Cisco MDS 9000 Family Command Reference, Release 3.x
C Commands

Table Of Contents

C Commands

callhome

callhome test

cd

cdp

cfs distribute

cfs ipv4 distribute

cfs ipv4 mcast-address

cfs ipv6 distribute

cfs ipv6 mcast-address

cfs region

cfs static-peers

channel mode active

channel-group

cimserver

cimserver clearcertificate

cimserver loglevel

class

clear accounting log

clear arp-cache

clear callhome session

clear cdp

clear cores

clear counters (EXEC mode)

clear counters (SAN extension N port configuration mode)

clear crypto ike domain ipsec sa

clear crypto sa domain ipsec

clear debug-logfile

clear device-alias

clear dpvm

clear fabric-binding statistics

clear fcanalyzer

clear fcflow stats

clear fcns statistics

clear fcs statistics

clear fctimer session

clear fc-redirect config vt

clear fc-redirect decommission-switch

clear ficon

clear fspf counters

clear install failure-reason

clear ip access-list counters

clear ips arp

clear ips stats

clear ips stats fabric interface

clear ipv6 access-list

clear ipv6 neighbors

clear islb session

clear ivr fcdomain database

clear ivr service-group database

clear ivr zone database

clear license

clear line

clear logging

clear ntp

clear port-security

clear processes log

clear qos statistics

clear radius session

clear rlir

clear rmon alarms

clear rmon all-alarms

clear rmon hcalarms

clear rmon log

clear role session

clear rscn session vsan

clear rscn statistics

clear santap module

clear ssm-nvram santap module

clear scheduler logfile

clear screen

clear scsi-flow statistics

clear sdv

clear snmp hostconfig

clear ssh hosts

clear system reset-reason

clear tacacs+ session

clear tlport alpa-cache

clear user

clear vrrp

clear zone

cli alias name

cli var name (EXEC)

cli var name (configuration)

clock

clock set

cloud discover

cloud discovery

cloud-discovery enable

cluster

code-page

commit

contract-id

configure terminal

copy

copy licenses

copy ssm-nvram standby-sup

counter

crypto ca authenticate

crypto ca crl request

crypto ca enroll

crypto ca export

crypto ca import

crypto ca test verify

crypto ca trustpoint

crypto global domain ipsec security-association lifetime

crypto ike domain ipsec

crypto ike domain ipsec rekey sa

crypto ike enable

crypto ipsec enable

crypto key generate rsa

crypto key zeroize rsa

crypto map domain ipsec (configuration mode)

crypto map domain ipsec (interface configuration submode)

crypto transform-set domain ipsec

customer-id


C Commands


The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. See "About the CLI Command Modes" section on page 1-3 to determine the appropriate mode for each command. For more information, refer to the Cisco MDS 9000 Family CLI Configuration Guide.

callhome

To configure the Call Home function, use the callhome command.

callhome

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled.

Command Modes

Configuration mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

The Call Home configuration commands are available in the (config-callhome) submode.

A Call Home message is used to contact a support person or organization in case an urgent alarm is raised.

Once you have configured the contact information, you must enable the Call Home function. The enable command is required for the Call Home function to start operating. When you disable the Call Home function, all input events are ignored.


Note Even if Call Home is disabled, basic information for each Call Home event is sent to syslog.


The user-def-cmd command allows you to define a command whose outputs should be attached to the callhome message being sent. Only show commands can be specified and they must be associated with an alert group. Five commands can be specified per alert group. Invalid commands are rejected.


Note Customized show commands are only supported for full text and XML alert groups. Short text alert groups (short-txt-destination) do not support customized show commands because they only allow 128 bytes of text.


To assign show commands to be executed when an alert is sent, you must associate the commands with the alert group. When an alert is sent, Call Home associates the alert group with an alert type and attaches the output of the show commands to the alert message.


Note Make sure the destination profiles for the non-Cisco-TAC alert group, with a predefined show command, and the Cisco-TAC alert group are not the same.


