following:
- Terminated—The link is up.
- Fault—Cable fault (open or short)
|
show call-home
To display the configured CallHome information, use the show call-home command in privileged EXEC mode.
show call-home [ alert-group | detail | mail-server | profile { all | name } | statistics ]
Syntax Description
alert-group |
(Optional) Displays the available alert group. |
detail |
(Optional) Displays the CallHome configuration in detail. |
mail-server |
(Optional) Displays the CallHome mail server-related information. |
profile all |
(Optional) Displays configuration information for all existing profiles. |
profile name |
(Optional) Displays configuration information for a specific destination profile. |
statistics |
(Optional) Displays the CallHome statistics. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC (#)
Command History
|
|
12.2(52)SG |
This command was introduced on the Catalyst 4500 series switch, Supervisor Engine 6-E, and Catalyst 4900M chassis. |
Examples
The following example displays the configured CallHome settings:
Current call home settings:
call home feature : disable
call home message's from address: switch@example.com
call home message's reply-to address: support@example.com
vrf for call-home messages: Not yet set up
contact person's email address: technical@example.com
contact person's phone number: +1-408-555-1234
street address: 1234 Picaboo Street, Any city, Any state, 12345
Mail-server[1]: Address: smtp.example.com Priority: 1
Mail-server[2]: Address: 192.168.0.1 Priority: 2
Rate-limit: 20 message(s) per minute
Keyword State Description
------------------------ ------- -------------------------------
configuration Disable configuration info
diagnostic Disable diagnostic info
environment Disable environmental info
inventory Enable inventory info
syslog Disable syslog info
Configured CallHome Information in Detail
Switch# show call-home detail
Current call home settings:
call home feature : disable
call home message's from address: switch@example.com
call home message's reply-to address: support@example.com
vrf for call-home messages: Not yet set up
contact person's email address: technical@example.com
contact person's phone number: +1-408-555-1234
street address: 1234 Picaboo Street, Any city, Any state, 12345
Mail-server[1]: Address: smtp.example.com Priority: 1
Mail-server[2]: Address: 192.168.0.1 Priority: 2
Rate-limit: 20 message(s) per minute
Keyword State Description
------------------------ ------- -------------------------------
configuration Disable configuration info
diagnostic Disable diagnostic info
environment Disable environmental info
inventory Enable inventory info
syslog Disable syslog info
Preferred Message Format: long-text
Message Size Limit: 3145728 Bytes
Email address(es): noc@example.com
HTTP address(es): Not yet set up
------------------------ ------------
------------------------ ------------
Preferred Message Format: xml
Message Size Limit: 3145728 Bytes
Email address(es): callhome@cisco.com
HTTP address(es): https://tools.cisco.com/its/service/oddce/services/DDCEService
Periodic configuration info message is scheduled every 1 day of the month at 09:27
Periodic inventory info message is scheduled every 1 day of the month at 09: 12
------------------------ ------------
------------------------ ------------
Available Call Home Alert Groups
Switch# show call-home alert-group
Keyword State Description
------------------------ ------- -------------------------------
configuration Disable configuration info
diagnostic Disable diagnostic info
environment Disable environmental info
inventory Enable inventory info
syslog Disable syslog info
E-Mail Server Status Information
Switch# show call-home mail-server status
Please wait. Checking for mail server status...
Translating "smtp.example.com"
Mail-server[1]: Address: smtp.example.com Priority: 1 [Not Available]
Mail-server[2]: Address: 192.168.0.1 Priority: 2 [Not Available]
Information for All Destination Profiles (Predefined and User-Defined)
Switch# show call-home profile all
Preferred Message Format: long-text
Message Size Limit: 3145728 Bytes
Email address(es): noc@example.com
HTTP address(es): Not yet set up
------------------------ ------------
------------------------ ------------
Preferred Message Format: xml
Message Size Limit: 3145728 Bytes
Email address(es): callhome@cisco.com
HTTP address(es): https://tools.cisco.com/its/service/oddce/services/DDCEService
Periodic configuration info message is scheduled every 1 day of the month at 09:27
Periodic inventory info message is scheduled every 1 day of the month at 09:12
------------------------ ------------
------------------------ ------------
Information for a User-Defined Destination Profile
Switch# show call-home profile CiscoTAC-1
Preferred Message Format: xml
Message Size Limit: 3145728 Bytes
Email address(es): callhome@cisco.com
HTTP address(es): https://tools.cisco.com/its/service/oddce/services/DDCEService
Periodic configuration info message is scheduled every 11 day of the month at 11:25
Periodic inventory info message is scheduled every 11 day of the month at 11:10
------------------------ ------------
------------------------ ------------
Call Home Statistics
Switch# show call-home statistics
Message Types Total Email HTTP
------------- -------------------- -------------------- ------------------
Last call-home message sent time: n/a
show cdp neighbors
To display detailed information about the neighboring devices that are discovered through CDP, use the show cdp neighbors command.
show cdp neighbors [ type number ] [ detail ]
Syntax Description
type |
(Optional) Interface type that is connected to the neighbors about which you want information; possible valid values are ethernet , fastethernet , gigabitethernet , tengigabitethernet , port-channel , and vlan. |
number |
(Optional) Interface number that is connected to the neighbors about which you want information. |
detail |
(Optional) Displays detailed information about a neighbor (or neighbors) including network address, enabled protocols, hold time, and software version. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.2(25)EW |
Extended to include the 10-Gigabit Ethernet interface. |
Usage Guidelines
The vlan keyword is supported in Catalyst 4500 series switches that are configured with a Supervisor Engine 2.
The port-channel values are from 0 to 282; values from 257 to 282 are supported on the CSM and the FWSM only.
Examples
The following example shows how to display the information about the CDP neighbors:
Switch# show cdp neighbors
Capability Codes: R - Router, T - Trans Bridge, B - Source Route Bridge
S - Switch, H - Host, I - IGMP, r - Repeater, P - Phone
Device ID Local Intrfce Holdtme Capability Platform Port ID
lab-7206 Eth 0 157 R 7206VXR Fas 0/0/0
lab-as5300-1 Eth 0 163 R AS5300 Fas 0
lab-as5300-2 Eth 0 159 R AS5300 Eth 0
lab-as5300-3 Eth 0 122 R AS5300 Eth 0
lab-as5300-4 Eth 0 132 R AS5300 Fas 0/0
lab-3621 Eth 0 140 R S 3631-telcoFas 0/0
008024 2758E0 Eth 0 132 T CAT3000 1/2
Table 2-22 describes the fields that are shown in the example.
Table 2-22 show cdp neighbors Field Descriptions
|
|
Device ID |
Configured ID (name), MAC address, or serial number of the neighbor device. |
Local Intrfce |
(Local Interface) The protocol that is used by the connectivity media. |
Holdtme |
(Holdtime) Remaining amount of time, in seconds, that the current device holds the CDP advertisement from a transmitting router before discarding it. |
Capability |
Capability code that is discovered on the device. This device type is listed in the CDP Neighbors table. Possible values are as follows: R—Router T—Transparent bridge B—Source-routing bridge S—Switch H—Host I—IGMP device r—Repeater P—Phone |
Platform |
Product number of the device. |
Port ID |
Protocol and port number of the device. |
The following example shows how to display detailed information about your CDP neighbors:
Switch# show cdp neighbors detail
-------------------------
IP address: 172.19.169.83
Platform: cisco 7206VXR, Capabilities: Router
Interface: Ethernet0, Port ID (outgoing port): FastEthernet0/0/0
Cisco Internetwork Operating System Software
IOS (tm) 5800 Software (C5800-P4-M), Version 12.1(2)
Copyright (c) 1986-2002 by Cisco Systems, Inc.
-------------------------
IP address: 172.19.169.87
Table 2-23 describes the fields that are shown in the example.
Table 2-23 show cdp neighbors detail Field Descriptions
|
|
Device ID |
Name of the neighbor device and either the MAC address or the serial number of this device. |
Entry address(es) |
List of network addresses of neighbor devices. |
[network protocol] address |
Network address of the neighbor device. The address can be in IP, IPX, AppleTalk, DECnet, or CLNS protocol conventions. |
Platform |
Product name and number of the neighbor device. |
Capabilities |
Device type of the neighbor. This device can be a router, a bridge, a transparent bridge, a source-routing bridge, a switch, a host, an IGMP device, or a repeater. |
Interface |
Protocol and port number of the port on the current device. |
Holdtime |
Remaining amount of time, in seconds, that the current device holds the CDP advertisement from a transmitting router before discarding it. |
Version: |
Software version running on the neighbor device. |
advertisement version: |
Version of CDP that is being used for CDP advertisements. |
Duplex: |
Duplex state of connection between the current device and the neighbor device. |
Related Commands
|
|
show cdp (refer to Cisco IOS documentation) |
Displays global CDP information, including timer and hold-time information. |
show cdp entry (refer to Cisco IOS documentation) |
Displays information about a specific neighboring device discovered using Cisco Discovery Protocol (CDP). |
show cdp interface (refer to Cisco IOS documentation) |
Displays information about the interfaces on which Cisco Discovery Protocol (CDP) is enabled. |
show cdp traffic (refer to Cisco IOS documentation) |
Displays traffic information from the CDP table. |
show class-map
To display class map information, use the show class-map command.
show class-map class_name
Syntax Description
class_name |
Name of the class map. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(25)SG |
Displays results from the full-flow option. |
Examples
The following example shows how to display class map information for all class maps:
Class Map match-any class-default (id 0)
Class Map match-any class-simple (id 2)
Class Map match-all ipp5 (id 1)
Class Map match-all agg-2 (id 3)
The following example shows how to display class map information for a specific class map:
Switch# show class-map ipp5
Class Map match-all ipp5 (id 1)
Assume there are two active flows as shown below on Fast Ethernet interface 6/1:
SrcIp DstIp IpProt SrcL4Port DstL4Port
--------------------------------------------------------
192.168.10.10 192.168.20.20 20 6789 81
192.168.10.10 192.168.20.20 20 6789 21
With following configuration, each flow will be policed to a 1000000 bps with an allowed 9000-byte burst value.
Note
If you use the match flow ip source-address|destination-address command, these two flows are consolidated into one flow and they have the same source and destination address.
Enter configuration commands, one per line. End with CNTL/Z.
Switch(config)# class-map c1
Switch(config-cmap)# match flow ip source-address ip destination-address ip protocol l4 source-port l4 destination-port
Switch(config-cmap)# exit
Switch(config)# policy-map p1
Switch(config-pmap)# class c1
Switch(config-pmap-c)# police 1000000 9000
Switch(config-pmap-c)# exit
Switch(config-pmap)# exit
Switch(config)# interface fastEthernet 6/1
Switch(config-if)# service-policy input p1
Switch# show policy-map interface
match flow ip source-address ip destination-address ip protocol l4 source-port l4 destination-port
police 1000000 bps 9000 byte conform-action transmit exceed-action drop
interface FastEthernet 6/1
Switch# show class-map c1
Class Map match-all c1 (id 2)
Match flow ip source-address ip destination-address ip protocol l4 source-port l4 destination-port
Related Commands
|
|
class-map |
Creates a class map to be used for matching packets to the class whose name you specify and to be used enter class-map configuration mode. |
show policy-map |
Displays information about the policy map. |
show policy-map interface |
Displays the statistics and configurations of the input and output policies that are attached to an interface. |
show device-sensor cache
To display Device Sensor cache entries, use the show device-sensor cache command in privileged EXEC mode.
show device-sensor cache { mac mac-address | all }
Syntax Description
mac mac-address |
Specifies the MAC address of the device for which the sensor cache entries are to be displayed. |
all |
Displays sensor cache entries for all devices. |
Command Default
There are no defaults for this command.
Command Modes
Privileged EXEC
Command History
|
|
IOS XE 3.4.0SG and IOS 15.1(2)SG) |
Command introduced on the Catalyst 4500 Series switch. |
Usage Guidelines
Use the show device-sensor cache command to display a list of TLV fields or options received from a particular device or from all devices.
Examples
The following is sample output from the show device-sensor cache mac mac-address command:
Router# show device-sensor cache mac 0024.14dc.df4d
Device: 0024.14dc.df4d on port GigabitEthernet1/0/24
--------------------------------------------------
Proto Type:Name Len Value
cdp 26:power-available-type 16 00 1A 00 10 00 00 00 01 00 00 00 00 FF FF FF FF
cdp 22:mgmt-address-type 17 00 16 00 11 00 00 00 01 01 01 CC 00 04 09 1B 65
cdp 11:duplex-type 5 00 0B 00 05 01
cdp 9:vtp-mgmt-domain-type 4 00 09 00 04
cdp 4:capabilities-type 8 00 04 00 08 00 00 00 28
cdp 1:device-name 14 00 01 00 0E 73 75 70 70 6C 69 63 61 6E 74
lldp 0:end-of-lldpdu 2 00 00
lldp 8:management-address 14 10 0C 05 01 09 1B 65 0E 03 00 00 00 01 00
lldp 7:system-capabilities 6 0E 04 00 14 00 04
lldp 4:port-description 23 08 15 47 69 67 61 62 69 74 45 74 68 65 72 6E 65
lldp 5:system-name 12 0A 0A 73 75 70 70 6C 69 63 61 6E 74
dhcp 82:relay-agent-info 20 52 12 01 06 00 04 00 18 01 18 02 08 00 06 00 24
dhcp 12:host-name 12 0C 0A 73 75 70 70 6C 69 63 61 6E 74
dhcp 61:client-identifier 32 3D 1E 00 63 69 73 63 6F 2D 30 30 32 34 2E 31 34
64 63 2E 64 66 34 64 2D 47 69 31 2F 30 2F 32 34
dhcp 57:max-message-size 4 39 02 04 80
The following is sample output from the show device-sensor cache all command:
Router# show device-sensor cache all
Device: 001c.0f74.8480 on port GigabitEthernet2/1
--------------------------------------------------
Proto Type:Name Len Value
dhcp 52:option-overload 3 34 01 03
dhcp 60:class-identifier 11 3C 09 64 6F 63 73 69 73 31 2E 30
dhcp 55:parameter-request-list 8 37 06 01 42 06 03 43 96
dhcp 61:client-identifier 27 3D 19 00 63 69 73 63 6F 2D 30 30 31 63 2E 30 66
37 34 2E 38 34 38 30 2D 56 6C 31
dhcp 57:max-message-size 4 39 02 04 80
Device: 000f.f7a7.234f on port GigabitEthernet2/1
--------------------------------------------------
Proto Type:Name Len Value
cdp 22:mgmt-address-type 8 00 16 00 08 00 00 00 00
cdp 19:cos-type 5 00 13 00 05 00
cdp 18:trust-type 5 00 12 00 05 00
cdp 11:duplex-type 5 00 0B 00 05 01
cdp 10:native-vlan-type 6 00 0A 00 06 00 01
cdp 9:vtp-mgmt-domain-type 9 00 09 00 09 63 69 73 63 6F
The following table describes the significant fields shown in the display:
|
|
Device |
MAC address of the device and the interface which it is connected to. |
Proto |
Protocol from which the endpoint device data is being gleaned. |
Type |
Type of TLV. |
Name |
Name of the TLV. |
Len |
Length of the TLV. |
Value |
Value of the TLV. |
Related Commands
|
|
debug device-sensor |
Enables debugging for Device Sensor. |
device-sensor accounting |
Adds the Device Sensor protocol data to accounting records and generates additional accounting events when new sensor data is detected. |
device-sensor filter-list |
Creates a CDP or LLDP filter containing a list of options that can be included or excluded in the Device Sensor output. |
device-sensor filter-list dhcp |
Creates a DHCP filter containing a list of options that can be included or excluded in the Device Sensor output. |
show device-sensor cache |
Displays Device Sensor cache entries. |
show diagnostic content
To display test information about the test ID, test attributes, and supported coverage test levels for each test and for all modules, use the show diagnostic content command.
show diagnostic content module { all | num }
Syntax Description
all |
Displays all the modules on the chassis. |
num |
Module number. |
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.2(20)EWA |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the test suite, monitoring interval, and test attributes for all the modules of the chassis:
Switch# show diagnostic content module all
Diagnostics test suite attributes:
B/* - Basic ondemand test / NA
P/V/* - Per port test / Per device test / NA
D/N/* - Disruptive test / Non-disruptive test / NA
S/* - Only applicable to standby unit / NA
X/* - Not a health monitoring test / NA
F/* - Fixed monitoring interval test / NA
E/* - Always enabled monitoring test / NA
A/I - Monitoring is active / Monitoring is inactive
m/* - Mandatory bootup test, can't be bypassed / NA
o/* - Ongoing test, always active / NA
ID Test Name Attributes (day hh:mm:ss.ms)
==== ========================================== ============ =================
1) supervisor-bootup -----------------------> **D****I** not configured
2) packet-memory-bootup --------------------> **D****I** not configured
3) packet-memory-ongoing -------------------> **N****I*o not configured
Diagnostics test suite attributes:
B/* - Basic ondemand test / NA
P/V/* - Per port test / Per device test / NA
D/N/* - Disruptive test / Non-disruptive test / NA
S/* - Only applicable to standby unit / NA
X/* - Not a health monitoring test / NA
F/* - Fixed monitoring interval test / NA
E/* - Always enabled monitoring test / NA
A/I - Monitoring is active / Monitoring is inactive
m/* - Mandatory bootup test, can't be bypassed / NA
o/* - Ongoing test, always active / NA
ID Test Name Attributes (day hh:mm:ss.ms)
==== ========================================== ============ =================
1) linecard-online-diag --------------------> **D****I** not configured
show diagnostic result module
To display the module-based diagnostic test results, use the show diagnostic result module command.
show diagnostic result module [ slot-num | all ] [ test [ test-id | test-id-range | all ]] [ detail ]
Syntax Description
slot-num |
(Optional) Specifies the slot on which diagnostics are displayed. |
all |
(Optional) Displays the diagnostics for all slots. |
test |
(Optional) Displays selected tests on the specified module. |
test-id |
(Optional) Specifies a single test ID. |
test-id-range |
(Optional) Specifies a range of test IDs. |
all |
(Optional) Displays the diagnostics for all tests. |
detail |
(Optional) Displays the complete test results. |
Command Default
A summary of the test results for all modules in the chassis is displayed.
Command Modes
Privileged EXEC mode
Command History
|
|
12.2(18)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the summary results for all modules in the chassis:
Switch# show diagnostic result module
Current bootup diagnostic level: minimal
Overall diagnostic result: PASS
Diagnostic level at card bootup: bypass
Test results: (. = Pass, F = Fail, U = Untested)
1) supervisor-bootup -----------------------> U
2) packet-memory-bootup --------------------> U
3) packet-memory-ongoing -------------------> U
Overall diagnostic result: PASS
Diagnostic level at card bootup: minimal
Test results: (. = Pass, F = Fail, U = Untested)
1) linecard-online-diag -------------------->.
Overall diagnostic result: PASS
Diagnostic level at card bootup: minimal
Test results: (. = Pass, F = Fail, U = Untested)
1) linecard-online-diag -------------------->.
Overall diagnostic result: PASS
Diagnostic level at card bootup: minimal
Test results: (. = Pass, F = Fail, U = Untested)
1) linecard-online-diag -------------------->.
The following example shows how to display the online diagnostics for module 1:
Switch# show diagnostic result module 1 detail
Current bootup diagnostic level: minimal
Overall diagnostic result: PASS
Diagnostic level at card bootup: minimal
Test results: (. = Pass, F = Fail, U = Untested)
___________________________________________________________________________
1) supervisor-bootup ----------------------->.
Error code --------------------------> 0 (DIAG_SUCCESS)
Total run count ---------------------> 0
Last test execution time ------------> n/a
First test failure time -------------> n/a
Last test failure time --------------> n/a
Last test pass time -----------------> n/a
Total failure count -----------------> 0
Consecutive failure count -----------> 0
Power-On-Self-Test Results for ACTIVE Supervisor
Power-on-self-test for Module 1: WS-X4014
Port/Test Status: (. = Pass, F = Fail)
Reset Reason: PowerUp Software/User
Port Traffic: L2 Serdes Loopback...
0:. 1:. 2:. 3:. 4:. 5:. 6:. 7:. 8:. 9:. 10:. 11:.
12:. 13:. 14:. 15:. 16:. 17:. 18:. 19:. 20:. 21:. 22:. 23:.
24:. 25:. 26:. 27:. 28:. 29:. 30:. 31:.
Port Traffic: L2 Asic Loopback...
0:. 1:. 2:. 3:. 4:. 5:. 6:. 7:. 8:. 9:. 10:. 11:.
12:. 13:. 14:. 15:. 16:. 17:. 18:. 19:. 20:. 21:. 22:. 23:.
24:. 25:. 26:. 27:. 28:. 29:. 30:. 31:.
Port Traffic: L3 Asic Loopback...
0:. 1:. 2:. 3:. 4:. 5:. 6:. 7:. 8:. 9:. 10:. 11:.