The following example assigns contact information.

switch# config terminal
config terminal
switch# snmp-server contact personname@companyname.com 
switch(config)# callhome
switch(config-callhome)# email-contact username@company.com
switch(config-callhome)# phone-contact +1-800-123-4567
switch(config-callhome)# streetaddress 1234 Picaboo Street, Any city, Any state, 12345
switch(config-callhome)# switch-priority 0
switch(config-callhome)# customer-id Customer1234 
switch(config-callhome)# site-id Site1ManhattanNY
switch(config-callhome)# contract-id Company1234 

The following example configures a user-defined show command for an alert-group license:

switch(config-callhome)# alert-group license user-def-cmd "show license usage"

Note The show command must be enclosed in double quotes.


The following example removes a user-defined show command for an alert-group license:

switch(config-callhome)# no alert-group license user-def-cmd "show license usage"

Related Commands

Command
Description

alert-group

Customizes a CallHome alert group with user-defined show commands.

callhome test

Sends a dummy test message to the configured destination(s).

show callhome

Displays configured Call Home information.


callhome test

To simulate a CallHome message generation, use the callhome test command.

callhome test [inventory]

Syntax Description

inventory

Sends a dummy CallHome inventory.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

You can simulate a message generation by issuing a callhome test command.

Examples

The following example sends a test message to the configured destination(s):

switch# callhome test
trying to send test callhome message
successfully sent test callhome message

The following example sends a test inventory message to the configured destination(s)

switch# callhome test inventory
trying to send test callhome message
successfully sent test callhome message

Related Commands

Command
Description

callhome

Configures Call Home functions.

show callhome

Displays configured Call Home information.


cd

To change the default directory or file system, use the cd command.

cd {directory | bootflash:[directory] | slot0:[directory] | volatile:[directory]}

Syntax Description

directory

Name of the directory on the file system.

bootflash:

URI or alias of the bootflash or file system.

slot0:

URI or alias of the slot0 file system.

volatile:

URI or alias of the volatile file system.


Defaults

The initial default file system is flash:. For platforms that do not have a physical device named flash:, the keyword flash: is aliased to the default Flash device.

If you do not specify a directory on a file system, the default is the root directory on that file system.

Command Modes

EXEC mode

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

For all EXEC commands that have an optional file system argument, the system uses the file system specified by the cd command when you omit the optional file system argument. For example, the dir command, which displays a list of files on a file system, contains an optional file system argument. When you omit this argument, the system lists the files on the file system specified by the cd command.

Examples

The following example sets the default file system to the Flash memory card inserted in slot 0:

switch# pwd 
bootflash:/
switch# cd slot0: 
switch# pwd 
slot0:/

Related Commands

Command
Description

copy

Copies any file from a source to a destination.

delete

Deletes a file on a Flash memory device.

dir

Displays a list of files on a file system.

pwd

Displays the current setting of the cd command.

show file systems

Lists available file systems and their alias prefix names.

undelete

Recovers a file marked deleted on a Class A or Class B Flash file system.


cdp

Use the cdp command to globally configure the Cisco Discovery Protocol parameters. Use the no form of this command to revert to factory defaults.

cdp {enable | advertise {v1 | v2} | holdtime holdtime-seconds | timer timer-seconds}

no cdp {enable | advertise | holdtime holdtime-seconds | timer timer-seconds}

Syntax Description

enable

Enables CDP globally on all interfaces on the switch.

advertise

Specifies the EXEC command to be executed.

v1

Specifies CDP version 1.

v2

Specifies CDP version 2.

holdtime

Sets the hold time advertised in CDP packets.

holdtime-seconds

Specifies the holdtime in seconds. The default is 180 seconds and the valid range is from 10 to 255 seconds.

timer

Sets the refresh time interval.

timer-seconds

Specifies the time interval in seconds. The default is 60 seconds and the valid range is from 5 to 255 seconds.