12:. 13:. 14:. 15:. 16:. 17:. 18:. 19:. 20:. 21:. 22:. 23:.
24:. 25:. 26:. 27:. 28:. 29:. 30:. 31:. au:.
Switch Subsystem Memory...
1:. 2:. 3:. 4:. 5:. 6:. 7:. 8:. 9:. 10:. 11:. 12:.
13:. 14:. 15:. 16:. 17:. 18:. 19:. 20:. 21:. 22:. 23:. 24:.
25:. 26:. 27:. 28:. 29:. 30:. 31:. 32:. 33:. 34:. 35:. 36:.
37:. 38:. 39:. 40:. 41:. 42:. 43:. 44:. 45:. 46:. 47:. 48:.
49:. 50:. 51:. 52:. 53:. 54:.
___________________________________________________________________________
2) packet-memory-bootup -------------------->.
Error code --------------------------> 0 (DIAG_SUCCESS)
Total run count ---------------------> 0
Last test execution time ------------> n/a
First test failure time -------------> n/a
Last test failure time --------------> n/a
Last test pass time -----------------> n/a
Total failure count -----------------> 0
Consecutive failure count -----------> 0
packet buffers on free list: 64557 bad: 0 used for ongoing tests: 979
Number of errors found: 0
Cells with hard errors (failed two or more tests): 0
Cells with soft errors (failed one test, includes hard): 0
Suspect bad cells (uses a block that tested bad): 0
good buffers: 65536 (100.0%)
___________________________________________________________________________
3) packet-memory-ongoing -------------------> U
Error code --------------------------> 0 (DIAG_SUCCESS)
Total run count ---------------------> 0
Last test execution time ------------> n/a
First test failure time -------------> n/a
Last test failure time --------------> n/a
Last test pass time -----------------> n/a
Total failure count -----------------> 0
Consecutive failure count -----------> 0
packet buffers on free list: 64557 bad: 0 used for ongoing tests: 979
Packet memory errors: 0 0
Current alert level: green
Per 5 seconds in the last minute:
Per minute in the last hour:
Per hour in the last day:
Per day in the last 30 days:
Direct memory test failures per minute in the last hour:
Potential false positives: 0 0
Ignored because of rx errors: 0 0
Ignored because of cdm fifo overrun: 0 0
Ignored because of oir: 0 0
Ignored because isl frames received: 0 0
Ignored after writing hw stats: 0 0
Ignored on high gigaport: 0
Ongoing diag action mode: Normal
Last 1000 Memory Test Failures:
Last 1000 Packet Memory errors:
First 1000 Packet Memory errors:
___________________________________________________________________________
show diagnostic result module test
To display the results of the bootup packet memory test, use the show diagnostic result module test command. The output indicates whether the test passed, failed, or was not run.
show diagnostic result module [ N | all ] [ test test-id ] [ detail ]
Syntax Description
N |
(Optional) Specifies the module number. |
all |
(Optional) Specifies all modules. |
test test-id |
(Optional) Specifies the number for the tdr test on the platform. |
detail |
(Optional) Specifies the display of detailed information for analysis. This option is recommended. |
Command Default
Non-detailed results.
Command Modes
EXEC mode
Command History
|
|
12.2(25)SG |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The detail keyword is intended for use by Cisco support personnel when analyzing failures.
Examples
The following example shows how to display the results of the bootup packet memory tests:
Switch# show diagnostic result module 6 detail
Overall diagnostic result:PASS
Test results:(. = Pass, F = Fail, U = Untested)
___________________________________________________________________________
1) linecard-online-diag -------------------->.
Error code --------------------------> 0 (DIAG_SUCCESS)
Total run count ---------------------> 1
Last test execution time ------------> Jan 21 2001 19:48:30
First test failure time -------------> n/a
Last test failure time --------------> n/a
Last test pass time -----------------> Jan 21 2001 19:48:30
Total failure count -----------------> 0
Consecutive failure count -----------> 0
Slot Ports Card Type Diag Status Diag Details
---- ----- -------------------------------------- ---------------- ------------
6 48 10/100/1000BaseT (RJ45)V, Cisco/IEEE Passed None
L = Loopback failure S = Stub failure
I = Ilc failure P = Port failure
E = SEEPROM failure G = GBIC integrity check failure
Ports 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Ports 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
Ports 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
___________________________________________________________________________
Port 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24
----------------------------------------------------------------------------
. U U U U U U U U U U U U U U U U U U U U U U U
Port 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
----------------------------------------------------------------------------
U U U U U U U U U U U U U U U U U U U U U U U U
Error code --------------------------> 0 (DIAG_SUCCESS)
Total run count ---------------------> 1
Last test execution time ------------> Jan 22 2001 03:01:54
First test failure time -------------> n/a
Last test failure time --------------> n/a
Last test pass time -----------------> Jan 22 2001 03:01:54
Total failure count -----------------> 0
Consecutive failure count -----------> 0
TDR test is in progress on interface Gi6/1
___________________________________________________________________________
show diagnostic result module test 2
To display the results of the bootup packet memory test, use the show diagnostic result module test 2 command. The output indicates whether the test passed, failed, or was not run.
show diagnostic result module N test 2 [ detail ]
Syntax Description
N |
Specifies the module number. |
detail |
(Optional) Specifies the display of detailed information for analysis. |
Command Default
Non-detailed results.
Command Modes
EXEC mode
Command History
|
|
12.2(18)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The detail keyword is intended for use by Cisco support personnel when analyzing failures.
Examples
The following example shows how to display the results of the bootup packet memory tests:
Switch# show diagnostic result module 1 test 2
Test results: (. = Pass, F = Fail, U = Untested)
2) packet-memory-bootup ------------>.
The following example shows how to display detailed results from the bootup packet memory tests:
Switch# show diagnostic result module 2 test 2 detail
Test results: (. = Pass, F = Fail, U = Untested)
___________________________________________________________________________
2) packet-memory-bootup ------------>.
Error code ------------------> 0 (DIAG_SUCCESS)
Total run count -------------> 0
Last test execution time ----> n/a
First test failure time -----> n/a
Last test failure time ------> n/a
Last test pass time ---------> n/a
Total failure count ---------> 0
Consecutive failure count ---> 0
packet buffers on free list: 64557 bad: 0 used for ongoing tests: 979
Number of errors found: 0
Cells with hard errors (failed two or more tests): 0
Cells with soft errors (failed one test, includes hard): 0
Suspect bad cells (uses a block that tested bad): 0
good buffers: 65536 (100.0%)
show diagnostic result module test 3
To display the results from the ongoing packet memory test, use the show diagnostic result module test 3 command. The output indicates whether the test passed, failed, or was not run.
show diagnostic result module N test 3 [ detail ]
Syntax Description
N |
Module number. |
detail |
(Optional) Specifies the display of detailed information for analysis. |
Command Default
Non-detailed results.
Command Modes
EXEC mode
Command History
|
|
12.2(18)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The detail keyword is intended for use by Cisco support personnel when analyzing failures.
Examples
The following example shows how to display the results from the ongoing packet memory tests:
Switch# show diagnostic result module 1 test 3
Test results: (. = Pass, F = Fail, U = Untested)
3) packet-memory-ongoing ----------->.
The following example shows how to display the detailed results from the ongoing packet memory tests:
Switch# show diagnostic result module 1 test 3 detail
Test results: (. = Pass, F = Fail, U = Untested)
___________________________________________________________________________
3) packet-memory-ongoing ----------->.
Error code ------------------> 0 (DIAG_SUCCESS)
Total run count -------------> 0
Last test execution time ----> n/a
First test failure time -----> n/a
Last test failure time ------> n/a
Last test pass time ---------> n/a
Total failure count ---------> 0
Consecutive failure count ---> 0
packet buffers on free list: 64557 bad: 0 used for ongoing tests: 979
Packet memory errors: 0 0
Current alert level: green
Per 5 seconds in the last minute:
Per minute in the last hour:
Per hour in the last day:
Per day in the last 30 days:
Direct memory test failures per minute in the last hour:
Potential false positives: 0 0
Ignored because of rx errors: 0 0
Ignored because of cdm fifo overrun: 0 0
Ignored because of oir: 0 0
Ignored because isl frames received: 0 0
Ignored after writing hw stats: 0 0
Ignored on high gigaport: 0
Ongoing diag action mode: Normal
Last 1000 Memory Test Failures: v
Last 1000 Packet Memory errors:
First 1000 Packet Memory errors:
show dot1x
To display the 802.1X statistics and operational status for the entire switch or for a specified interface, use the show dot1x command.
show dot1x [ interface interface-id ] | [ statistics [ interface interface-id ]] | [ all ]
Syntax Description
interface interface-id |
(Optional) Displays the 802.1X status for the specified port. |
statistics |
(Optional) Displays 802.1X statistics for the switch or the specified interface. |
all |
(Optional) Displays per-interface 802.1X configuration information for all interfaces with a nondefault 802.1X configuration. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(12c)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Display enhanced to show the guest-VLAN value. |
12.2(25)EW |
Support for the 10-Gigabit Ethernet interface was introduced on the Catalyst 4500 series switch. |
12.2(25)EWA |
Support for currently assigned reauthentication timer (if the timer is configured to honor the Session-Timeout value) was added. |
12.2(31)SG |
Support for port direction control and critical recovery was added. |
12.2(32)SG |
The output of the show dot1x interface command was modified; It no longer displays port status. |
Usage Guidelines
If you do not specify an interface, the global parameters and a summary are displayed. If you specify an interface, the details for that interface are displayed.
If you enter the statistics keyword without the interface option, the statistics are displayed for all interfaces. If you enter the statistics keyword with the interface option, the statistics are displayed for the specified interface.
Expressions are case sensitive. For example, if you enter exclude outpu t , the lines that contain output are not displayed, but the lines that contain Output are displayed.
The show dot1x command displays the currently assigned reauthentication timer and time remaining before reauthentication, if reauthentication is enabled.
To display port authorization state information, enter the show authentication sessions interface type number command and the show authentication interface command for interface summary information.
Examples
The following example shows how to display the output from the show dot1x command:
Sysauthcontrol = Disabled
Dot1x Protocol Version = 2
Dot1x Oper Controlled Directions = Both
Dot1x Admin Controlled Directions = Both
Critical Recovery Delay = 500
show eigrp plugins
To display general information including the versions of the Enhanced Interior Gateway Routing Protocol (EIGRP) protocol features that are currently running, use the show eigrp plugins command in user EXEC or privileged EXEC mode.
show eigrp plugins [ plugin-name ] [ detailed ]
Syntax Description
plugin-name |
(Optional) Name of an EIGRP plugin to display. |
detailed |
(Optional) Displays detailed information about EIGRP features. |
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
15.2(5)E2 |
Support for EVN/vNets is introduced. |
Usage Guidelines
Use the show eigrp plugins command in user EXEC or privileged EXEC mode to determine if a particular EIGRP feature is available in your Cisco IOS image. This command displays a summary of information about EIGRP service families and address families.
This command is useful when contacting Cisco technical support.
Examples
The following example shows how to display EIGRP plugin information:
eigrp-release : 20.00.00 : Portable EIGRP Release
: 1.01.18 : Source Component Release(rel20)
parser : 2.02.00 : EIGRP Parser Support
igrp2 : 2.00.00 : Reliable Transport/Dual Database
eigrp-nsf : 2.01.00 : Platform Support
Spatial Reuse Prot : 1.01.00 : Platform Support
bfd : 2.00.00 : BFD Platform Support
EVN/vNets : 1.00.00 : Easy Virtual Network (EVN/vNets)
ipv4-af : 2.01.01 : Routing Protocol Support
ipv4-sf : 1.02.00 : Service Distribution Support
ipv6-af : 2.01.01 : Routing Protocol Support
ipv6-sf : 2.01.00 : Service Distribution Support
vNets-parse : 1.00.00 : EIGRP vNets Parse Support
snmp-agent : 2.00.00 : SNMP/SNMPv2 Agent Support
Table 24 describes the significant fields shown in the display.
Table 24 show eigrp plugins Field Descriptions
|
|
eigrp release |
Displays the portable EIGRP release version. |
igrp2 |
Displays the reliable transport and dual database version. |
bfd |
Displays the EIGRP-BFD feature version. |
EVN/vNets |
Displays the EVN/vNets version. |
ipv4-af |
Displays the EIGRP IPv4 routing protocol feature version. |
ipv4-sf |
Displays the EIGRP IPv4 service distribution feature version. |
ipv6-af |
Displays the EIGRP IPv6 routing protocol feature version. |
ipv6-sf |
Displays the EIGRP IPv6 service distribution feature version. |
snmp-agent |
Displays the EIGRP SNMP and SNMPv2 Agent Support version. |
show environment
To display the environment alarm, operational status, and current reading for the chassis, use the show environment command.
show environment [ alarm ] | [ status [ chassis | fantray | powersupply | supervisor ]] | [ temperature ]
Syntax Description
alarm |
(Optional) Specifies the alarm status of the chassis. |
status |
(Optional) Specifies the operational status information. |
chassis |
(Optional) Specifies the operational status of the chassis. |
fantray |
(Optional) Specifies the status of the fan tray, and shows fan tray power consumption. |
powersupply |
(Optional) Specifies the status of the power supply. |
supervisor |
(Optional) Specifies the status of the supervisor engine. |
temperature |
(Optional) Specifies the current chassis temperature readings. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(12c)EW |
Support for the ability to display generic environment information with the show environment command was added. |
Examples
The following example shows how to display information about the environment alarms, operational status, and current temperature readings for the chassis:
Chassis Temperature = 32 degrees Celsius
Chassis Over Temperature Threshold = 75 degrees Celsius
Chassis Critical Temperature Threshold = 95 degrees Celsius
Supply Model No Type Status Sensor
------ --------------- --------- ----------- ------
PS1 PWR-C45-1400AC AC 1400W good good
Power Supply Max Min Max Min Absolute
(Nos in Watts) Inline Inline System System Maximum
-------------- ------ ------ ------ ------ --------
Power supplies needed by system : 1
Supervisor Led Color : Green
Fantray removal timeout: 240
Power consumed by Fantray : 50 Watts
The following example shows how to display information about the environment alarms:
Switch#
show environment alarm
The following example shows how to display information about the power supplies, chassis type, and fan trays:
Switch#
show environment status
Supply Model No Type Status Sensor
------ --------------- --------- ----------- ------
PS1 PWR-C45-1400AC AC 1400W good good
Power Supply Max Min Max Min Absolute
(Nos in Watts) Inline Inline System System Maximum
-------------- ------ ------ ------ ------ --------
Power supplies needed by system : 1
Supervisor Led Color : Green
Power consumed by Fantray : 50 Watts
The following example shows how to display information about the chassis:
Switch# show environment status chassis
The following example shows how to display information about the fan tray:
Switch# show environment status fantray
Power consumed by Fantray : 50 Watts
The following example shows how to display information about the power supply:
Switch# show environment status powersupply
Supply Model No Type Status Sensor
------ --------------- --------- ------- ------
PS1 WS-X4008 AC 400W good good
PS2 WS-X4008 AC 400W good good
The following example shows how to display information about the supervisor engine:
Switch# show environment status supervisor
Supervisor Led Color :Green
The following example shows how to display information about the temperature of the chassis:
Switch#
show environment temperature
Chassis Temperature = 32 degrees Celsius
Chassis Over Temperature Threshold = 75 degrees Celsius
Chassis Critical Temperature Threshold = 95 degrees Celsius
show errdisable detect
To display the error disable detection status, use the show errdisable detect command.
show errdisable detect
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Display includes the status of storm control. |
Usage Guidelines
A displayed gbic-invalid
error reason refers to an invalid small form-factor pluggable (SFP) module.
The error-disable reasons in the command output are listed in alphabetical order. The mode column shows how error disable is configured for each feature.
You can configure error-disabled detection in these modes:
- port mode—The entire physical port is error disabled if a violation occurs.
- vlan mode—The VLAN is error disabled if a violation occurs.
- port/vlan mode—The entire physical port is error disabled on some ports and per-VLAN error disabled on other ports.
Examples
This is an example of output from the show errdisable detect command:
Switch> show errdisable detect
ErrDisable Reason Detection Mode
----------------- --------- ----
arp-inspection Enabled port
channel-misconfig Enabled port
community-limit Enabled port
dhcp-rate-limit Enabled port
gbic-invalid Enabled port
inline-power Enabled port
invalid-policy Enabled port
psecure-violation Enabled port/vlan
security-violatio Enabled port
sfp-config-mismat Enabled port
storm-control Enabled port
show errdisable recovery
Use the show errdisable recovery user EXEC command to display the error-disabled recovery timer information.
show errdisable recovery
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Display includes the status of storm control. |
Usage Guidelines
A gbic-invalid error-disable reason refers to an invalid small form-factor pluggable (SFP) module interface.
Examples
This is an example of output from the show errdisable recovery command:
Switch> show errdisable recovery
ErrDisable Reason Timer Status
----------------- --------------
security-violatio Disabled
channel-misconfig Disabled
psecure-violation Disabled
Timer interval:300 seconds
Interfaces that will be enabled at the next timeout:
Interface Errdisable reason Time left(sec)
--------- ----------------- --------------
Note
Though visible in the output, the unicast-flood field is not valid.
show etherchannel
To display EtherChannel information for a channel, use the show etherchannel command.
show etherchannel [ channel-group ] { port-channel | brief | detail | summary | port | load-balance | protocol }
Syntax Description
channel-group |
(Optional) Number of the channel group; valid values are from 1 to 64. |
port-channel |
Displays port-channel information. |
brief |
Displays a summary of EtherChannel information. |
detail |
Displays detailed EtherChannel information. |
summary |
Displays a one-line summary per channel group. |
port |
Displays EtherChannel port information. |
load-balance |
Displays load-balance information. |
protocol |
Displays the enabled protocol. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(13)EW |
Support for LACP was added to this command. |
Usage Guidelines
If you do not specify a channel group, all channel groups are displayed.
In the output below, the Passive port list field is displayed for Layer 3 port channels only. This field means that the physical interface, which is still not up, is configured to be in the channel group (and indirectly is in the only port channel in the channel group).
Examples
The following example shows how to display port-channel information for a specific group:
Switch#
show etherchannel 1 port-channel
Port-channels in the group:
Age of the Port-channel = 02h:35m:26s
Logical slot/port = 10/1 Number of ports in agport = 0
GC = 0x00000000 HotStandBy port = null
Passive port list = Fa5/4 Fa5/5
Port state = Port-channel L3-Ag Ag-Not-Inuse
Ports in the Port-channel:
The following example shows how to display load-balancing information:
Switch#
show etherchannel load-balance
Source XOR Destination mac address
The following example shows how to display a summary of information for a specific group:
Switch#
show etherchannel 1 brief
port-channels: 1 Max port-channels = 1
The following example shows how to display detailed information for a specific group:
Switch#
show etherchannel 1 detail
Port-channels: 1 Max Port-channels = 1
Port state = EC-Enbld Down Not-in-Bndl Usr-Config
Channel group = 1 Mode = Desirable Gcchange = 0
Port-channel = null GC = 0x00000000 Psudo-agport = Po1
Port indx = 0 Load = 0x00
Flags: S - Device is sending Slow hello. C - Device is in Consistent state.
A - Device is in Auto mode. P - Device learns on physical port.
Timers: H - Hello timer is running. Q - Quit timer is running.
S - Switching timer is running. I - Interface timer is running.
Hello Partner PAgP Learning Group
Port Flags State Timers Interval Count Priority Method Ifindex
Fa5/4 d U1/S1 1s 0 128 Any 0
Age of the port in the current state: 02h:33m:14s
Port state = EC-Enbld Down Not-in-Bndl Usr-Config
Channel group = 1 Mode = Desirable Gcchange = 0
Port-channel = null GC = 0x00000000 Psudo-agport = Po1
Port indx = 0 Load = 0x00
Flags: S - Device is sending Slow hello. C - Device is in Consistent state.
A - Device is in Auto mode. P - Device learns on physical port.
Timers: H - Hello timer is running. Q - Quit timer is running.
S - Switching timer is running. I - Interface timer is running.
Hello Partner PAgP Learning Group
Port Flags State Timers Interval Count Priority Method Ifindex
Fa5/5 d U1/S1 1s 0 128 Any 0
Age of the port in the current state: 02h:33m:17s
Port-channels in the group:
Age of the Port-channel = 02h:33m:52s
Logical slot/port = 10/1 Number of ports in agport = 0
GC = 0x00000000 HotStandBy port = null
Passive port list = Fa5/4 Fa5/5
Port state = Port-channel L3-Ag Ag-Not-Inuse
Ports in the Port-channel:
The following example shows how to display a one-line summary per channel group:
Switch# show etherchannel summary
Flags: D - down P - bundled in port-channel
I - stand-alone s - suspended
H - Hot-standby (LACP only)
U - in use f - failed to allocate aggregator
M - not in use, minimum links not met
u - unsuitable for bundling
w - waiting to be aggregated
Number of channel-groups in use: 2
Group Port-channel Protocol Ports
------+-------------+-----------+-----------------------------------------------
1 Po1(SD) LACP Gi1/23(H) Gi1/24(H)
The following example shows how to display EtherChannel port information for all ports and all groups:
Switch#
show etherchannel port
Port state = EC-Enbld Down Not-in-Bndl Usr-Config
Channel group = 1 Mode = Desirable Gcchange = 0
Port-channel = null GC = 0x00000000 Psudo-agport = Po1
Port indx = 0 Load = 0x00
Flags: S - Device is sending Slow hello. C - Device is in Consistent state.
A - Device is in Auto mode. P - Device learns on physical port.
Timers: H - Hello timer is running. Q - Quit timer is running.
S - Switching timer is running. I - Interface timer is running.
Hello Partner PAgP Learning Group
Port Flags State Timers Interval Count Priority Method Ifindex
Fa5/4 d U1/S1 1s 0 128 Any 0
Age of the port in the current state: 02h:40m:35s
Port state = EC-Enbld Down Not-in-Bndl Usr-Config
Channel group = 1 Mode = Desirable Gcchange = 0
Port-channel = null GC = 0x00000000 Psudo-agport = Po1
Port indx = 0 Load = 0x00
Flags: S - Device is sending Slow hello. C - Device is in Consistent state.
A - Device is in Auto mode. P - Device learns on physical port.
Timers: H - Hello timer is running. Q - Quit timer is running.
S - Switching timer is running. I - Interface timer is running.
The following example shows how to display the protocol enabled:
Switch# show etherchannel protocol
show fabric domain
To display your fabric domain configuration, use the show fabric domain command.
show fabric domain
Command Default
Default domain and default context.
Command Modes
Privileged EXEC
Command History
|
|
3.9.01E |
This command was introduced on the Catalyst 4500-E series switch using a Supervisor Engines 8-E and 8L-E. |
Usage Guidelines
Use the command to display a summary of the fabric domain.
Examples
This is sample output for the show fabric domain command, for an edge device.
device#show fabric domain
Fabric Domain : "default"
Control-Plane Service: Disabled
Number of "Control-Plane" node(s): 2
---------------------------------
Number of "Border" node(s): 1
Codes: * - Not Configured
------------------------------------------------
show fabric context
To display your fabric domain configuration, use the show fabric domain command.
show fabric context [default | name ]
Syntax Description
default |
The default context |
name |
Specifies a context in the fabric domain |
Command Default
Default context
Command Modes
Privileged EXEC
Command History
|
|
3.9.01E |
This command was introduced on the Catalyst 4500-E series switch using a Supervisor Engines 8-E and 8L-E. |
Usage Guidelines
Use the command to display a summary of the context configuration in your fabric domain.
Examples
This is sample output for the show fabric context command:
device#show fabric context
----------------------------------------------
show fabric host-pool
To display your fabric domain configuration, use the show fabric domain command.
show fabric host-pool name
Syntax Description
name |
The name of the host-pool |
Command Modes
Privileged EXEC
Command History
|
|
3.9.01E |
This command was introduced on the Catalyst 4500-E series switch using a Supervisor Engines 8-E and 8L-E. |
Usage Guidelines
Use the command to display a summary of the specified host-pool configuration.
Examples
This is sample output for the show fabric host-pool command:
device# show fabric host-pool
Fabric Domain : "default"
name vlan prefix gateway use-dhcp
-----------------------------------------------------------------------------------
name vlan prefix gateway use-dhcp
-----------------------------------------------------------------------------------
VOICE_DOMAIN 10 192.168.1.0/24 192.168.1.254 209.65.201.6
show flowcontrol
To display the per-interface status and statistics related to flow control, use the show flowcontrol command.
show flowcontrol [ module slot | interface interface ]
Syntax Description
module slot |
(Optional) Limits the display to interfaces on a specific module. |
interface interface |
(Optional) Displays the status on a specific interface. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(25)EW |
Support for the 10-Gigabit Ethernet interface was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
show flowcontrol Command Output describes the fields in the show flowcontrol command output.
Table 2-25 show flowcontrol Command Output
|
|
Port |
Module and port number. |
Send-Flowcontrol-Admin |
Flow-control administration. Possible settings: on indicates the local port sends flow control to the far end; off indicates the local port does not send flow control to the far end; desired indicates the local end sends flow control to the far end if the far end supports it. |
Send-Flowcontrol-Oper |
Flow-control operation. Possible setting: disagree indicates the two ports could not agree on a link protocol. |
Receive-Flowcontrol-Admin |
Flow-control administration. Possible settings: on indicates the local port requires the far end to send flow control; off indicates the local port does not allow the far end to send flow control; desired indicates the local end allows the far end to send flow control. |
Receive-Flowcontrol-Oper |
Flow-control operation. Possible setting: disagree indicates the two ports could not agree on a link protocol. |
RxPause |
Number of pause frames received. |
TxPause |
Number of pause frames transmitted. |
Examples
The following example shows how to display the flow control status on all the Gigabit Ethernet interfaces:
Port Send FlowControl Receive FlowControl RxPause TxPause
--------- -------- -------- -------- -------- ------- -------
Gi1/3 off off desired on 0 0
Gi1/4 off off desired on 0 0
Gi1/5 off off desired on 0 0
Gi1/6 off off desired on 0 0
Gi3/1 off off desired off 0 0
Gi3/2 off off desired off 0 0
Gi3/3 off off desired off 0 0
Gi3/4 off off desired off 0 0
Gi3/5 off off desired off 0 0
Gi3/6 off off desired off 0 0
The following example shows how to display the flow control status on module 1:
Switch# show flowcontrol module 1
Port Send FlowControl Receive FlowControl RxPause TxPause
----- -------- -------- -------- -------- ------- -------
Gi1/1 desired off off off 0 0
Gi1/2 on disagree on on 0 0
The following example shows how to display the flow control status on Gigabit Ethernet interface 3/4:
Switch# show flowcontrol interface gigabitethernet3/4
Port Send FlowControl Receive FlowControl RxPause TxPause
----- -------- -------- -------- -------- ------- -------
The following example shows how to display the flow control status on 10-Gigabit Ethernet interface 1/1:
Switch# show flowcontrol interface tengigabitethernet1/1
Port Send FlowControl Receive FlowControl RxPause TxPause
--------- -------- -------- -------- -------- ------- -------
Related Commands
|
|
channel-group |
Configures a Gigabit Ethernet interface to send or receive pause frames. |
show interfaces status |
Displays the interface status or a list of interfaces in error-disabled state. |
show hw-module port-group
To display how the X2 holes on a module are grouped, use the show hw-module port-group command.
show hw-module module number port-group
Syntax Description
module |
Specifies a line module. |
number |
Specifies a slot or module number. |
port-group |
Specifies a port-group on a switch. |
Command Modes
Global configuration mode
Command History
|
|
12.2(40)SG |
Support for WS-X4606-10GE-E Twin Gigabit converter introduced. |
Usage Guidelines
When a TwinGig converter is enabled or disabled, the number and type of ports on the line card change dynamically. The terminology must reflect this behavior. In Cisco IOS, 10-Gigabit ports are named TenGigabit and 1-Gigabit ports are named Gigabit. Starting with Cisco IOS Release 12.2(40)SG, to avoid having ports named TenGigabit1/1 and Gigabit1/1, the 10-Gigabit and 1-Gigabit port numbers are independent. The WS-X4606-10GE-E module with six X2 ports are named TenGigabit<slot-num>/<1-6>, and the SFP ports are named Gigabit<slot-num>/<7-18>.
On Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 4900M, Catalyst 4948E, and Catalyst 4948E-F, the ports are connected to the switching engine through a stub ASIC. This stub ASIC imposes some limitations on the ports: Gigabit and 10-Gigabit ports cannot be mixed on a single stub ASIC; they must either be all 10-Gigabit (X2), or all Gigabit (TwinGig converter and SFP). The faceplates of X2 modules show this stub-port grouping, either with an actual physical grouping, or a box drawn around a grouping.
Examples
The following example shows to determine how the X2 holes on a module are grouped on a WS-X4606-10GE-E:
Switch# show hw-module module 1 port-group
Module Port-group Active Inactive
-------------------------------------------------------------
Related Commands
|
|
hw-module port-group |
Selects either Gigabit Ethernet or Ten Gigabit Ethernet interfaces on your module. |
show hw-module system max-port-num-mode
To display the current mode in which a system is running as well as a message informing you that linecards beyond the 5th slot are unsupported, use the show hw-module system max-port-num-mode command.
show hw-module system max-port-num-mode
Command Modes
Privileged EXEC mode
Command History
|
|
Release IOS XE 3.5.0E and IOS 15.2(1)E |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The CLI shall be visible only on a 10-slot chassis or if 10-slot chassis is present in VSS.
Examples
The following example shows the output of the show hw-module system max-port-num-mode command on the standalone switch:
Switch# show hw-module system max-port-num-mode
Active max-port-num-mode configuration is 2
In this mode, Line cards inserted in last 3 slots (8,9 and 10) will not be active
The following example shows the output of the show hw-module system max-port-num-mode command in switch virtual mode:
Switch1# show hw-module system max-port-num-mode
Executing the command on VSS member switch role = VSS Active, id = 1
Active max-port-num-mode configuration is 1 (Default)
Executing the command on VSS member switch role = VSS Standby, id = 2
Active max-port-num-mode configuration is 2
In this mode, Line cards inserted in last 3 slots (8,9 and 10) will not be active
show hw-module uplink
To display the current uplink mode, use the show hw-module uplink command.
show hw-module uplink
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.2(25)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If the active uplink mode is different than configured mode, the output displays the change.
By default, the current (operational) uplink selection is displayed.
Examples
The following example shows the output displaying the current (active) uplinks:
Switch# show hw-module uplink
Active uplink configuration is TenGigabitEthernet
The following example shows the output for redundant systems in SSO mode if the 10-Gigabit Ethernet uplinks are active, and the Gigabit Ethernet uplinks are selected:
Switch# show hw-module uplink
Active uplink configuration is TenGigabitEthernet
(will be GigabitEthernet after next reload)
A 'redundancy reload shelf' or power-cycle of chassis is required to
apply the new configuration
The following example shows the output for redundant systems in RPR mode if the 10-Gigabit Ethernet uplinks are active, and the Gigabit Ethernet uplinks are selected:
Switch# show hw-module uplink
Active uplink configuration is TenGigabitEthernet
(will be GigabitEthernet after next reload)
A reload of active supervisor is required to apply the new configuration.
Related Commands
|
|
hw-module uplink select |
Selects the 10-Gigabit Ethernet or Gigabit Ethernet uplinks on the Supervisor Engine V-10GE within the W-C4510R chassis. |
show idprom
To display the IDPROMs for the chassis, supervisor engine, module, power supplies, fan trays, clock module, and multiplexer (mux) buffer, use the show idprom command.
show idprom { all | chassis | module [ mod ] | interface int_name | supervisor | power-supply number | fan-tray }
Syntax Description
all |
Displays information for all IDPROMs. |
chassis |
Displays information for the chassis IDPROMs. |
module |
Displays information for the module IDPROMs. |
mod |
(Optional) Specifies the module name. |
interface int_name |
Displays information for the GBIC or SFP IDPROMs. |
supervisor |
Displays information for the supervisor engine IDPROMs. |
power-supply number |
Displays information for the power supply IDPROMs. |
fan-tray |
Displays information for the fan tray IDPROMs. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(12c)EW |
Support for the power-supply , fan-tray , clock-module , and mux-buffer keywords was added. |
12.1(13)EW |
Support for interface keyword was added. |
12.2(18)EW |
Enhanced the show idprom interface output to include the hexadecimal display of the GBIC/SFP SEEPROM contents. |
12.2(25)EW |
Support for the 10-Gigabit Ethernet interface was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
When you enter the show idprom interface command, the output lines for Calibration type and Rx (receive) power measurement may not be displayed for all GBICs.
Examples
The following example shows how to display IDPROM information for module 4:
Switch#
show idprom module 4
Common Block Signature = 0xABAB
Common Block Length = 144
Common Block Checksum = 4199
OEM String = Cisco Systems, Inc.
Product Number = WS-X4306
Manufacturing Bits = 0x0000
Engineering Bits = 0x0000
Snmp OID = 0.0.0.0.0.0.0.0
RMA Failure Code = 0 0 0 0
Linecard Block Signature = 0x4201
Linecard Block Version = 1
Linecard Block Length = 24
Linecard Block Checksum = 658
Feature Bits = 0x0000000000000000
MAC Base = 0010.7bab.9830
The following example shows how to display IDPROM information for the GBICs on the Gigabit Ethernet interface 1/2:
Switch#
show idprom interface gigabitethernet1/2
GBIC Serial EEPROM Contents:
Extended Id = Not specified/compliant with defined MOD_DEF [0x0]
Connector = SC connector [0x1]
Speed = Not available [0x0]
Media = Not available [0x0]
Technology = Not available [0x0]
Link Length = Not available [0x0]
GE Comp Codes = Not available [0x0]
SONET Comp Codes = Not available [0x0]
BR, Nominal = 1300000000 MHz
Length(9u) in km = GBIC does not support single mode fibre, or the length
must be determined from the transceiver technology.
Length(50u) = GBIC does not support 50 micron multi-mode fibre, or the
length must be determined from the transceiver technology.
Length(62.5u) = GBIC does not support 62.5 micron multi-mode fibre, or
the length must be determined from transceiver technology.
Length(Copper) = GBIC does not support copper cables, or the length must
be determined from the transceiver technology.
Vendor name = CISCO-FINISAR
Vendor Part No. = FTR-0119-CSC
Wavelength = Not available
Options = Loss of Signal implemented TX_FAULT signal implemented TX_DISABLE is implemented and disables the serial output [0x1A]
Vendor Serial No. = K1273DH
Diag monitoring = Implemented
Calibration type = Internal
Rx pwr measuremnt = Optical Modulation Amplitude (OMA)
Address change = Required
Vendor Specific ID Fields:
20944D30 29 00 02 80 22 33 38 3D C7 67 83 E8 DF 65 6A AF)..."38=Gg^Ch_ej/
20944D40 1A 80 ED 00 00 00 00 00 00 00 00 00 38 23 3C 1B............8#<.
SEEPROM contents (hex) size 128:
0x0000 01 00 01 00 00 00 00 00 00 00 00 01 0D 00 00 FF................
0x0010 00 00 00 00 43 49 53 43 4F 2D 46 49 4E 49 53 41....CISCO-FINISA
0x0020 52 20 20 20 00 00 90 65 46 54 52 2D 30 31 31 39 R..^PeFTR-0119
0x0030 2D 43 53 43 20 20 20 20 42 20 20 20 00 00 00 1A -CSC B....
0x0040 00 1A 00 00 4B 31 32 37 33 44 48 20 20 20 20 20....K1273DH
0x0050 20 20 20 20 30 33 30 34 30 39 20 20 64 00 00 B2 030409 d..2
0x0060 29 00 02 80 22 33 38 3D C7 67 83 E8 DF 65 6A AF)..^@"38=Gg^C._ej.
0x0070 1A 80 ED 00 00 00 00 00 00 00 00 00 38 23 3C 1B.^@m.........8#<.
The following example shows how to display IDPROM information for the 10-Gigabit Ethernet interface 1/1:
Switch#
show idprom interface tengigabitethernet1/1
X2 Serial EEPROM Contents:
Non-Volatile Register (NVR) Fields
X2 MSA Version supported :0xA
Number of bytes used :0xD0
Customer Field Address :0x77
Vendor Field Address :0xA7
Extended Vendor Field Address :0x100
Transceiver type :0x2 =X2
Optical connector type :0x1 =SC
Normal BitRate in multiple of 1M b/s :0x2848
Protocol Type :0x1 =10GgE
Standards Compliance Codes :
10GbE Code Byte 0 :0x2 =10GBASE-LR
SONET/SDH Code Byte 0 :0x0
SONET/SDH Code Byte 1 :0x0
SONET/SDH Code Byte 2 :0x0
SONET/SDH Code Byte 3 :0x0
Transmission range in 10m :0x3E8
Fibre Type Byte 0 :0x40 =NDSF only
Fibre Type Byte 1 :0x0 =Unspecified
Centre Optical Wavelength in 0.01nm steps - Channel 0 :0x1 0xFF 0xB8
Centre Optical Wavelength in 0.01nm steps - Channel 1 :0x0 0x0 0x0
Centre Optical Wavelength in 0.01nm steps - Channel 2 :0x0 0x0 0x0
Centre Optical Wavelength in 0.01nm steps - Channel 3 :0x0 0x0 0x0
Package Identifier OUI :0xC09820
Transceiver Vendor OUI :0x3400800
Transceiver vendor name :CISCO-OPNEXT,INC
Part number provided by transceiver vendor :TRT5021EN-SMC-W
Revision level of part number provided by vendor :00
Vendor serial number :ONJ08290041
Vendor manufacturing date code :2004072000
Reserved1 : 00 02 02 20 D1 00 00
Basic Field Checksum :0x10
0x00: 58 32 2D 31 30 47 42 2D 4C 52 20 20 20 20 20 20
0x10: 20 20 20 20 20 4F 4E 4A 30 38 32 39 30 30 34 31
0x20: 31 30 2D 32 30 33 36 2D 30 31 20 20 41 30 31 20
0x00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x30: 00 00 00 00 11 E2 69 A9 2F 95 C6 EE D2 DA B3 FD
0x40: 9A 34 4A 24 CB 00 00 00 00 00 00 00 00 00 EF FC
0x50: F4 AC 1A D7 11 08 01 36 00
The following example shows how to display IDPROM information for the supervisor engine:
Switch#
show idprom supervisor
Common Block Signature = 0xABAB
Common Block Length = 144
Common Block Checksum = 4153
OEM String = Cisco Systems, Inc.
Product Number = WS-X4014
Serial Number = JAB05320CCE
Manufacturing Deviation String = 0
Manufacturing Bits = 0x0000
Engineering Bits = 0x0000
Snmp OID = 0.0.0.0.0.0.0.0
RMA Failure Code = 0 0 0 0
Supervisor Block Signature = 0x4101
Supervisor Block Version = 1
Supervisor Block Length = 24
Supervisor Block Checksum = 548
Feature Bits = 0x0000000000000000
MAC Base = 0007.0ee5.2a44
The following example shows how to display IDPROM information for the chassis:
Switch#
show idprom chassis
Common Block Signature = 0xABAB
Common Block Length = 144
Common Block Checksum = 4285
OEM String = Cisco Systems, Inc.
Product Number = WS-C4507R
Serial Number = FOX04473737
Manufacturing Deviation String = 0x00
Manufacturing Bits = 0x0000
Engineering Bits = 0x0000
Snmp OID = 0.0.0.0.0.0.0.0
Chassis Block Signature = 0x4001
Chassis Block Version = 1
Chassis Block Length = 22
Chassis Block Checksum = 421
Feature Bits = 0x0000000000000000
MAC Base = 0004.dd42.2600
The following example shows how to display IDPROM information for power supply 1:
Switch#
show idprom power-supply 1
Common Block Signature = 0xABAB
Common Block Length = 144
Common Block Checksum = 10207
OEM String = Cisco Systems, Inc.
Product Number = WS-CAC-1440W
Serial Number = ACP05180002
Manufacturing Deviation String =
Manufacturing Bits = 0x0000
Engineering Bits = 0x3031
Snmp OID = 9.12.3.65535.65535.65535.65535.65535
RMA Failure Code = 255 255 255 255
Power Supply Block Signature = 0xFFFF
PowerSupply Block Version = 255
PowerSupply Block Length = 255
PowerSupply Block Checksum = 65535
Feature Bits = 0x00000000FFFFFFFF
The following example shows how to display IDPROM information for the fan tray:
Switch#
show idprom fan-tray
Common Block Signature = 0xABAB
Common Block Length = 144
Common Block Checksum = 19781
OEM String = "Cisco Systems"
Product Number = WS-X4502-fan
Manufacturing Deviation String =
Manufacturing Bits = 0xFFFF
Engineering Bits = 0xFFFF
Snmp OID = 65535.65535.65535.65535.65535.65535.65535.65535
RMA Failure Code = 255 255 255 255
show interfaces
To display traffic on a specific interface, use the show interfaces command.
show interfaces [{{ fastethernet mod/interface-number } | { gigabitethernet mod/interface-number } | { tengigabitethernet mod/interface-number } | { null interface-number } | vlan vlan_id } | status }]
Syntax Description
fastethernet mod/interface-number |
(Optional) Specifies the Fast Ethernet module and interface. |
gigabitethernet mod/interface-number |
(Optional) Specifies the Gigabit Ethernet module and interface. |
tengigabitethernet mod/interface-number |
(Optional) Specifies the 10-Gigabit Ethernet module and interface. |
null interface-number |
(Optional) Specifies the null interface; the valid value is 0. |
vlan vlan_id |
(Optional) Specifies the VLAN; valid values are from 1 to 4094. |
status |
(Optional) Displays status information. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(12c)EW |
Support for extended VLAN addresses was added. |
12.2(25)EW |
Support for the 10-Gigabit Ethernet interface was introduced on the Catalyst 4500 series switch. |
12.2(31)SGA |
Support for auto-MDIX reflected in command output. |
12.2(52)SG |
Added support for per-VLAN error-disable detection. |
Usage Guidelines
The statistics are collected per VLAN for Layer 2 switched packets and Layer 3 switched packets. The statistics are available for both unicast and multicast. The Layer 3 switched packet counts are available for both the ingress and egress directions. The per-VLAN statistics are updated every 5 seconds.
In some cases, the duplex mode that is displayed by the show interfaces command is different than that displayed by the show running-config command. The duplex mode that is displayed in the show interfaces command is the actual duplex mode that the interface is running. The show interfaces command shows the operating mode for an interface, but the show running-config command shows the configured mode for an interface.
If you do not enter any keywords, all counters for all modules are displayed.
Line cards that support auto-MDIX configuration on their copper media ports include: WS-X4124-RJ45, WS-X4148-RJ with hardware revision 3.0 or later, and WS-X4232-GB-RJ with hardware revision 3.0 or later.
Examples
The following example shows how to display traffic for Gigabit Ethernet interface 2/5:
Switch# show interfaces gigabitethernet2/5
GigabitEthernet9/5 is up, line protocol is up (connected) (vlan-err-dis)
Hardware is C4k 1000Mb 802.3, address is 0001.64f8.3fa5 (bia 0001.64f8.3fa5)
Internet address is 172.20.20.20/24
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:00, output never, output hang never
Last clearing of "show interface" counters never
Output queue 0/40, 0 drops; input queue 0/75, 0 drops
5 minute input rate 1000 bits/sec, 2 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
L2 Switched: ucast: 8199 pkt, 1362060 bytes - mcast: 6980 pkt, 371952 bytes
L3 in Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes mcast
L3 out Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes
300114 packets input, 27301436 bytes, 0 no buffer
Received 43458 broadcasts, 0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 input packets with dribble condition detected
15181 packets output, 1955836 bytes, 0 underruns
0 output errors, 0 collisions, 3 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
The following example shows how to display traffic for 10-Gigabit Ethernet interface 1/1:
Switch# show interfaces tengigabitethernet1/1
Name: Tengigabitethernet1/1
Administrative Mode: private-vlan promiscuous trunk
Operational Mode: private-vlan promiscuous (suspended member of bundle Po1)
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: native
Negotiation of Trunking: Off
Trunking Native Mode VLAN: none
Administrative Native VLAN tagging: enabled
Administrative private-vlan host-association: none
Administrative private-vlan mapping: 202 (VLAN0202) 303 (VLAN0303) 304 (VLAN0304)
Administrative private-vlan trunk native VLAN: none
Administrative private-vlan trunk
Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: 802.1q
Administrative private-vlan trunk normal VLANs: none
Administrative private-vlan trunk private VLANs: none
Administrative private-vlan mapping trunk: New 202 (VLAN0202) 303 (VLAN0303) 304 (VLAN0304) 204 (VLAN0204) 305 (VLAN0305) 306 (VLAN0306)
Operational private-vlan: 202 (VLAN0202) 303 (VLAN0303) 304 (VLAN0304)
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture VLANs Allowed: ALL
The following example shows how to verify the status of auto-MDIX on an RJ-45 port:
Note
You can verify the configuration setting and the operational state of auto-MDIX on the interface by entering the show interfaces EXEC command. This field is applicable and appears only on the
show interfaces command output for 10/100/1000BaseT RJ-45 copper ports on supported linecards including WS-X4124-RJ45, WS-X4148-RJ with hardware revision 3.0 or later, and WS-X4232-GB-RJ with hardware revision 3.0 or later.
FastEthernet6/3 is up, line protocol is up (connected)
Hardware is Fast Ethernet Port, address is 0003.6ba8.ee68 (bia 0003.6ba8.ee68)
MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation ARPA, loopback not set
Full-duplex, 100Mb/s, link type is auto, media type is 10/100BaseTX
input flow-control is unsupported output flow-control is unsupported
Auto-MDIX on (operational: on)
ARP type: ARPA, ARP Timeout 04:00:00
Last input never, output never, output hang never
Last clearing of "show interface" counters never
Input queue: 0/2000/0/0 (size/max/drops/flushes); Total output drops: 0
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
0 packets input, 0 bytes, 0 no buffer
Received 0 broadcasts (0 multicasts)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 input packets with dribble condition detected
157082 packets output, 13418032 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collision, 0 deferred
1 lost carrier, 0 no carrier
0 output buffer failures, 0 output buffers swapped out
The following example shows how to display status information for Gigabit Ethernet interface 1/2:
Switch# show interfaces gigabitethernet1/2 status
Port Name Status Vlan Duplex Speed Type
Gi1/2 notconnect 1 auto 1000 1000-XWDM-RXONLY
The following example shows how to display status information for the interfaces on the supervisor engine:
Switch# show interfaces status
Port Name Status Vlan Duplex Speed Type
Te1/1 connected 1 full 10G 10GBase-LR
Te1/2 connected 1 full 10G 10GBase-LR
show interfaces (virtual switch)
To display traffic that is seen by a specific interface, use the show interfaces command in EXEC mode.
show interfaces [ interface iswitch-num/mod/port]
Syntax Description
interface |
(Optional) Specifies interface type |
switch-num |
Specifies port number. |
/mod |
Specifies module number |
/port |
Specifies port number |
Command Default
This command has no defaults settings.
Command Modes
Privileged EXEC mode
Command History
|
|
Cisco IOS XE 3.4.0SG and 15.1(2)SG |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Statistics are collected on a per-VLAN basis for Layer 2-switched packets and Layer 3-switched packets. Statistics are available for both unicast and multicast traffic. The Layer 3-switched packet counts are available for both ingress and egress directions. The per-VLAN statistics are updated every 5 seconds.
In some cases, you might see a difference in the duplex mode that is displayed between the show interfaces (virtual switch) command and the show running-config switch (virtual switch) command. In this case, the duplex mode that is displayed in the show interfaces (virtual switch) command is the actual duplex mode that the interface is running. The show interfaces (virtual switch) command shows the operating mode for an interface, while the show running-config switch (virtual switch) command shows the configured mode for an interface.
If you do not specify an interface, the information for all interfaces is displayed.
The output of the show interfaces GigabitEthernet command displays an extra 4 bytes for every packet that is sent or received. The extra 4 bytes are the Ethernet frame CRC in the input and output byte statistics.
Examples
The following example shows how to display traffic for a specific interface:
Router# show interfaces GigabitEthernet switch 1/3/3
GigabitEthernet1/3/3 is up, line protocol is up (connected)
Hardware is C6k 1000Mb 802.3, address is 000f.2305.49c0 (bia 000f.2305.49c0)
MTU 1500 bytes, BW 1000000 Kbit, DLY 10 usec,
reliability 255/255, txload 1/255, rxload 1/255
Encapsulation 802.1Q Virtual LAN, Vlan ID 1., loopback not set
Full-duplex, 1000Mb/s, media type is LH
input flow-control is off, output flow-control is on
ARP type: ARPA, ARP Timeout 04:00:00
Last input 00:00:19, output 00:00:00, output hang never
Last clearing of "show interface" counters never
Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0
Output queue: 0/40 (size/max)
5 minute input rate 0 bits/sec, 0 packets/sec
5 minute output rate 0 bits/sec, 0 packets/sec
L2 Switched: ucast: 360 pkt, 23040 bytes - mcast: 0 pkt, 0 bytes
L3 in Switched: ucast: 0 pkt, 0 bytes - mcast: 0 pkt, 0 bytes mcast
L3 out Switched: ucast: 0 pkt, 0 bytes mcast: 0 pkt, 0 bytes
437 packets input, 48503 bytes, 0 no buffer
Received 76 broadcasts (0 IP multicast)
0 runts, 0 giants, 0 throttles
0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored
0 watchdog, 0 multicast, 0 pause input
0 input packets with dribble condition detected
86 packets output, 25910 bytes, 0 underruns
0 output errors, 0 collisions, 0 interface resets
0 babbles, 0 late collision, 0 deferred
0 lost carrier, 0 no carrier, 0 PAUSE output
0 output buffer failures, 0 output buffers swapped out
show interfaces counters
To display the traffic on the physical interface, use the show interfaces counters command.
show interfaces counters [ all | detail | errors | storm-control | trunk ] [ module mod]
Syntax Description
all |
(Optional) Displays all the interface counters including errors, trunk, and detail. |
detail |
(Optional) Displays the detailed interface counters. |
errors |
(Optional) Displays the interface error counters. |
storm-control |
(Optional) Displays the number of packets discarded due to suppression on the interface. |
trunk |
(Optional) Displays the interface trunk counters. |
module mod |
(Optional) Limits the display to interfaces on a specific module. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Support for storm control. |
12.2(18)EW |
Support for the display of total suppression discards. |
Usage Guidelines
If you do not enter any keywords, all the counters for all modules are displayed.
The display for the storm-control keyword includes the suppressed multicast bytes.
Examples
The following example shows how to display the error counters for a specific module:
Switch#
show interfaces counters errors module 1
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize
Port Single-Col Multi-Col Late-Col Excess-Col Carri-Sen Runts Giants
The following example shows how to display the traffic that is seen by a specific module:
Switch#
show interfaces counters module 1
Port InOctets InUcastPkts InMcastPkts InBcastPkts
Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
The following example shows how to display the trunk counters for a specific module:
Switch#
show interfaces counters trunk module 1
Port TrunkFramesTx TrunkFramesRx WrongEncap
The following example shows how to display the number of packets that are discarded due to suppression:
Switch#
show interfaces counters storm-control
Multicast Suppression : Enabled
Port BcastSuppLevel TotalSuppressionDiscards
show interfaces counters (virtual switch)
To display the traffic that the physical interface sees, use the show interfaces counters command in EXEC mode.
show interfaces [interface switch-num/mod/port] counters [ errors | etherchannel | protocol status | storm-control]
Syntax Description
interface |
(Optional) Specifies the interface type. |
switch-num |
Specifies the switch number; valid values are 1 and 2. |
/mod |
Specifies the module number. |
/port |
Specifies the port number. |
errors |
(Optional) Displays the interface error counters. |
etherchannel |
(Optional) Displays information about the EtherChannel interface. |
protocol status |
(Optional) Displays information about the current status of the enabled protocols. |
storm-control |
(Optional) Displays the discard count and the level settings for each mode. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.2(52)SG |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The show interfaces counters command displays the number of all of the packets arriving and includes the number of packets that may be dropped by the interface due to the storm-control settings. To display the total number of dropped packets, you can enter the show interfaces counters storm-control command.
The show interfaces counters storm-control command displays the discard count and the level settings for each mode. The discard count is a total of all three modes.
If you do not enter any keywords, all counters for all modules are displayed.
If you do not specify an interface, the information for all interfaces is displayed.
When you enter the show interfaces interface counters etherchannel command, follow these guidelines:
- If interface specifies a physical port, the command displays the message "Etherchannel not enabled on this interface."
- If interface is omitted, the command displays the counters for all port channels (in the system) and for their associated physical ports.
- If interface specifies a port channel, the command displays the counters for the port channel and all of the physical ports that are associated with it. In addition, when you enter the command specifying the primary aggregator in a Link Aggregation Control Protocol (LACP) port channel with multiple aggregators, the output includes the statistics for all of the aggregators in the port channels and for the ports that are associated with them.
Examples
The following example shows how to display the error counters for a specific:
Router# show interfaces gigabitethernet 2/4/47 counters errors
Port Align-Err FCS-Err Xmit-Err Rcv-Err UnderSize OutDiscards
Port Single-Col Multi-Col Late-Col Excess-Col Carri-Sen Runts s
Port SQETest-Err Deferred-Tx IntMacTx-Err IntMacRx-Err Symbol-Err
The following example shows how to display traffic that is seen by a specific interface:
Router# show interfaces gigabitethernet 1/2/5 counters
Port InOctets InUcastPkts InMcastPkts InBcastPkts
Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
The following example shows how to display the counters for all port channels (in the system) and their associated physical ports:
Router# show interfaces counters etherchannel
Port InOctets InUcastPkts InMcastPkts InBcastPkts
Po10 16341138343 77612803 12212915 14110863
Gi1/4/1 15628478622 77612818 7525970 14110865
Gi1/4/2 712662881 0 4686951 5
Po20 33887345029 88483183 11506653 14101212
Gi2/4/1 33326378013 88491521 7177393 14101663
Gi2/4/2 562904837 0 4330030 6
Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts
Po10 33889238079 14101204 99999327 0
Gi1/4/1 33326354634 14101205 95669326 0
Gi1/4/2 562904707 7 4330029 0
Po20 16338422056 14353951 89573339 0
Gi2/4/1 15628501864 14232410 85017290 0
Gi2/4/2 712663011 121541 4565416 0
The following example shows how to display the counters for all port channels (in the system) and their associated physical ports in Cisco IOS Release 12.2(50)SY and later releases:
Router# show interfaces counters etherchannel
Port InOctets InUcastPkts InMcastPkts InBcastPkts
Po10 16341138343 77612803 12212915 14110863
Gi1/4/1 15628478622 77612818 7525970 14110865
Gi1/4/2 712662881 0 4686951 5
Po20 33887345029 88483183 11506653 14101212
Gi2/4/1 33326378013 88491521 7177393 14101663
Gi2/4/2 562904837 0 4330030 6
The following example shows how to display the protocols enabled for a specific interface:
Router# show interfaces gigabitethernet 1/2/5 counters protocol status
GigabitEthernet1/2/5: Other, IP
The following example shows how to display the discard count and the level settings for each mode for a specific interface:
Router# show interfaces gigabitethernet 1/2/5 counters storm-control
Port UcastSupp % McastSupp % BcastSupp % TotalSuppDiscards
Gi1/2/5 100.0 100.0 100.0 0
show interfaces description
To display a description and status of an interface, use the show interfaces description command.
show interfaces [ interface ] description
Syntax Description
interface |
(Optional) Type of interface. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display information for all interfaces:
Switch# show interfaces description
Interface Status Protocol Description
PO0/0 admin down down First interface
Gi1/1 up up GigE to server farm
Related Commands
|
|
description (refer to Cisco IOS documentation) |
Includes a specific description about the digital signal processor (DSP) interface. |
show interfaces link
To display how long a cable has been disconnected from an interface, use the show interfaces link command:
show interfaces link [ module mod_num ]
Syntax Description
module mod_num |
(Optional) Limits the display to interfaces on a module. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.2(18)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If the interface state is up, the command displays 0:00. If the interface state is down, the time (in hours, minutes, and seconds) is displayed.
Examples
The following example shows how to display active link-level information:
Switch# show interfaces link
The following example shows how to display inactive link-level information:
Switch# show interfaces link
In this example, the cable has been disconnected from the port for 1 minute and 28 seconds.
show interfaces mtu
To display the maximum transmission unit (MTU) size of all the physical interfaces and SVIs on the switch, use the show interfaces mtu command.
show interfaces mtu [ module mod ]
Syntax Description
module mod |
(Optional) Limits the display to interfaces on a specific module. |
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.1(13)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the MTU size for all interfaces on module 1:
Switch>
show interfaces mtu module 1
Related Commands
|
|
mtu |
Enables jumbo frames on an interface by adjusting the maximum size of a packet or maximum transmission unit (MTU). |
show interfaces private-vlan mapping
To display PVLAN mapping information for VLAN SVIs, use the show interfaces private-vlan mapping command.
show interfaces private-vlan mapping [ active ]
Syntax Description
active |
(Optional) Displays active interfaces only. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
This command displays SVI information only.
Examples
The following example shows how to display PVLAN mapping information:
Switch# show interfaces private-vlan mapping
Interface Secondary VLAN Type
--------- -------------- -----------------
Related Commands
|
|
private-vlan |
Configures private VLANs and the association between a private VLAN and a secondary VLAN. |
private-vlan mapping |
Creates a mapping between the primary and the secondary VLANs so that both share the same primary VLAN SVI. |
show interfaces status
To display the interface status or a list of interfaces in error-disabled state, use the show interfaces status command.
show interfaces status [ err-disabled | inactive ] [ module { module }]
Syntax Description
err-disabled |
(Optional) Displays interfaces in error-disabled state. |
inactive |
(Optional) Displays interfaces in inactive state. |
module module |
(Optional) Displays interfaces on a specific module. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(40)SG |
Support for WS-X4606-10GE-E Twin Gigabit converter introduced. |
12.2(52)SG |
Support for per-VLAN error-disable was introduced by adding Err-Disabled VLAN column to output. |
Usage Guidelines
When at least one VLAN on a port is error-disabled the output for the show interfaces status command will display vl-err-dis in the VLAN column.
Examples
The following example shows how to display the status of all interfaces:
Switch#
show interfaces status
Port Name Status Vlan Duplex Speed Type
Te1/1 connected 1 full 10G 10GBase-LR
Te1/2 connected vl-err-dis full 10G 10GBase-LR
The following example shows how to display the status of interfaces in an error-disabled state:
Switch#
show interfaces status err-disabled
Port Name Status Reason Err-Disabled VLANs
---- ---- ------ ------- -------------------
Fa9/4 notconnect link-flap
Fa9/5 err-disabled psecure_violation 3-5
Fa9/6 connected psecure_violation 10,15
The following example shows how to display the Gigabit Ethernet interfaces on a WS-X4606-10GE-E switch using the TwinGig Convertor:
Switch# show interfaces status module 1
Port Name Status Vlan Duplex Speed Type
Te1/1 inactive 1 full 10G No X2
Te1/2 inactive 1 full 10G No X2
Te1/3 inactive 1 full 10G No X2
Te1/4 notconnect 1 full 10G No X2
Te1/5 notconnect 1 full 10G No X2
Te1/6 notconnect 1 full 10G No X2
Gi1/7 notconnect 1 full 1000 No Gbic
Gi1/8 notconnect 1 full 1000 No Gbic
Gi1/9 notconnect 1 full 1000 No Gbic
Gi1/10 notconnect 1 full 1000 No Gbic
Gi1/11 notconnect 1 full 1000 No Gbic
Gi1/12 notconnect 1 full 1000 No Gbic
Gi1/13 inactive 1 full 1000 No Gbic
Gi1/14 inactive 1 full 1000 No Gbic
Gi1/15 inactive 1 full 1000 No Gbic
Gi1/16 inactive 1 full 1000 No Gbic
Gi1/17 inactive 1 full 1000 No Gbic
Gi1/18 inactive 1 full 1000 No Gbic
show interfaces switchport
To display the administrative and operational status of a switching (nonrouting) port, use the show interfaces switchport command.
show interfaces [ interface-id ] switchport [ module mod ]
Syntax Description
interface-id |
(Optional) Interface ID for the physical port. |
module mod |
(Optional) Limits the display to interfaces on the specified module; valid values are from 1 to 6. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Support for per-interface display. |
12.2(18)EW |
Support for displaying the status of native VLAN tagging in the command output. |
15.1.0 SG |
Support for PVLAN modes over EtherChannel. Modes include: private-vlan host, private-vlan promiscuous, private-vlan trunk secondary, and private-vlan trunk promiscuous. |
Examples
The following example shows how to display switch-port information using the begin output modifier:
Switch#
show interfaces switchport | include VLAN
Access Mode VLAN: 200 (VLAN0200)
Trunking Native Mode VLAN: 1 (default)
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: ALL
The following example shows how to display switch-port information for module 1:
Switch#
show interfaces switchport module 1
Administrative Mode:dynamic auto
Administrative Trunking Encapsulation:negotiate
Negotiation of Trunking:On
Access Mode VLAN:1 (default)
Trunking Native Mode VLAN:1 (default)
Administrative private-vlan host-association:none
Administrative private-vlan mapping:none
Operational private-vlan:none
Trunking VLANs Enabled:ALL
Pruning VLANs Enabled:2-1001
Administrative Mode:dynamic auto
Administrative Trunking Encapsulation:negotiate
Negotiation of Trunking:On
Access Mode VLAN:1 (default)
Trunking Native Mode VLAN:1 (default)
Administrative private-vlan host-association:none
Administrative private-vlan mapping:none
Operational private-vlan:none
Trunking VLANs Enabled:ALL
Pruning VLANs Enabled:2-1001
The following example shows how to display the status of native VLAN tagging on the port:
Switch#
show interfaces f3/1 switchport
show interface f3/1 switchport
Administrative Mode: private-vlan promiscuous
Operational Mode: private-vlan trunk secondary
Administrative Trunking Encapsulation: negotiate
Operational Trunking Encapsulation: dot1q
Negotiation of Trunking: On
Access Mode VLAN: 1 (default)
Trunking Native Mode VLAN: 1 (default)
Administrative Native VLAN tagging: enabled
Administrative private-vlan host-association: none
Administrative private-vlan mapping: none
Administrative private-vlan trunk native VLAN: 1
Administrative private-vlan trunk Native VLAN tagging: enabled
Administrative private-vlan trunk encapsulation: dot1q
Administrative private-vlan trunk normal VLANs: 1
Administrative private-vlan trunk associations: none
Administrative private-vlan trunk mappings:
10 (VLAN0010) 100 (VLAN0100)
Operational private-vlan:
10 (VLAN0010) 100 (VLAN0100)
Trunking VLANs Enabled: ALL
Pruning VLANs Enabled: 2-1001
Capture VLANs Allowed: ALL
Unknown unicast blocked: disabled
Unknown multicast blocked: disabled
show interfaces transceiver
To display diagnostic-monitoring data for all interfaces that have transceivers installed, use the show interfaces transceiver command.
show interfaces {{[ int_name ] transceiver {[ detail ]} | { transceiver [ module mod ] | detail [ module mod ]}}
Syntax Description
int_name |
(Optional) Interface name. |
detail |
(Optional) Displays the calibrated values and the A2D readouts if the readout values differ from the calibrated values. Also displays the high-alarm, high-warning, low-warning, and low-alarm thresholds. |
module mod |
(Optional) Limits the display to interfaces on a specific module. |
Command Default
The noninterface-specific versions of the show interfaces transceiver command are enabled by default.
The interface-specific versions of these commands are enabled by default if the specified interface has a transceiver (GBIC or SFP) that is configured for diagnostic monitoring, and the transceiver is in a module that supports diagnostic monitoring.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(20)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(18)EW |
Support for the calibration keyword was withdrawn. |
Usage Guidelines
The show interfaces transceiver command provides useful information under the following conditions:
- At least one transceiver is installed on a chassis that is configured for diagnostic monitoring.
- The transceiver is in a module that supports diagnostic monitoring.
If you notice that the alarm and warning flags have been set on a transceiver, reenter the command to confirm.
Examples
The following example shows how to display diagnostic monitoring data for all interfaces with transceivers installed on the switch:
Switch# show interfaces transceiver
If device is externally calibrated, only calibrated values are printed.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
NA or N/A: not applicable, Tx: transmit, Rx: receive.
mA: milliamperes, dBm: decibels (milliwatts).
Temperature Voltage Current Tx Power Rx Power
Port (Celsius) (Volts) (mA) (dBm) (dBm)
------- ----------- ------- -------- -------- --------
Gi1/1 48.1 3.30 0.0 8.1 ++ N/A
Gi1/2 33.0 3.30 1.8 -10.0 -36.9
Gi2/1 43.7 5.03 50.6 + -16.7 -- N/A
Gi2/2 39.2 5.02 25.7 0.8 N/A
Note
The value for the Optical Tx Power (in dBm) equals ten times log (Tx Power in mW). If the Tx Power value is 3 mW, then the Optical Tx Power value equals 10 * log (3), which equals 10 *.477 or 4.77 dBm. The Optical Rx Power value behaves similarly. If the Tx Power or the Rx Power is zero, then its dBm value is undefined and is shown as N/A (not applicable).
The following example shows how to display detailed diagnostic monitoring data, including calibrated values, alarm and warning thresholds, A2D readouts, and alarm and warning flags. The A2D readouts are reported separately in parentheses only if they differ from the calibrated values:
Switch# show interfaces transceiver detail
mA: milliamperes, dBm: decibels (milliwatts), NA or N/A: not applicable.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
A2D readouts (if they differ), are reported in parentheses.
The threshold values are calibrated.
High Alarm High Warn Low Warn Low Alarm
Temperature Threshold Threshold Threshold Threshold
Port (Celsius) (Celsius) (Celsius) (Celsius) (Celsius)
------- ------------------ ---------- --------- --------- ---------
Gi1/1 48.1 100.0 100.0 0.0 0.0
Gi1/2 34.9 100.0 100.0 0.0 0.0
Gi2/1 43.5 70.0 60.0 5.0 0.0
Gi2/2 39.1 70.0 60.0 5.0 0.0
High Alarm High Warn Low Warn Low Alarm
Voltage Threshold Threshold Threshold Threshold
Port (Volts) (Volts) (Volts) (Volts) (Volts)
------- --------------- ---------- --------- --------- ---------
Gi1/1 3.30 6.50 6.50 N/A N/A
Gi1/2 3.30 6.50 6.50 N/A N/A
Gi2/1 5.03 5.50 5.25 4.75 4.50
Gi2/2 5.02 5.50 5.25 4.75 4.50
High Alarm High Warn Low Warn Low Alarm
Current Threshold Threshold Threshold Threshold
Port (milliamperes) (mA) (mA) (mA) (mA)
------- ----------------- ---------- --------- --------- ---------
Gi1/1 0.0 130.0 130.0 N/A N/A
Gi1/2 1.7 130.0 130.0 N/A N/A
Gi2/1 50.6 + 60.0 40.0 10.0 5.0
Gi2/2 25.8 60.0 40.0 10.0 5.0
Optical High Alarm High Warn Low Warn Low Alarm
Transmit Power Threshold Threshold Threshold Threshold
Port (dBm) (dBm) (dBm) (dBm) (dBm)
------- ----------------- ---------- --------- --------- ---------
Gi1/1 8.1 ++ 8.1 8.1 N/A N/A
Gi1/2 -9.8 8.1 8.1 N/A N/A
Gi2/1 -16.7 (-13.0) -- 3.4 3.2 -0.3 -0.5
Gi2/2 0.8 ( 5.1) 3.4 3.2 -0.3 -0.5
Optical High Alarm High Warn Low Warn Low Alarm
Receive Power Threshold Threshold Threshold Threshold
Port (dBm) (dBm) (dBm) (dBm) (dBm)
------- ----------------- ---------- --------- --------- ---------
Gi1/1 N/A 8.1 8.1 N/A N/A
Gi1/2 -30.9 8.1 8.1 N/A N/A
Gi2/1 N/A (-28.5) 5.9 -6.7 -28.5 -28.5
Gi2/2 N/A (-19.5) 5.9 -6.7 -28.5 -28.5
The following example shows how to display the monitoring data for the interfaces that have transceivers installed on module 2:
Switch# show interfaces transceiver module 2
If device is externally calibrated, only calibrated values are printed.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
NA or N/A: not applicable, Tx: transmit, Rx: receive.
mA: milliamperes, dBm: decibels (milliwatts).
Temperature Voltage Current Tx Power Rx Power
Port (Celsius) (Volts) (mA) (dBm) (dBm)
------- ----------- ------- -------- -------- --------
Gi2/1 43.7 5.03 50.6 + -16.7 -- N/A
Gi2/2 39.2 5.02 25.7 0.8 N/A
The following example shows how to display the detailed monitoring data for the interfaces that have transceivers installed on module 2:
Switch# show interfaces transceiver detail module 2
mA: milliamperes, dBm: decibels (milliwatts), NA or N/A: not applicable.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
A2D readouts (if they differ), are reported in parentheses.
The threshold values are calibrated.
High Alarm High Warn Low Warn Low Alarm
Temperature Threshold Threshold Threshold Threshold
Port (Celsius) (Celsius) (Celsius) (Celsius) (Celsius)
------- ------------------ ---------- --------- --------- ---------
Gi2/1 43.5 70.0 60.0 5.0 0.0
Gi2/2 39.1 70.0 60.0 5.0 0.0
High Alarm High Warn Low Warn Low Alarm
Voltage Threshold Threshold Threshold Threshold
Port (Volts) (Volts) (Volts) (Volts) (Volts)
------- --------------- ---------- --------- --------- ---------
Gi2/1 5.03 5.50 5.25 4.75 4.50
Gi2/2 5.02 5.50 5.25 4.75 4.50
High Alarm High Warn Low Warn Low Alarm
Current Threshold Threshold Threshold Threshold
Port (milliamperes) (mA) (mA) (mA) (mA)
------- ----------------- ---------- --------- --------- ---------
Gi2/1 50.6 + 60.0 40.0 10.0 5.0
Gi2/2 25.8 60.0 40.0 10.0 5.0
Optical High Alarm High Warn Low Warn Low Alarm
Transmit Power Threshold Threshold Threshold Threshold
Port (dBm) (dBm) (dBm) (dBm) (dBm)
------- ----------------- ---------- --------- --------- ---------
Gi2/1 -16.7 (-13.0) -- 3.4 3.2 -0.3 -0.5
Gi2/2 0.8 ( 5.1) 3.4 3.2 -0.3 -0.5
Optical High Alarm High Warn Low Warn Low Alarm
Receive Power Threshold Threshold Threshold Threshold
Port (dBm) (dBm) (dBm) (dBm) (dBm)
------- ----------------- ---------- --------- --------- ---------
Gi2/1 N/A (-28.5) 5.9 -6.7 -28.5 -28.5
Gi2/2 N/A (-19.5) 5.9 -6.7 -28.5 -28.5
The following example shows how to display the monitoring data for the transceivers on interface Gi1/2:
Switch# show interfaces g1/2 transceiver
ITU Channel 23 (1558.98 nm),
Transceiver is externally calibrated.
If device is externally calibrated, only calibrated values are printed.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
NA or N/A: not applicable, Tx: transmit, Rx: receive.
mA: milliamperes, dBm: decibels (milliwatts).
Temperature Voltage Current Tx Power Rx Power
Port (Celsius) (Volts) (mA) (dBm) (dBm)
------- ----------- ------- -------- -------- --------
Gi2/1 43.7 5.03 50.6 + -16.7 -- N/A
The following example shows how to display detailed the monitoring data for the transceivers on interface Gi1/2:
Switch# show interfaces g1/2 transceiver detail
ITU Channel 23 (1558.98 nm),
Transceiver is externally calibrated.
mA: milliamperes, dBm: decibels (milliwatts), NA or N/A: not applicable.
++ : high alarm, + : high warning, - : low warning, -- : low alarm.
A2D readouts (if they differ), are reported in parentheses.
The threshold values are calibrated.
High Alarm High Warn Low Warn Low Alarm
Temperature Threshold Threshold Threshold Threshold
Port (Celsius) (Celsius) (Celsius) (Celsius) (Celsius)
------- ------------------ ---------- --------- --------- ---------
Gi2/1 43.5 70.0 60.0 5.0 0.0
High Alarm High Warn Low Warn Low Alarm
Voltage Threshold Threshold Threshold Threshold
Port (Volts) (Volts) (Volts) (Volts) (Volts)
------- --------------- ---------- --------- --------- ---------
Gi2/1 5.03 5.50 5.25 4.75 4.50
High Alarm High Warn Low Warn Low Alarm
Current Threshold Threshold Threshold Threshold
Port (milliamperes) (mA) (mA) (mA) (mA)
------- ----------------- ---------- --------- --------- ---------
Gi2/1 50.6 + 60.0 40.0 10.0 5.0
Optical High Alarm High Warn Low Warn Low Alarm
Transmit Power Threshold Threshold Threshold Threshold
Port (dBm) (dBm) (dBm) (dBm) (dBm)
------- ----------------- ---------- --------- --------- ---------
Gi2/1 -16.7 (-13.0) -- 3.4 3.2 -0.3 -0.5
Optical High Alarm High Warn Low Warn Low Alarm
Receive Power Threshold Threshold Threshold Threshold
Port (dBm) (dBm) (dBm) (dBm) (dBm)
------- ----------------- ---------- --------- --------- ---------
Gi2/1 N/A (-28.5) 5.9 -6.7 -28.5 -28.5
show interfaces trunk
To display port and module interface-trunk information, use the show interfaces trunk command.
show interfaces trunk [ module mod ]
Syntax Description
module mod |
(Optional) Limits the display to interfaces on the specified module; valid values are from 1 to 6. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If you do not specify a keyword, only information for trunking ports is displayed.
Examples
The following example shows how to display interface-trunk information for module 5:
Switch#
show interfaces trunk module 5
Port Mode Encapsulation Status Native vlan
Fa5/1 routed negotiate routed 1
Fa5/2 routed negotiate routed 1
Fa5/3 routed negotiate routed 1
Fa5/4 routed negotiate routed 1
Fa5/5 routed negotiate routed 1
Fa5/6 off negotiate not-trunking 10
Fa5/7 off negotiate not-trunking 10
Fa5/8 off negotiate not-trunking 1
Fa5/9 desirable n-isl trunking 1
Fa5/10 desirable negotiate not-trunking 1
Fa5/11 routed negotiate routed 1
Fa5/12 routed negotiate routed 1
Fa5/48 routed negotiate routed 1
Port Vlans allowed on trunk
Port Vlans allowed and active in management domain
Fa5/9 1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
Port Vlans in spanning tree forwarding state and not pruned
Fa5/9 1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
The following example shows how to display trunking information for active trunking ports:
Switch#
show interfaces trunk
Port Mode Encapsulation Status Native vlan
Fa5/9 desirable n-isl trunking 1
Port Vlans allowed on trunk
Port Vlans allowed and active in management domain
Fa5/9 1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
Port Vlans in spanning tree forwarding state and not pruned
Fa5/9 1-6,10,20,50,100,152,200,300,303-305,349-351,400,500,521,524,570,801-8
show ip arp inspection
To show the status of dynamic ARP inspection for a specific range of VLANs, use the show ip arp inspection command.
show ip arp inspection {[ statistics ] vlan vlan-range | interfaces [ interface-name ]}
Syntax Description
statistics |
(Optional) Displays statistics for the following types of packets that have been processed by this feature: forwarded, dropped, MAC validation failure, and IP validation failure. |
vlan vlan-range |
(Optional) When used with the statistics keyword, displays the statistics for the selected range of VLANs. Without the statistics keyword, displays the configuration and operating state of DAI for the selected range of VLANs. |
interfaces interface-name |
(Optional) Displays the trust state and the rate limit of ARP packets for the provided interface. When the interface name is not specified, the command displays the trust state and rate limit for all applicable interfaces in the system. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(19)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the statistics of packets that have been processed by DAI for
VLAN 3:
Switch# show ip arp inspection statistics vlan 3
Vlan Forwarded Dropped DHCP Drops ACL Drops
---- --------- ------- ---------- ----------
Vlan DHCP Permits ACL Permits Source MAC Failures
---- ------------ ----------- -------------------
Vlan Dest MAC Failures IP Validation Failures
---- ----------------- ----------------------
The following example shows how to display the statistics of packets that have been processed by DAI for all active VLANs:
Switch# show ip arp inspection statistics
Vlan Forwarded Dropped DHCP Drops ACL Drops
---- --------- ------- ---------- ----------
Vlan DHCP Permits ACL Permits Source MAC Failures
---- ------------ ----------- -------------------
Vlan Dest MAC Failures IP Validation Failures
---- ----------------- ----------------------
The following example shows how to display the configuration and operating state of DAI for VLAN 1:
Switch# show ip arp inspection vlan 1
Source Mac Validation : Disabled
Destination Mac Validation : Disabled
IP Address Validation : Disabled
Vlan Configuration Operation ACL Match Static ACL
---- ------------- --------- --------- ----------
Vlan ACL Logging DHCP Logging
---- ----------- ------------
The following example shows how to display the trust state of Fast Ethernet interface 6/1:
Switch# show ip arp inspection interfaces fastEthernet 6/1
Interface Trust State Rate (pps) Burst Interval
--------------- ----------- ---------- --------------
The following example shows how to display the trust state of the interfaces on the switch:
Switch# show ip arp inspection interfaces
Interface Trust State Rate (pps)
--------------- ----------- ----------
show ip arp inspection log
To show the status of the log buffer, use the show ip arp inspection log command.
show ip arp inspection log
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(19)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the current contents of the log buffer before and after the buffers are cleared:
Switch# show ip arp inspection log
Total Log Buffer Size : 10
Syslog rate : 0 entries per 10 seconds.
Interface Vlan Sender MAC Sender IP Num of Pkts
--------------- ----- ----------------- --------------- -----------
Fa6/3 1 0002.0002.0002 10.1.1.2 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.3 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.4 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.5 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.6 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.7 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.8 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.9 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.10 1(12:02:52 UTC Fri Apr 25 2003)
Fa6/3 1 0002.0002.0002 10.1.1.11 1(12:02:52 UTC Fri Apr 25 2003)
-- -- -- -- 5(12:02:52 UTC Fri Apr 25 2003)
The following example shows how to clear the buffer with the clear ip arp inspection log command:
Switch# clear ip arp inspection log
Switch# show ip arp inspection log
Total Log Buffer Size : 10
Syslog rate : 0 entries per 10 seconds.
No entries in log buffer.
show ip cef vlan
To view IP CEF VLAN interface status and configuration information and display the prefixes for a specific interface, use the show ip cef vlan command.
show ip cef vlan vlan_num [ detail ]
Syntax Description
vlan_num |
Number of the VLAN. |
detail |
(Optional) Displays detailed information. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the prefixes for a specific VLAN:
Switch# show ip cef vlan 1003
Prefix Next Hop Interface
0.0.0.0/0 172.20.52.1 FastEthernet3/3
10.7.0.0/16 172.20.52.1 FastEthernet3/3
10.16.18.0/23 172.20.52.1 FastEthernet3/3
The following example shows how to display detailed IP CEF information for a specific VLAN:
Switch# show ip cef vlan 1003 detail
IP Distributed CEF with switching (Table Version 2364), flags=0x0
1383 routes, 0 reresolve, 0 unresolved (0 old, 0 new)
1383 leaves, 201 nodes, 380532 bytes, 2372 inserts, 989 invalidations
0 load sharing elements, 0 bytes, 0 references
universal per-destination load sharing algorithm, id 9B6C9823
3 CEF resets, 0 revisions of existing leaves
refcounts: 54276 leaf, 51712 node
Adjacency Table has 5 adjacencies
show ip dhcp snooping
To display the DHCP snooping configuration, use the show ip dhcp snooping command.
show ip dhcp snooping
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(12c)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(25)EWA |
Support for option 82 on untrusted ports was added. |
Examples
The following example shows how to display the DHCP snooping configuration:
Switch# show ip dhcp snooping
Switch DHCP snooping is enabled
DHCP snooping is configured on following VLANs:
DHCP snooping is operational on following VLANs:
DHCP snooping is configured on the following L3 Interfaces:
Insertion of option 82 is enabled
circuit-id default format: vlan-mod-port
remote-id: switch123 (string)
Option 82 on untrusted port is not allowed Verification of hwaddr field is enabled DHCP snooping trust/rate is configured on the following Interfaces:
Interface Trusted Rate limit (pps)
------------------------ ------- ----------------
FastEthernet2/1 no unlimited
show ip dhcp snooping binding
To display the DHCP snooping binding entries, use the show ip dhcp snooping binding command.
show ip dhcp snooping binding [ ip-address ] [ mac-address ] [ vlan vlan_num ]
[ interface interface_num ]
Syntax Description
ip-address |
(Optional) IP address for the binding entries. |
mac-address |
(Optional) MAC address for the binding entries. |
vlan vlan_num |
(Optional) Specifies a VLAN. |
interface interface_num |
(Optional) Specifies an interface. |
Command Default
If no argument is specified, the switch will display the entire DHCP snooping binding table.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(12c)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
DHCP snooping is enabled on a VLAN only if both the global snooping and the VLAN snooping are enabled.
To configure a range of VLANs, use the optional last_vlan argument to specify the end of the VLAN range.
Examples
The following example shows how to display the DHCP snooping binding entries for a switch:
Switch# show ip dhcp snooping binding
MacAddress IP Address Lease (seconds) Type VLAN Interface
----------- ----------- ---------------- ------------- ----- ------------
0000.0100.0201 10.0.0.1 1600 dhcp-snooping 100 FastEthernet3/1
The following example shows how to display an IP address for DHCP snooping binding entries:
Switch# show ip dhcp snooping binding 172.100.101.102
MacAddress IP Address Lease (seconds) Type VLAN Interface
----------- ----------- ---------------- ------------- ----- ------------
0000.0100.0201 172.100.101.102 1600 dhcp-snooping 100 FastEthernet3/1
The following example shows how to display the MAC address for the DHCP snooping binding entries:
Switch# show ip dhcp snooping binding 55.5.5.2 0002.b33f.3d5f
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
00:02:B3:3F:3D:5F 55.5.5.2 492 dhcp-snooping 99 FastEthernet6/36
The following example shows how to display the DHCP snooping binding entries’ MAC address for a specific VLAN:
Switch# show ip dhcp snooping binding 55.5.5.2 0002.b33f.3d5f vlan 99
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
00:02:B3:3F:3D:5F 55.5.5.2 479 dhcp-snooping 99 FastEthernet6/36
The following example shows how to display the dynamic DHCP snooping binding entries:
Switch# show ip dhcp snooping binding dynamic
MacAddress IP Address Lease (seconds) Type VLAN Interface
----------- ----------- ---------------- ------------ ----- ------------
0000.0100.0201 10.0.0.1 1600 dhcp-snooping 100 FastEthernet3/1
The following example shows how to display the DHCP snooping binding entries on VLAN 100:
Switch# show ip dhcp snooping binding vlan 100’
MacAddress IP Address Lease (seconds) Type VLAN Interface
----------- ----------- ---------------- ------------ ----- ------------
0000.0100.0201 10.0.0.1 1600 dhcp-snooping 100 FastEthernet3/1
The following example shows how to display the DHCP snooping binding entries on Ethernet interface 0/1:
Switch# show ip dhcp snooping binding interface fastethernet3/1
MacAddress IP Address Lease (seconds) Type VLAN Interface
----------- ----------- ---------------- ------------ ----- ------------
0000.0100.0201 10.0.0.1 1600 dhcp-snooping 100 FastEthernet3/1
Table 2-26 describes the fields in the show ip dhcp snooping command output.
Table 2-26 show ip dhcp snooping Command Output
|
|
Mac Address |
Client hardware MAC address. |
IP Address |
Client IP address assigned from the DHCP server. |
Lease (seconds) |
IP address lease time. |
Type |
Binding type; statically configured from CLI or dynamically learned. |
VLAN |
VLAN number of the client interface. |
Interface |
Interface that connects to the DHCP client host. |
show ip dhcp snooping database
To display the status of the DHCP snooping database agent, use the show ip dhcp snooping database command.
show ip dhcp snooping database [ detail ]
Syntax Description
detail |
(Optional) Provides additional operating state and statistics information. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(12c)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Added support of state and statistics information. |
Examples
The following example shows how to display the DHCP snooping database:
Switch# show ip dhcp snooping database
Write delay Timer : 300 seconds
Abort Timer : 300 seconds
Delay Timer Expiry : Not Running
Abort Timer Expiry : Not Running
Last Succeded Time : None
Last Failed Reason : No failure recorded.
Total Attempts : 0 Startup Failures : 0
Successful Transfers : 0 Failed Transfers : 0
Successful Reads : 0 Failed Reads : 0
Successful Writes : 0 Failed Writes : 0
The following example shows how to view additional operating statistics:
Switch# show ip dhcp snooping database detail
Agent URL : tftp://10.1.1.1/directory/file
Write delay Timer : 300 seconds
Abort Timer : 300 seconds
Delay Timer Expiry : 7 (00:00:07)
Abort Timer Expiry : Not Running
Last Succeded Time : None
Last Failed Time : 17:14:25 UTC Sat Jul 7 2001
Last Failed Reason : Unable to access URL.
Total Attempts : 21 Startup Failures : 0
Successful Transfers : 0 Failed Transfers : 21
Successful Reads : 0 Failed Reads : 0
Successful Writes : 0 Failed Writes : 21
First successful access: Read
Last ignored bindings counters :
Binding Collisions : 0 Expired leases : 0
Invalid interfaces : 0 Unsupported vlans : 0
Total ignored bindings counters:
Binding Collisions : 0 Expired leases : 0
Invalid interfaces : 0 Unsupported vlans : 0
show ip igmp interface
To view IP IGMP interface status and configuration information, use the show ip igmp interface command.
show ip igmp interface [ fastethernet slot/port | gigabitethernet slot/port |
tengigabitethernet slot/port | null interface-number | vlan vlan_id ]
Syntax Description
fastethernet slot/port |
(Optional) Specifies the Fast Ethernet interface and the number of the slot and port. |
gigabitethernet slot/port |
(Optional) Specifies the Gigabit Ethernet interface and the number of the slot and port; valid values are from 1 to 9. |
tengigabitethernet slot/port |
(Optional) Specifies the 10-Gigabit Ethernet interface and the number of the slot and port; valid values are from 1 to 2. |
null interface-number |
(Optional) Specifies the null interface and the number of the interface; the only valid value is 0. |
vlan vlan_id |
(Optional) Specifies the VLAN and the number of the VLAN; valid values are from 1 to 4094. |
Command Default
If you do not specify a VLAN, information for VLAN 1 is shown.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(12c)EW |
Added support for extended VLAN addresses. |
12.2(25)EW |
Added support for the 10-Gigabit Ethernet interface. |
Usage Guidelines
If you omit the optional arguments, the show ip igmp interface command displays information about all interfaces.
Examples
The following example shows how to view IGMP information for VLAN 200:
Switch# show ip igmp interface vlan 200
IGMP snooping is globally enabled
IGMP snooping is enabled on this Vlan
IGMP snooping immediate-leave is disabled on this Vlan
IGMP snooping mrouter learn mode is pim-dvmrp on this Vlan
IGMP snooping is running in IGMP-ONLY mode on this VLAN
show ip igmp profile
To view all configured IGMP profiles or a specified IGMP profile, use the show ip igmp profile privileged EXEC command.
show ip igmp profile [ profile number ]
Syntax Description
profile number |
(Optional) IGMP profile number to be displayed; valid ranges are from 1 to 4294967295. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(11b)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
If no profile number is entered, all IGMP profiles are displayed.
Examples
The following example shows how to display IGMP profile 40:
Switch# show ip igmp profile 40
range 233.1.1.1 233.255.255.255
The following example shows how to display all IGMP profiles:
Switch# show ip igmp profile
range 230.9.9.0 230.9.9.0
range 229.9.9.0 229.255.255.255
show ip igmp snooping
To display information on dynamically learned and manually configured VLAN switch interfaces, use the show ip igmp snooping command.
show ip igmp snooping [ querier | groups | mrouter ] [ vlan vlan_id ] a.b.c.d [ summary | sources | hosts ] [ count ]
Syntax Description
querier |
(Optional) Specifies that the display will contain IP address and version information. |
groups |
(Optional) Specifies that the display will list VLAN members sorted by group IP addresses. |
mrouter |
(Optional) Specifies that the display will contain information on dynamically learned and manually configured multicast switch interfaces. |
vlan vlan_id |
(Optional) Specifies a VLAN; valid values are from 1 to 1001 and from 1006 to 4094. |
a.b.c.d |
Group or multicast IP address. |
summary |
(Optional) Specifies a display of detailed information for a v2 or v3 group. |
sources |
(Optional) Specifies a list of the source IPs for the specified group. |
hosts |
(Optional) Specifies a list of the host IPs for the specified group. |
count |
(Optional) Specifies a display of the total number of group addresses learned by the system on a global or per-VLAN basis. |
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Support for extended addressing was added. |
12.1(20)EW |
Added support to display configuration state for IGMPv3 explicit host tracking. |
Usage Guidelines
You can also use the show mac-address-table multicast command to display the entries in the MAC address table for a VLAN that has IGMP snooping enabled.
You can display IGMP snooping information for VLAN interfaces by entering the show ip igmp snooping command.
Examples
The following example shows how to display the global snooping information on the switch:
Switch# show ip igmp snooping
Global IGMP Snooping configuration:
-----------------------------------
IGMPv3 snooping : Enabled
Report suppression : Enabled
TCN solicit query : Disabled
TCN flood query count : 2
IGMPv2 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
CGMP interoperability mode : IGMP_ONLY
IGMPv2 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
CGMP interoperability mode : IGMP_ONLY
The following example shows how to display the snooping information on VLAN 2:
Switch# show ip igmp snooping vlan 2
Global IGMP Snooping configuration:
-----------------------------------
IGMPv3 snooping : Enabled
Report suppression : Enabled
TCN solicit query : Disabled
TCN flood query count : 2
IGMPv2 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
CGMP interoperability mode : IGMP_ONLY
The following example shows how to display IGMP querier information for all VLANs on a switch:
Switch# show ip igmp snooping querier
Vlan IP Address IGMP Version Port
---------------------------------------------------
The following example shows how to display IGMP querier information for VLAN 5 when running IGMPv2:
Switch# show ip igmp snooping querier vlan 5
The following example shows how to display IGMP querier information for VLAN 5 when running IGMPv3:
Switch# show ip igmp snooping querier vlan 5
The following example shows how to display snooping information for a specific group:
Switch#
show ip igmp snooping group
---------------------------------------------------------
The following example shows how to display the group’s host types and ports in VLAN 1:
Switch# show ip igmp snooping group vlan 1
Vlan Group Host Type Ports
---------------------------------------------------------
1 229.2.3.4 v3 fa2/1 fa2/3
The following example shows how to display the group’s host types and ports in VLAN 1:
Switch# show ip igmp snooping group vlan 10 226.6.6.7
---------------------------------------------------------
10 226.6.6.7 v3 Fa7/13, Fa7/14
The following example shows how to display the current state of a group with respect to a source IP address:
Switch# show ip igmp snooping group vlan 10 226.6.6.7 sources
Source information for group 226.6.6.7:
Timers: Expired sources are deleted on next IGMP General Query
SourceIP Expires Uptime Inc Hosts Exc Hosts
-------------------------------------------------------
2.0.0.1 00:03:04 00:03:48 2 0
2.0.0.2 00:03:04 00:02:07 2 0
The following example shows how to display the current state of a group with respect to a host MAC address:
Switch# show ip igmp snooping group vlan 10 226.6.6.7 hosts
IGMPv3 host information for group 226.6.6.7
Timers: Expired hosts are deleted on next IGMP General Query
Host (MAC/IP) Filter mode Expires Uptime # Sources
-------------------------------------------------------------
175.1.0.29 INCLUDE stopped 00:00:51 2
175.2.0.30 INCLUDE stopped 00:04:14 2
The following example shows how to display summary information for a v3 group:
Switch# show ip igmp snooping group vlan 10 226.6.6.7 summary
Group Address (Vlan 10) : 226.6.6.7
Member Ports : Fa7/13, Fa7/14
Reporters (Include/Exclude) : 2/0
The following example shows how to display multicast router information for VLAN 1:
Switch#
show ip igmp snooping mrouter vlan 1
-----+----------------------------------------
1 Gi1/1,Gi2/1,Fa3/48,Router
The following example shows how to display the total number of group addresses learned by the system globally:
Switch# show ip igmp snooping group count
Total number of groups: 54
The following example shows how to display the total number of group addresses learned on VLAN 5:
Switch# show ip igmp snooping group vlan 5 count
Total number of groups: 30
show ip igmp snooping membership
To display host membership information, use the show ip igmp snooping membership command.
show ip igmp snooping membership [ interface interface_num ] [ vlan vlan_id ]
[ reporter a.b.c.d ] [ source a.b.c.d group a.b.c.d ]
Syntax Description
interface interface_num |
(Optional) Displays IP address and version information of an interface. |
vlan vlan_id |
(Optional) Displays VLAN members sorted by group IP address of a VLAN; valid values are from 1 to 1001 and from 1006 to 4094. |
reporter a.b.c.d |
(Optional) Displays membership information for a specified reporter. |
source a.b.c.d |
(Optional) Specifies a reporter, source, or group IP address. |
group a.b.c.d |
(Optional) Displays all members of a channel (source, group), sorted by interface or VLAN. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(20)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(25)EW |
Added support for the 10-Gigabit Ethernet interface. |
Usage Guidelines
This command is valid only if explicit host tracking is enabled on the switch.
Examples
The following example shows how to display host membership for the Gigabit Ethernet interface 4/1:
Switch# show ip igmp snooping membership interface gigabitethernet4/1
Source/Group Interface Reporter Uptime Last-Join Last-Leave
40.40.40.2/224.10.10.10 Gi4/1 20.20.20.20 00:23: 37 00:06: 50 00:20:30
40.40.40.4/224.10.10.10 Gi4/1 20.20.20.20 00:39: 42 00:09:17 -
The following example shows how to display host membership for VLAN 20 and group 224.10.10.10:
Switch# show ip igmp snooping membership vlan 20 source 40.40.40.2 group 224.10.10.10
Source/Group Interface Reporter Uptime Last-Join Last-Leave
40.40.40.2/224.10.10.10 Gi4/1 20.20.20.20 00:23: 37 00:06: 50 00:20:30
The following example shows how to display host membership information for VLAN 20 and to delete the explicit host tracking:
Switch# show ip igmp snooping membership vlan 20
Snooping Membership Summary for Vlan 20
------------------------------------------
Total number of channels:5
Source/Group Interface Reporter Uptime Last-Join/
-------------------------------------------------------------------------------------------------------
40.0.0.1/224.1.1.1 Fa7/37 0002.4ba0.a4f6 00:00:04 00:00:04 /
40.0.0.2/224.1.1.1 Fa7/37 0002.fd80.f770 00:00:17 00:00:17 /
40.0.0.3/224.1.1.1 Fa7/36 20.20.20.20 00:00:04 00:00:04 /
40.0.0.4/224.1.1.1 Fa7/35 20.20.20.210 00:00:17 00:00:17 /
40.0.0.5/224.1.1.1 Fa7/37 0002.fd80.f770 00:00:17 00:00:17 /
Switch# clear ip igmp snooping membership vlan 20
show ip igmp snooping mrouter
To display information on the dynamically learned and manually configured multicast switch interfaces, use the show ip igmp snooping mrouter command.
show ip igmp snooping mrouter [ vlan vlan-id ]
Syntax Description
vlan vlan-id |
(Optional) Specifies a VLAN; valid values are from 1 to 1001 and from 1006 to 4094. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(19)EW |
Added support for extended VLAN addresses. |
Usage Guidelines
You can also use the show mac-address-table multicast command to display entries in the MAC address table for a VLAN that has IGMP snooping enabled.
You can display IGMP snooping information for the VLAN interfaces by entering the show ip igmp interface vlan vlan-num command.
Examples
The following example shows how to display snooping information for a specific VLAN:
Switch#
show ip igmp snooping mrouter vlan 1
-----+----------------------------------------
1 Gi1/1,Gi2/1,Fa3/48,Switch
show ip igmp snooping vlan
To display information on the dynamically learned and manually configured VLAN switch interfaces, use the show ip igmp snooping vlan command.
show ip igmp snooping vlan vlan_num
Syntax Description
vlan_num |
Number of the VLAN; valid values are from 1 to 1001 and from 1006 to 4094. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.1(12c)EW |
Support for extended addressing was added. |
Usage Guidelines
You can also use the show mac-address-table multicast command to display the entries in the MAC address table for a VLAN that has IGMP snooping enabled.
Examples
The following example shows how to display snooping information for a specific VLAN:
Switch#
show ip igmp snooping vlan 2
IGMP snooping is globally enabled
IGMP snooping TCN solicit query is globally enabled
IGMP snooping global TCN flood query count is 2
IGMP snooping is enabled on this Vlan
IGMP snooping immediate-leave is disabled on this Vlan
IGMP snooping mrouter learn mode is pim-dvmrp on this Vlan
IGMP snooping is running in IGMP_ONLY mode on this Vlan
show ip interface
To display the usability status of interfaces that are configured for IP, use the show ip interface command.
show ip interface [ type number ]
Syntax Description
type |
(Optional) Interface type. |
number |
(Optional) Interface number. |
Command Default
This command has no default settings.
Command Modes
EXEC
Command History
|
|
12.2(25)EW |
Extended to include the 10-Gigabit Ethernet interface. |
Usage Guidelines
The Cisco IOS software automatically enters a directly connected route in the routing table if the interface is usable. A usable interface is one through which the software can send and receive packets. If the software determines that an interface is not usable, it removes the directly connected routing entry from the routing table. Removing the entry allows the software to use dynamic routing protocols to determine backup routes to the network, if any.
If the interface can provide two-way communication, the line protocol is marked “up.” If the interface hardware is usable, the interface is marked “up.”
If you specify an optional interface type, you see information only on that specific interface.
If you specify no optional arguments, you see information on all the interfaces.
When an asynchronous interface is encapsulated with PPP or Serial Line Internet Protocol (SLIP), IP fast switching is enabled. The show ip interface command on an asynchronous interface that is encapsulated with PPP or SLIP displays a message indicating that IP fast switching is enabled.
Examples
The following example shows how to display the usability status for a specific VLAN:
Switch# show ip interface vlan 1
Vlan1 is up, line protocol is up
Internet address is 10.6.58.4/24
Broadcast address is 255.255.255.255
Address determined by non-volatile memory
Helper address is not set
Directed broadcast forwarding is disabled
Outgoing access list is not set
Inbound access list is not set
Local Proxy ARP is disabled
Security level is default
ICMP redirects are always sent
ICMP unreachables are always sent
ICMP mask replies are never sent
IP fast switching is enabled
IP fast switching on the same interface is disabled
IP Flow switching is disabled
IP CEF switching is enabled
IP Fast switching turbo vector
IP Normal CEF switching turbo vector
IP multicast fast switching is enabled
IP multicast distributed fast switching is disabled
IP route-cache flags are Fast, CEF
Router Discovery is disabled
IP output packet accounting is disabled
IP access violation accounting is disabled
TCP/IP header compression is disabled
RTP/IP header compression is disabled
Probe proxy name replies are disabled
Policy routing is disabled
Network address translation is disabled
WCCP Redirect outbound is disabled
WCCP Redirect inbound is disabled
WCCP Redirect exclude is disabled
BGP Policy Mapping is disabled
Sampled Netflow is disabled
IP multicast multilayer switching is disabled
Netflow Data Export (hardware) is enabled
Table 2-27 describes the fields that are shown in the example.
Table 2-27 show ip interface Field Descriptions
|
|
Ethernet0 is up |
If the interface hardware is usable, the interface is marked “up.” For an interface to be usable, both the interface hardware and line protocol must be up. |
line protocol is up |
If the interface can provide two-way communication, the line protocol is marked “up.” For an interface to be usable, both the interface hardware and line protocol must be up. |
Internet address and subnet mask |
IP address and subnet mask of the interface. |
Broadcast address |
Broadcast address. |
Address determined by... |
Status of how the IP address of the interface was determined. |
MTU |
MTU value that is set on the interface. |
Helper address |
Helper address, if one has been set. |
Secondary address |
Secondary address, if one has been set. |
Directed broadcast forwarding |
Status of directed broadcast forwarding. |
Multicast groups joined |
Multicast groups to which this interface belongs. |
Outgoing access list |
Status of whether the interface has an outgoing access list set. |
Inbound access list |
Status of whether the interface has an incoming access list set. |
Proxy ARP |
Status of whether Proxy Address Resolution Protocol (ARP) is enabled for the interface. |
Security level |
IP Security Option (IPSO) security level set for this interface. |
Split horizon |
Status of split horizon. |
ICMP redirects |
Status of the redirect messages on this interface. |
ICMP unreachables |
Status of the unreachable messages on this interface. |
ICMP mask replies |
Status of the mask replies on this interface. |
IP fast switching |
Status of whether fast switching has been enabled for this interface. Fast switching is typically enabled on serial interfaces, such as this one. |
IP SSE switching |
Status of the IP silicon switching engine (SSE). |
Router Discovery |
Status of the discovery process for this interface. It is typically disabled on serial interfaces. |
IP output packet accounting |
Status of IP accounting for this interface and the threshold (maximum number of entries). |
TCP/IP header compression |
Status of compression. |
Probe proxy name |
Status of whether the HP Probe proxy name replies are generated. |
WCCP Redirect outbound is enabled |
Status of whether packets that are received on an interface are redirected to a cache engine. |
WCCP Redirect exclude is disabled |
Status of whether packets that are targeted for an interface are excluded from being redirected to a cache engine. |
Netflow Data Export (hardware) is enabled |
NDE hardware flow status on the interface. |
show ip mfib
To display all active Multicast Forwarding Information Base (MFIB) routes, use the show ip mfib command.
show ip mfib [ all | counters | log [ n ]]
Syntax Description
all |
(Optional) Specifies all routes in the MFIB, including those routes that are used to accelerate fast switching but that are not necessarily in the upper-layer routing protocol table. |
counters |
(Optional) Specifies the counts of MFIB-related events. Only nonzero counters are shown. |
log |
(Optional) Specifies a log of the most recent number of MFIB-related events. The most recent event is first. |
n |
(Optional) Number of events. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(40)SG |
Support for command introduced on the Supervisor Engine 6-E and Catalyst 4900M chassis. |
Usage Guidelines
In the Supervisor Engine 6-E, Supervisor Engine 6L-E, Catalyst 4900M, Catalyst 4948E, and Catalyst 4948E-F, the output of the show ip mfib command does not display any hardware counters.
The MFIB table contains a set of IP multicast routes; each route in the MFIB table contains several flags that associate to the route.
The route flags indicate how a packet that matches a route is forwarded. For example, the IC flag on an MFIB route indicates that some process on the switch needs to receive a copy of the packet. These flags are associated with MFIB routes:
- Internal Copy (IC) flag—Set on a route when a process on the switch needs to receive a copy of all packets matching the specified route.
- Signaling (S) flag—Set on a route when a switch process needs notification that a packet matching the route is received. In the expected behavior, the protocol code updates the MFIB state in response to having received a packet on a signaling interface.
- Connected (C) flag—When set on a route, the C flag has the same meaning as the S flag, except that the C flag indicates that only packets sent by directly connected hosts to the route should be signaled to a protocol process.
A route can also have a set of flags associated with one or more interfaces. For an (S,G) route, the flags on interface 1 indicate how the ingress packets should be treated and whether packets matching the route should be forwarded onto interface 1. These per-interface flags are associated with the MFIB routes:
- Accepting (A)—Set on the RPF interface when a packet that arrives on the interface and that is marked as Accepting (A) is forwarded to all Forwarding (F) interfaces.
- Forwarding (F)—Used with the A flag as described above. The set of forwarding interfaces together form a multicast olist or output interface list.
- Signaling (S)—Set on an interface when a multicast routing protocol process in Cisco IOS needs to be notified of ingress packets on that interface.
- Not Platform (NP) fast-switched—Used with the F flag. A forwarding interface is also marked as Not Platform fast-switched whenever that output interface cannot be fast-switched by the platform hardware and requires software forwarding.
Examples
The following example shows how to display all active MFIB routes:
IP Multicast Forwarding Information Base
Entry Flags: C - Directly Connected, S - Signal,
Interface Flags: A - Accept, F - Forward, NS - Signal,
NP - Not platform switched
Packets: Fast/Partial/Slow Bytes: Fast/Partial/Slow:
(171.69.10.13, 224.0.1.40), flags (IC)
Packets: 2292/2292/0, Bytes: 518803/0/518803
(*, 224.0.1.60), flags ()
Packets: 2292/0/0, Bytes: 518803/0/0
(*, 224.0.1.75), flags ()
(10.34.2.92, 239.192.128.80), flags ()
Packets: 24579/100/0, 2113788/15000/0 bytes
(*, 239.193.100.70), flags ()
Packets: 1/0/0, 1500/0/0 bytes
show ip mfib fastdrop
To display all currently active fast-drop entries and to show whether fast drop is enabled, use the show ip mfib fastdrop command.
show ip mfib fastdrop
Syntax Description
This command has no arguments or keywords.
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display all currently active fast-drop entries and whether fast drop is enabled.
Switch# show ip mfib fasttdrop
MFIB fastdrop is enabled.
(10.0.0.1, 224.1.2.3, Vlan9) 00:01:32
(10.1.0.2, 224.1.2.3, Vlan9) 00:02:30
(1.2.3.4, 225.6.7.8, Vlan3) 00:01:50
show ip mroute
To display IP multicast routing table information, use the show ip mroute command.
show ip mroute [ interface_type slot / port | host_name | host_address [ source ] | active [ kbps | interface_type num ] | count | pruned | static | summary ]
Syntax Description
interface_type slot/port |
(Optional) Interface type and number of the slot and port; valid values for interface type are fastethernet , gigabitethernet , tengigabitethernet , null , and vlan. |
host_name |
(Optional) Name or IP address as defined in the DNS hosts table. |
host_address source |
(Optional) IP address or name of a multicast source. |
active |
(Optional) Displays the rate that active sources are sending to multicast groups. |
kbps interface_type num |
(Optional) Minimum rate at which active sources are sending to multicast groups; active sources sending at this rate or greater will be displayed. Valid values are from 1 to 4294967295 kbps. |
count |
(Optional) Displays the route and packet count information. |
pruned |
(Optional) Displays the pruned routes. |
static |
(Optional) Displays the static multicast routes. |
summary |
(Optional) Displays a one-line, abbreviated summary of each entry in the IP multicast routing table. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(8a)EW |
This command was introduced on the Catalyst 4500 series switch. |
12.2(25)EW |
Added support for the 10-Gigabit Ethernet interface. |
Usage Guidelines
If you omit all the optional arguments and keywords, the show ip mroute command displays all the entries in the IP multicast routing table.
The show ip mroute active kbps command displays all the sources sending at a rate greater than or equal to kbps .
The multicast routing table is populated by creating source, group (S,G) entries from star, group (*,G) entries. The star refers to all source addresses, the “S” refers to a single source address, and the “G” refers to the destination multicast group address. In creating (S,G) entries, the software uses the best path to that destination group found in the unicast routing table (through Reverse Path Forwarding (RPF).
Examples
The following example shows how to display all the entries in the IP multicast routing table:
IP Multicast Routing Table
Flags:D - Dense, S - Sparse, s - SSM Group, C - Connected, L - Local,
P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
J - Join SPT, M - MSDP created entry, X - Proxy Join Timer Running
A - Advertised via MSDP, U - URD, I - Received Source Specific Host
Outgoing interface flags:H - Hardware switched
Interface state:Interface, Next-Hop or VCD, State/Mode
(*, 230.13.13.1), 00:16:41/00:00:00, RP 10.15.1.20, flags:SJC
Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20
GigabitEthernet4/9, Forward/Sparse-Dense, 00:16:41/00:00:00, H
(*, 230.13.13.2), 00:16:41/00:00:00, RP 10.15.1.20, flags:SJC
Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20, RPF-MFD
GigabitEthernet4/9, Forward/Sparse-Dense, 00:16:41/00:00:00, H
(10.20.1.15, 230.13.13.1), 00:14:31/00:01:40, flags:CJT
Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20, RPF-MFD
GigabitEthernet4/9, Forward/Sparse-Dense, 00:14:31/00:00:00, H
(132.206.72.28, 224.2.136.89), 00:14:31/00:01:40, flags:CJT
Incoming interface:GigabitEthernet4/8, RPF nbr 10.15.1.20, RPF-MFD
Outgoing interface list:Null
The following example shows how to display the rate that the active sources are sending to the multicast groups and to display only the active sources that are sending at greater than the default rate:
Switch# show ip mroute active
Active IP Multicast Sources - sending > = 4 kbps
Group: 224.2.127.254, (sdr.cisco.com)
Source: 146.137.28.69 (mbone.ipd.anl.gov)
Rate: 1 pps/4 kbps(1sec), 4 kbps(last 1 secs), 4 kbps(life avg)
Group: 224.2.201.241, ACM 97
Source: 130.129.52.160 (webcast3-e1.acm97.interop.net)
Rate: 9 pps/93 kbps(1sec), 145 kbps(last 20 secs), 85 kbps(life avg)
Group: 224.2.207.215, ACM 97
Source: 130.129.52.160 (webcast3-e1.acm97.interop.net)
Rate: 3 pps/31 kbps(1sec), 63 kbps(last 19 secs), 65 kbps(life avg)
The following example shows how to display route and packet count information:
Switch# show ip mroute count
56 routes using 28552 bytes of memory
13 groups, 3.30 average sources per group
Forwarding Counts:Pkt Count/Pkts per second/Avg Pkt Size/Kilobits per second
Other counts:Total/RPF failed/Other drops(OIF-null, rate-limit etc)
Group:224.2.136.89, Source count:1, Group pkt count:29051
Source:132.206.72.28/32, Forwarding:29051/-278/1186/0, Other:85724/8/56665
The following example shows how to display summary information:
Switch# show ip mroute summary
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, s - SSM Group, C - Connected, L - Local,
P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
J - Join SPT, M - MSDP created entry, X - Proxy Join Timer Running
A - Advertised via MSDP, U - URD, I - Received Source Specific Host
Outgoing interface flags: H - Hardware switched
Interface state: Interface, Next-Hop or VCD, State/Mode
Table 2-28 describes the fields shown in the output.
Table 2-28 show ip mroute Field Descriptions
|
|
Flags: |
Information about the entry. |
D - Dense |
Entry is operating in dense mode. |
S - Sparse |
Entry is operating in sparse mode. |
s - SSM Group |
Entry is a member of an SSM group. |
C - Connected |
Member of the multicast group is present on the directly connected interface. |
L - Local |
Switch is a member of the multicast group. |
P - Pruned |
Route has been pruned. This information is retained in case a downstream member wants to join the source. |
R - Rp-bit set |
Status of the (S,G) entry; is the (S,G) entry pointing toward the RP. The R - Rp-bit set is typically a prune state along the shared tree for a particular source. |
F - Register flag |
Status of the software; indicates if the software is registered for a multicast source. |
T - SPT-bit set |
Status of the packets; indicates if the packets been received on the shortest path source tree. |
J - Join SPT |
For (*, G) entries, indicates that the rate of traffic flowing down the shared tree is exceeding the SPT-Threshold set for the group. (The default SPT-Threshold setting is 0 kbps.) When the J - Join SPT flag is set, the next (S,G) packet received down the shared tree triggers an (S,G) join in the direction of the source causing the switch to join the source tree. For (S, G) entries, indicates that the entry was created because the SPT-Threshold for the group was exceeded. When the J - Join SPT flag is set for (S,G) entries, the switch monitors the traffic rate on the source tree and attempts to switch back to the shared tree for this source if the traffic rate on the source tree falls below the group’s SPT-Threshold for more than one minute. The switch measures the traffic rate on the shared tree and compares the measured rate to the group’s SPT-Threshold once every second. If the traffic rate exceeds the SPT-Threshold, the J- Join SPT flag is set on the (*, G) entry until the next measurement of the traffic rate. The flag is cleared when the next packet arrives on the shared tree and a new measurement interval is started. If the default SPT-Threshold value of 0 Kbps is used for the group, the J- Join SPT flag is always set on (*, G) entries and is never cleared. When the default SPT-Threshold value is used, the switch immediately switches to the shortest-path tree when traffic from a new source is received. |
Outgoing interface flag: |
Information about the outgoing entry. |
H - Hardware switched |
Entry is hardware switched. |
Timer: |
Uptime/Expires. |
Interface state: |
Interface, Next-Hop or VCD, State/Mode. |
(*, 224.0.255.1) (198.92.37.100/32, 224.0.255.1) |
Entry in the IP multicast routing table. The entry consists of the IP address of the source switch followed by the IP address of the multicast group. An asterisk (*) in place of the source switch indicates all sources. Entries in the first format are referred to as (*,G) or “star comma G” entries. Entries in the second format are referred to as (S,G) or “S comma G” entries. (*,G) entries are used to build (S,G) entries. |
uptime |
How long (in hours, minutes, and seconds) the entry has been in the IP multicast routing table. |
expires |
How long (in hours, minutes, and seconds) until the entry is removed from the IP multicast routing table on the outgoing interface. |
RP |
Address of the RP switch. For switches and access servers operating in sparse mode, this address is always 0.0.0.0. |
flags: |
Information about the entry. |
Incoming interface |
Expected interface for a multicast packet from the source. If the packet is not received on this interface, it is discarded. |
RPF neighbor |
IP address of the upstream switch to the source. “Tunneling” indicates that this switch is sending data to the RP encapsulated in Register packets. The hexadecimal number in parentheses indicates to which RP it is registering. Each bit indicates a different RP if multiple RPs per group are used. |
DVMRP or Mroute |
Status of whether the RPF information is obtained from the DVMRP routing table or the static mroutes configuration. |
Outgoing interface list |
Interfaces through which packets are forwarded. When the ip pim nbma - mode command is enabled on the interface, the IP address of the PIM neighbor is also displayed. |
Ethernet0 |
Name and number of the outgoing interface. |
Next hop or VCD |
Next hop specifies downstream neighbor’s IP address. VCD specifies the virtual circuit descriptor number. VCD0 indicates that the group is using the static-map virtual circuit. |
Forward/Dense |
Status of the packets; indicates if they are they forwarded on the interface if there are no restrictions due to access lists or the TTL threshold. Following the slash (/), mode in which the interface is operating (dense or sparse). |
Forward/Sparse |
Sparse mode interface is in forward mode. |
time/time (uptime/expiration time) |
Per interface, how long (in hours, minutes, and seconds) the entry has been in the IP multicast routing table. Following the slash (/), how long (in hours, minutes, and seconds) until the entry is removed from the IP multicast routing table. |
Related Commands
|
|
ip multicast-routing (refer to Cisco IOS documentation) |
Enables IP multicast routing. |
ip pim (refer to Cisco IOS documentation) |
Enables Protocol Independent Multicast (PIM) on an interface. |
show ip source binding
To display IP source bindings that are configured on the system, use the show ip source binding EXEC command.
show ip source binding [ ip-address ] [ mac-address ] [ dhcp-snooping | static ] [ vlan vlan-id ] [ interface interface-name ]
Syntax Description
ip-address |
(Optional) Binding IP address. |
mac-address |
(Optional) Binding MAC address. |
dhcp-snooping |
(Optional) DHCP-snooping type binding. |
static |
(Optional) Statically configured binding. |
vlan vlan-id |
(Optional) VLAN number. |
interface interface-name |
(Optional) Binding interface. |
Command Default
Displays both static and DHCP snooping bindings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(19)EW |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
The optional parameters filter the display output result.
Examples
The following example shows how to display the IP source bindings:
Switch# show ip source binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
00:00:00:0A:00:0B 11.0.0.1 infinite static 10 FastEthernet6/10
The following example shows how to display the static IP binding entry of IP address 11.0.01:
Switch# show ip source binding 11.0.0.1 0000.000A.000B static vlan 10 interface Fa6/10
show ip source binding 11.0.0.1 0000.000A.000B static vlan 10 interface Fa6/10
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
00:00:00:0A:00:0B 11.0.0.1 infinite static 10 FastEthernet6/10 Switch#
show ip verify source
To display the IP source guard configuration and filters on a particular interface, use the show ip verify source command.
show ip verify source [ interface interface_num ]
Syntax Description
interface interface_num |
(Optional) Specifies an interface. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(19)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
These examples show how to display the IP source guard configuration and filters on a particular interface with the show ip verify source interface command:
- This output appears when DHCP snooping is enabled on VLANs 10–20, interface fa6/1 has IP source filter mode that is configured as IP, and an existing IP address binding 10.0.0.1 is on VLAN 10:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/1 ip active 10.0.0.1 10
fa6/1 ip active deny-all 11-20
Note
The second entry shows that a default PVACL (deny all IP traffic) is installed on the port for those snooping-enabled VLANs that do not have a valid IP source binding.
- This output appears when you enter the show ip verify source interface fa6/2 command and DHCP snooping is enabled on VLANs 10–20, interface fa6/1 has IP source filter mode that is configured as IP, and there is an existing IP address binding 10.0.0.1 on VLAN 10:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/2 ip inactive-trust-port
- This output appears when you enter the show ip verify source interface fa6/3 command and the interface fa6/3 does not have a VLAN enabled for DHCP snooping:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/3 ip inactive-no-snooping-vlan
- This output appears when you enter the show ip verify source interface fa6/4 command and the interface fa6/4 has an IP source filter mode that is configured as IP MAC and the existing IP MAC that binds 10.0.0.2/aaaa.bbbb.cccc on VLAN 10 and 11.0.0.1/aaaa.bbbb.cccd on VLAN 11:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/4 ip-mac active 10.0.0.2 aaaa.bbbb.cccc 10
fa6/4 ip-mac active 11.0.0.1 aaaa.bbbb.cccd 11
fa6/4 ip-mac active deny-all deny-all 12-20
- This output appears when you enter the show ip verify source interface fa6/5 command and the interface fa6/5 has IP source filter mode that is configured as IP MAC and existing IP MAC binding 10.0.0.3/aaaa.bbbb.ccce on VLAN 10, but port security is not enabled on fa6/5:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/5 ip-mac active 10.0.0.3 permit-all 10
fa6/5 ip-mac active deny-all permit-all 11-20
Note
Enable port security first because the DHCP security MAC filter cannot apply to the port or VLAN.
- This output appears when you enter the show ip verify source interface fa6/6 command and the interface fa6/6 does not have IP source filter mode that is configured:
DHCP security is not configured on the interface fa6/6.
The following example shows how to display all the interfaces on the switch that have DHCP snooping security and IP Port Security tracking enabled with the show ip verify source command.
The output is an accumulation of per-interface show CLIs:
Interface Filter-type Filter-mode IP-address Mac-address Vlan
--------- ----------- ----------- --------------- -------------- ---------
fa6/1 ip active 10.0.0.1 10
fa6/1 ip active deny-all 11-20
fa6/2 ip inactive-trust-port
Fa6/3 ip trk active 40.1.1.24 10
Fa6/3 ip trk active 40.1.1.20 10
Fa6/3 ip trk active 40.1.1.21 10
fa6/4 ip-mac active 10.0.0.2 aaaa.bbbb.cccc 10
fa6/4 ip-mac active 11.0.0.1 aaaa.bbbb.cccd 11
fa6/4 ip-mac active deny-all deny-all 12-20
fa6/5 ip-mac active 10.0.0.3 permit-all 10
fa6/5 ip-mac active deny-all permit-all 11-20
show ip wccp
To display the Web Cache Communication Protocol (WCCP) global configuration and statistics, use the show ip wccp command in user EXEC or privileged EXEC mode.
show ip wccp [ service-number [view | detail] | interfaces [ cef | counts | detail ] | web-cache ]
Syntax Description
service-number |
(Optional) Identification number of the web cache service group being controlled by the cache. The number can be from 0 to 254. For web caches using Cisco cache engines, the reverse proxy service is indicated by a value of 99. |
interfaces |
(Optional) WCCP redirect interfaces. |
cef |
(Optional) CEF interface statistics, including the number of input, output, dynamic, static, and multicast services. |
counts |
(Optional) WCCP interface count statistics, including the number of CEF and process-switched output and input packets redirected. |
detail |
(Optional) WCCP interface configuration statistics, including the number of input, output, dynamic, static, and multicast services. |
web-cache |
(Optional) Statistics for the web cache service. |
view |
(Optional) Other members of a particular service group, have or have not been detected. |
detail |
(Optional) Information about the router and all web caches. |
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
15.0(2)SG |
This command was introduced on Catalyst 4900M, Catalyst 4948E, Supervisor Engine 6-E, and Supervisor Engine 6L-E. |
Usage Guidelines
Use the clear ip wccp command to reset the counter for the “Packets Redirected” information.
Use the show ip wccp service-number command to get the “Total Packets S/W Redirected” count. The “Total Packets S/W Redirected” count is the number of packets redirected in software.
Use the show ip wccp service-number detail command to get the “Packets Redirected” count. The “Packets Redirected” count is the number of packets redirected in software.
Use the show ip wccp web-cache detail command to get an indication of which traffic is redirected to which cache engine.
Use the show ip wccp command to show the configured WCCP services and a summary of their current state.
For cache-engine clusters using Cisco cache engines, the reverse proxy service-number is indicated by a value of 99.
All the packet statistics correspond to packets switched in software.
Examples
This section contains examples and field descriptions for the following forms of this command:
- show ip wccp service-number
- show ip wccp service-number view
- show ip wccp service-number detail
- show ip wccp interfaces
- show ip wccp web-cache
- show ip wccp web-cache detail
- show ip wccp
show ip wccp service-number
The following is sample output from the show ip wccp service-number command:
Router Identifier: 100.1.1.16
Number of Service Group Clients: 1
Number of Service Group Routers: 1
Total Packets s/w Redirected: 0
Redirect Access-list: -none-
Total Packets Denied Redirect: 0
Total Packets Unassigned: 0
Group Access-list: -none-
Total Messages Denied to Group: 0
Total Authentication failures: 0
Total Bypassed Packets Received: 0
Table 29 describes the significant fields shown in the display.
Table 29 show ip wccp service-number Field Descriptions
|
|
Router information |
A list of routers detected by the current router. |
Protocol Version |
The version of WCCP being used by the router in the service group. |
Service Identifier |
Indicates which service is detailed. |
Number of Service Group Clients: |
The number of clients that are visible to the router and other clients in the service group. |
Number of Service Group Routers |
The number of routers in the service group. |
Total Packets s/w Redirected |
Total number of packets s/w redirected by the router. |
Redirect Access-list |
The name or number of the access list that determines which packets will be redirected. |
Total Packets Denied Redirect |
Total number of packets that were not redirected because they did not match the access list. |
Total Packets Unassigned |
Number of packets that were not redirected because they were not assigned to any cache engine. Packets may not be assigned during initial discovery of cache engines or when a cache is dropped from a cluster. |
Group Access-list |
Indicates which cache engine is allowed to connect to the router. |
Total Messages Denied to Group |
Indicates the number of packets denied by the group-list access list. |
Total Authentication failures |
The number of instances where a password did not match. |
Total Bypassed Packets Received |
The number of packets that have been bypassed. Process, fast, and Cisco Express Forwarding (CEF) are switching paths within Cisco IOS software. |
show ip wccp service-number view
The following is sample output from the show ip wccp service-number view command for service group 1:
Switch# show ip wccp 1 view
WCCP Cache Engines Visible
WCCP Cache Engines Not Visible:
Note
The number of maximum service groups that can be configured is 256.
If any web cache is displayed under the WCCP Cache Engines Not Visible field, the router needs to be reconfigured to map the web cache that is not visible to it.
Table 30 describes the significant fields shown in the display.
Table 30 show ip wccp service-number view Field Descriptions
|
|
WCCP Router Informed of |
A list of routers detected by the current router. |
WCCP Clients Visible |
A list of clients that are visible to the router and other clients in the service group. |
WCCP Clients Not Visible |
A list of clients in the service group that are not visible to the router and other clients in the service group. |
show ip wccp service-number detail
The following example displays WCCP client information and WCCP router statistics that include the type of services:
Switch# show ip wccp 91 detail
WCCP Client ID: 10.10.10.2
Mask SrcAddr DstAddr SrcPort DstPort
---- ------- ------- ------- -------
0000: 0x00000000 0x00000001 0x0000 0x0000
Value SrcAddr DstAddr SrcPort DstPort CE-IP
----- ------- ------- ------- ------- -----
0000: 0x00000000 0x00000000 0x0000 0x0000 0x0A0A0A02 (10.10.10.2)
0001: 0x00000000 0x00000001 0x0000 0x0000 0x0A0A0A02 (10.10.10.2)
show ip wccp interfaces
The following is sample output from the show ip wccp interfaces command:
Switch# show ip wccp interfaces
WCCP interface configuration:
Table 31 describes the significant fields shown in the display.
Table 31 show ip wccp interfaces Field Descriptions
|
|
Output services |
Indicates the number of output services configured on the interface. |
Input services |
Indicates the number of input services configured on the interface. |
Mcast services |
Indicates the number of multicast services configured on the interface. |
Exclude In |
Displays whether traffic on the interface is excluded from redirection. |
show ip wccp web-cache
The following is sample output from the show ip wccp web-cache command:
Switch# show ip wccp web-cache
Router Identifier: 10.10.11.10
Service Identifier: web-cache
Number of Service Group Clients: 1
Number of Service Group Routers: 1
Total Packets Redirected: 0
Redirect access-list: no_linux
Total Packets Denied Redirect: 0
Total Packets Unassigned: 0
Group access-list: -none-
Total Messages Denied to Group: 0
Total Authentication failures: 0
Total Bypassed Packets Received: 0
Table 32 describes the significant fields shown in the display.
Table 32 show ip wccp web-cache Field Descriptions
|
|
Protocol Version |
Indicates that WCCPv2 is enabled. |
Service Identifier |
Indicates which service is detailed. |
Number of Service Group Clients |
Number of clients using the router as their home router. |
Number of Service Group Routers |
The number of routers in the service group. |
Total Packets s/w Redirected |
Total number of packets s/w redirected by the router. |
Redirect access-list |
The name or number of the access list that determines which packets will be redirected. |
Total Packets Denied Redirect |
Total number of packets that were not redirected because they did not match the access list. |
Total Packets Unassigned |
Number of packets that were not redirected because they were not assigned to any cache engine. Packets may not be assigned during initial discovery of cache engines or when a cache is dropped from a cluster. |
Group access-list |
Indicates which cache engine is allowed to connect to the router. |
Total Messages Denied to Group |
Indicates the number of packets denied by the group-list access list. |
Total Authentication failures |
The number of instances where a password did not match. |
show ip wccp web-cache detail
The following example displays web cache engine information and WCCP router statistics for the web cache service:
Switch# show ip wccp web-cache detail
WCCP Client ID: 10.10.10.2
Mask SrcAddr DstAddr SrcPort DstPort
---- ------- ------- ------- -------
0000: 0x00000000 0x00000001 0x0000 0x0000
Value SrcAddr DstAddr SrcPort DstPort CE-IP
----- ------- ------- ------- ------- -----
0000: 0x00000000 0x00000000 0x0000 0x0000 0x0A0A0A02 (10.10.10.2)
0001: 0x00000000 0x00000001 0x0000 0x0000 0x0A0A0A02 (10.10.10.2)
Table 33 describes the significant fields shown in the display.
Table 33 show ip wccp web-cache detail Field Descriptions
|
|
WCCP Client Information |
The header for the area that contains fields for information on clients. |
WCCP Client ID |
The IP address of the cache engine in the service group. |
Protocol Version |
The version of WCCP being used by the cache engine in the service group. |
State |
Indicates whether the cache engine is operating properly and can be contacted by a router and other cache engines in the service group. |
Packets Redirected |
The number of packets that have been redirected to the cache engine. |
Connect Time |
The amount of time the cache engine has been connected to the router. |
show ip wccp
Router Identifier: 10.10.11.10
Service Identifier: web-cache
Number of Service Group Clients: 1
Number of Service Group Routers: 1
Total Packets s/w Redirected: 0
Redirect access-list: -none-
Total Packets Denied Redirect: 0
Total Packets Unassigned: 0
Group access-list: -none-
Total Messages Denied to Group: 0
Total Authentication failures: 0
Total Bypassed Packets Received: 0
Number of Service Group Clients: 1
Number of Service Group Routers: 1
Total Packets s/w Redirected: 0
Redirect access-list: -none-
Total Packets Denied Redirect: 0
Total Packets Unassigned: 0
Group access-list: -none-
Total Messages Denied to Group: 0
Total Authentication failures: 0
Total Bypassed Packets Received: 0
Related Commands
|
|
clear ip wccp |
Clears the counter for packets redirected using WCCP. |
ip wccp |
Enables support of the WCCP service for participation in a service group. |
ip wccp redirect |
Enables packet redirection on an outbound or inbound interface using WCCP. |
show ipc
To display IPC information, use the show ipc command.
show ipc { nodes | ports | queue | status }
Syntax Description
nodes |
Displays the participating nodes. |
ports |
Displays the local IPC ports. |
queue |
Displays the contents of the IPC retransmission queue. |
status |
Displays the status of the local IPC server. |
Command Default
This command has no default settings.
Command Modes
Privileged EXEC mode
Command History
|
|
12.1(12c)EW |
This command was introduced on the Catalyst 4500 series switch. |
Examples
The following example shows how to display the participating nodes:
There are 3 nodes in this IPC realm.
10000 Local IPC Master 0 0
2010000 Local GALIOS IPC:Card 1 0 0
2020000 Ethernet GALIOS IPC:Card 2 12 26
The following example shows how to display the local IPC ports:
There are 11 ports defined.
Port ID Type Name (current/peak/total)
10000.1 unicast IPC Master:Zone
10000.2 unicast IPC Master:Echo
10000.3 unicast IPC Master:Control
10000.4 unicast Remote TTY Server Port
10000.5 unicast GALIOS RF :Active
index = 0 seat_id = 0x2020000 last sent = 0 heard = 1635 0/1/1635
10000.6 unicast GALIOS RED:Active
index = 0 seat_id = 0x2020000 last sent = 0 heard = 2 0/1/2
2020000.3 unicast GALIOS IPC:Card 2:Control
2020000.4 unicast GALIOS RFS :Standby
2020000.5 unicast Slave: Remote TTY Client Port
2020000.6 unicast GALIOS RF :Standby
2020000.7 unicast GALIOS RED:Standby
RPC packets: current/peak/total
The following example shows how to display the contents of the IPC retransmission queue:
There are 0 IPC messages waiting for acknowledgement in the transmit queue.
There are 0 IPC messages waiting for a response.
There are 0 IPC messages waiting for additional fragments.
There are 0 IPC messages currently on the IPC inboundQ.
There are 0 messages currently in use by the system.
The following example shows how to display the status of the local IPC server:
This processor is the IPC master server.
6000 IPC message headers in cache
3363 messages in, 1680 out, 1660 delivered to local port,
1686 acknowledgements received, 1675 sent,
0 NACKS received, 0 sent,
0 messages dropped on input, 0 messages dropped on output
0 no local port, 0 destination unknown, 0 no transport
0 missing callback or queue, 0 duplicate ACKs, 0 retries,
0 ipc_output failures, 0 mtu failures,
0 msg alloc failed, 0 emer msg alloc failed, 0 no origs for RPC replies
0 pak alloc failed, 0 memd alloc failed
0 no hwq, 1 failed opens, 0 hardware errors
No regular dropping of IPC output packets for test purposes
show ipv6 dhcp-ldra
To display configuration details and statistics for a Lightweight DHCPv6 Relay Agent (LDRA), use the show ipv6 dhcp-ldra command in user EXEC or privileged EXEC mode.
show ipv6 ldra [ statistics ]
Syntax Description
statistics |
(Optional) Displays LDRA-related statistics. |
Command Modes
User EXEC (>)
Privileged EXEC (#)
Command History
|
|
Cisco IOS Release 15.2(5)E2 |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Use this command to view the number and type of DHCPv6 packets received or processed, the number and type of DHCPv6 messages dropped, error counters, and the interface state (client-facing trusted interface, server-facing interface, and so on).
You can also view LDRA configuration details, such as the type of LDRA configuration and the interface or VLAN where the LDRA is configured.
Examples
The following sample output displays LDRA configuration details. The fields in the example below are self-explanatory.
Device # show ipv6 dhcp-ldra
DHCPv6 LDRA policy: client-facing-disable
DHCPv6 LDRA policy: client-facing-trusted
DHCPv6 LDRA policy: client-facing-untrusted
DHCPv6 LDRA policy: server-facing
The following sample output displays LDRA configuration details after initiating a DHCP session. The fields in the example below are self-explanatory.
Device #
show ipv6 dhcp-ldra statistics
DHCPv6 LDRA client facing statistics.
DHCPv6 LDRA server facing statistics.
Related Commands
|
|
ipv6 dhcp-ldra |
Enables LDRA functionality on an access node. |
ipv6 dhcp ldra attach-policy (VLAN) |
Enables LDRA functionality on a VLAN. |
ipv6 dhcp-ldra attach-policy |
Enables LDRA functionality on an interface. |
show ipv6 snooping counters
To display the number of packets dropped per port due to RA Guard, use the show ipv6 snooping counters interface command.
show ipv6 snooping counters interface
Syntax Description
interface |
Specifies the interface. |
Command Modes
Interface mode
Command History
|
|
12.2(54)SG |
The show ipv6 first-hop counters command was introduced on the Catalyst 4500 series switch. |
15.0(2)SG, XE 3.3.0SG |
Same behavior, new syntax; show ipv6 snooping counters |
Examples
This example provides a sample output for the show ipv6 snooping counters command on interface Gi2/49:
Switch# show ipv6 snooping counters int gi 2/48
Received messages on Gi2/48:
Protocol Protocol message
ICMPv6 RS RA NS NA REDIR CPS CPA
Bridged messages from Gi2/48:
Protocol Protocol message
ICMPv6 RS RA NS NA REDIR CPS CPA
Dropped messages on Gi2/48:
Feature/Message RS RA NS NA REDIR CPS CPA
Dropped reasons on Gi2/48:
Note
Only RA (Router Advertisement) and REDIR (Router Redirected packets) counters are supported in Cisco IOS Release 12.2(54)SG.
show ipv6 mld snooping
To display IP version 6 (IPv6) Multicast Listener Discovery (MLD) snooping configuration of the switch or the VLAN, use the show ipv6 mld snooping command.
show ipv6 mld snooping [ vlan vlan-id ]
Syntax Description
vlan vlan-id |
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094. |
Command Modes
User EXEC mode
Command History
|
|
12.2(40)SG |
This command was introduced on the Catalyst 4500. |
Usage Guidelines
Use this command to display MLD snooping configuration for the switch or for a specific VLAN.
VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in MLD snooping.
Examples
This is an example of output from the show ipv6 mld snooping vlan command. It shows snooping characteristics for a specific VLAN.
Switch> show ipv6 mld snooping vlan 100
Global MLD Snooping configuration:
-------------------------------------------
MLDv2 snooping (minimal) : Enabled
Listener message suppression : Enabled
TCN solicit query : Disabled
TCN flood query count : 2
Last listener query count : 2
Last listener query interval : 1000
MLDv1 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
Last listener query count : 2
Last listener query interval : 1000
This is an example of output from the show ipv6 mld snooping command. It displays snooping characteristics for all VLANs on the switch.
Switch
>
show ipv6 mld snooping
Global MLD Snooping configuration:
-------------------------------------------
MLDv2 snooping (minimal) : Enabled
Listener message suppression : Enabled
TCN solicit query : Disabled
TCN flood query count : 2
Last listener query count : 2
Last listener query interval : 1000
MLDv1 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
Last listener query count : 2
Last listener query interval : 1000
MLDv1 immediate leave : Disabled
Explicit host tracking : Enabled
Multicast router learning mode : pim-dvmrp
Last listener query count : 2
Last listener query interval : 1000
Related Commands
|
|
ipv6 mld snooping |
Enables IP version 6 (IPv6) Multicast Listener Discovery (MLD) snooping globally or on the specified VLAN. |
show ipv6 mld snooping mrouter
To display dynamically learned and manually configured IP version 6 (IPv6) Multicast Listener Discovery (MLD) switch ports for the switch or a VLAN, use the show ipv6 mld snooping mrouter command.
show ipv6 mld snooping mrouter [ vlan vlan-id ]
Syntax Description
vlan vlan-id |
(Optional) Specifies a VLAN; the range is 1 to 1001 and 1006 to 4094. |
Command Modes
User EXEC mode
Command History
|
|
12.2(40)SG |
This command was introduced on Catalyst 4500. |
Usage Guidelines
Use this command to display MLD snooping switch ports for the switch or for a specific VLAN.
VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in MLD snooping.
Examples
This is an example of output from the show ipv6 mld snooping mrouter command. It displays snooping characteristics for all VLANs on the switch that are participating in MLD snooping.
Switch> show ipv6 mld snooping mrouter
This is an example of output from the show ipv6 mld snooping mrouter vlan command. It shows multicast switch ports for a specific VLAN.
Switch> show ipv6 mld snooping mrouter vlan 100
Related Commands
|
|
ipv6 mld snooping |
Enables IP version 6 (IPv6) Multicast Listener Discovery (MLD) snooping globally or on the specified VLAN. |
ipv6 mld snooping vlan |
Configures IP version 6 (IPv6) Multicast Listener Discovery (MLD) snooping parameters on the VLAN interface. |
show ipv6 mld snooping querier
To display IP version 6 (IPv6) Multicast Listener Discovery (MLD) snooping querier-related information most recently received by the switch or the VLAN, use the show ipv6 mld snooping querier command.
show ipv6 mld snooping querier [ vlan vlan-id ]
Syntax Description
vlan vlan-id |
(Optional) Specifiesa VLAN; the range is 1 to 1001 and 1006 to 4094. |
Command Modes
User EXEC mode
Command History
|
|
12.2(40)SG |
This command was introduced on the Catalyst 4500. |
Usage Guidelines
Use the show ipv6 mld snooping querier command to display the MLD version and IPv6 address of a detected device that sends MLD query messages, which is also called a querier. A subnet can have multiple multicast switches but has only one MLD querier. The querier can be a Layer 3 switch.
The show ipv6 mld snooping querier command output also shows the VLAN and interface on which the querier was detected. If the querier is the switch, the output shows the Port field as Router. If the querier is a router, the output shows the port number on which the querier is learned in the Port field.
The output of the show ipv6 mld snoop querier vlan command displays the information received in response to a query message from an external or internal querier. It does not display user-configured VLAN values, such as the snooping robustness variable on the particular VLAN. This querier information is used only on the MASQ message that is sent by the switch. It does not override the user-configured robustness variable that is used for aging out a member that does not respond to query messages.
VLAN numbers 1002 through 1005 are reserved for Token Ring and FDDI VLANs and cannot be used in MLD snooping.
Examples
This is an example of output from the show ipv6 mld snooping querier command:
Switch> show ipv6 mld snooping querier
Vlan IP Address MLD Version Port
-------------------------------------------------------------
2 FE80::201:C9FF:FE40:6000 v1 Gi3/0/1
This is an example of output from the show ipv6 mld snooping querier vlan command:
Switch> show ipv6 mld snooping querier vlan 2
IP address : FE80::201:C9FF:FE40:6000
Max response time : 1000s
show issu capability
To display the ISSU capability for a client, use the show issu capability command.
show issu capability { entries | groups | types } [ client_id ]
Syntax Description
entries |
Displays a list of Capability Types and Dependent Capability Types that are included in a single Capability Entry. Types within an entry can also be independent. |
groups |
Displays a list of Capability Entries in priority order (the order that they will be negotiated on a session). |
types |
Displays an ID that identifies a particular capability. |
client_id |
(Optional) Identifies the client registered to the ISSU infrastructure. To obtain a list of client IDs, use the show issu clients command. |
Command Default
This command has no default settings.
Command Modes
User EXEC mode
Command History
|
|
12.2(31)SGA |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
Capability is a functionality that an ISSU client can support and is required to interoperate with peers.
When an ISSU-aware client establishes its session with the peer, an ISSU negotiation takes place. The ISSU infrastructure uses the registered information to negotiate the capabilities and the message version to be used during the session.
Examples
The following example shows how to display the ISSU capability types for the IP host ISSU client (clientid=2082):
Switch# show issu capability types 2082
Client_ID = 2082, Entity_ID = 1 :
The following example shows how to display the ISSU capabilities entries for the IP host ISSU client (clientid=2082):
Switch# show issu capability entries 2082
Client_ID = 2082, Entity_ID = 1 :
The following example shows how to display the ISSU capabilities groups for the IP host ISSU client (clientid=2082):
Switch# show issu capability groups 2082
Client_ID = 2082, Entity_ID = 1 :
show issu clients
To display the ISSU clients, use the show issu clients command.
show issu clients [ peer_uid ]
Syntax Description
peer_uid |
(Optional) Displays a list of clients registered to ISSU infrastructure at the peer supervisor engine. |
Command Default
Displays a list of clients registered to the ISSU infrastructure at the supervisor engine where the command is entered.
Command Modes
User EXEC mode
Command History
|
|
12.2(31)SGA |
This command was introduced on the Catalyst 4500 series switch. |
Usage Guidelines
To implement ISSU versioning functionality, a client must first register itself, client capability, and client message information with the ISSU infrastructure during the system initialization.
Examples
The following example shows how to display the ISSU clients:
Switch# show issu clients
Client_ID = 2, Client_Name = ISSU Proto client, Entity_Count = 1
Client_ID = 3, Client_Name = ISSU RF, Entity_Count = 1
Client_ID = 4, Client_Name = ISSU CF client, Entity_Count = 1
Client_ID = 5, Client_Name = ISSU Network RF client, Entity_Count = 1
Client_ID = 7, Client_Name = ISSU CONFIG SYNC, Entity_Count = 1
Client_ID = 8, Client_Name = ISSU ifIndex sync, Entity_Count = 1
Client_ID = 9, Client_Name = ISSU IPC client, Entity_Count = 1
Client_ID = 10, Client_Name = ISSU IPC Server client, Entity_Count = 1
Client_ID = 11, Client_Name = ISSU Red Mode Client, Entity_Count = 1
Client_ID = 100, Client_Name = ISSU rfs client, Entity_Count = 1
Client_ID = 110, Client_Name = ISSU ifs client, Entity_Count = 1
Client_ID = 200, Client_Name = ISSU Event Manager client, Entity_Count = 1
Client_ID = 2002, Client_Name = CEF Push ISSU client, Entity_Count = 1
Client_ID = 2003, Client_Name = ISSU XDR client, Entity_Count = 1
Client_ID = 2004, Client_Name = ISSU SNMP client, Entity_Count = 1
Client_ID = 2010, Client_Name = ARP HA, Entity_Count = 1
Client_ID = 2012, Client_Name = ISSU HSRP Client, Entity_Count = 1
Client_ID = 2021, Client_Name = XDR Int Priority ISSU client, Entity_Count = 1
Client_ID = 2022, Client_Name = XDR Proc Priority ISSU client, Entity_Count = 1
Client_ID = 2023, Client_Name = FIB HWIDB ISSU client, Entity_Count = 1
Client_ID = 2024, Client_Name = FIB IDB ISSU client, Entity_Count = 1
Client_ID = 2025, Client_Name = FIB HW subblock ISSU client, Entity_Count = 1
Client_ID = 2026, Client_Name = FIB SW subblock ISSU client, Entity_Count = 1
Client_ID = 2027, Client_Name = Adjacency ISSU client, Entity_Count = 1
Client_ID = 2028, Client_Name = FIB IPV4 ISSU client, Entity_Count = 1
Client_ID = 2054, Client_Name = ISSU process client, Entity_Count = 1
Client_ID = 2058, Client_Name = ISIS ISSU RTR client, Entity_Count = 1
Client_ID = 2059, Client_Name = ISIS ISSU UPD client, Entity_Count = 1
Client_ID = 2067, Client_Name = ISSU PM Client, Entity_Count = 1
Client_ID = 2068, Client_Name = ISSU PAGP_SWITCH Client, Entity_Count = 1
Client_ID = 2070, Client_Name = ISSU Port Security client, Entity_Count = 1
Client_ID = 2071, Client_Name = ISSU Switch VLAN client, Entity_Count = 1