Defaults

CDP is enabled.

The hold time default interval is 180 seconds.

The refresh time interval is 60 seconds.

Command Modes

Configuration mode.

Command History

Release
Modification

1.1(1)

This command was introduced.


Usage Guidelines

Use the cdp enable command to enable the Cisco Discovery Protocol (CDP) feature at the switch level or at the interface level. Use the no form of this command to disable this feature. When the interface link is established, CDP is enabled by default

CDP version 1 (v1) and version 2 (v2) are supported in Cisco MDS 9000 Family switches. CDP packets with any other version number are silently discarded when received.

Examples

The following example disables the CDP protocol on the switch. When CDP is disabled on an interface, one packet is sent to clear out the switch state with each of the receiving devices.

switch(config)# no cdp enable
Operation in progress. Please check global parameters
switch(config-console)# 	
The following example enables (default) the CDP protocol on the switch. When CDP is 
enabled on an interface, one packet is sent immediately. Subsequent packets are sent at 
the configured refresh time
switch(config)# cdp enable
Operation in progress. Please check global parameters
switch(config)# 

The following example configures the Gigabit Ethernet interface 8/8 and disables the CDP protocol on this interface. When CDP is disabled on an interface, one packet is sent to clear out the switch state with each of the receiving devices.

switch(config)# interface gigbitethernet 8/8
switch(config-if)# no cdp enable
Operation in progress. Please check interface parameters
switch(config-console)# 	

The following example enables (default) the CDP protocol on the selected interface. When CDP is enabled on this interface, one packet is sent immediately. Subsequent packets are sent at the configured refresh time.

switch(config-if)# cdp enable
Operation in progress. Please check interface parameters
switch(config)# 

The following example globally configures the refresh time interval for the CDP protocol in seconds. The default is 60 seconds and the valid range is from 5 to 255 seconds.

switch# config terminal
switch(config)# cdp timer 100
switch(config)# 	

The following example globally configures the hold time advertised in CDP packet in seconds. The default is 180 seconds and the valid range is from 10 to 255 seconds.

switch# config terminal
switch(config)# cdp holdtime 200
switch(config)# 	

The following example globally configures the CDP version. The default is version 2 (v2). The valid options are v1 and v2

switch# config terminal
switch(config)# cdp advertise v1
switch(config)# 

Related Commands

Command
Description

clear cdp

Clears global or interface-specific CDP configurations.

show cdp

Displays configured CDP settings and parameters.


cfs distribute

To enable or disable Cisco Fabric Services (CFS) distribution on the switch, use the cfs distribute command in configuration mode. To disable this feature, use the no form of the command.

cfs distribute

no cfs distribute

Syntax Description

This command has no other arguments or keywords.

Defaults

CFS distribution is enabled.

Command Modes

Configuration mode.

Command History

Release
Modification

2.1(1a)

This command was introduced.


Usage Guidelines

By default CFS is in the distribute mode. In the distribute mode, fabric wide distribution is enabled. Applications can distribute data/configuration to all CFS-capable switches in the fabric where the application exists. This is the normal mode of operation.

If CFS distribution is disabled, using the no cfs distribute command causes the following to occurs:

CFS and the applications using CFS on the switch are isolated from the rest of the fabric even though there is physical connectivity.

All CFS operations are restricted to the isolated switch.

All the CFS commands continue to work similar to the case of a physically isolated switch.

Other CFS operations (for example, lock, commit, and abort) initiated at other switches do not have any effect at the isolated switch.

CFS distribution is disabled over both Fibre Channel and IP.

Examples

The following example shows how to disable CFS distribution.

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# no cfs distribute

The following example shows how to reenable CFS distribution.

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# cfs distribute

Related Commands

Command
Description

show cfs status

Displays whether CFS distribution is enabled or disabled.


cfs ipv4 distribute

To enable Cisco Fabric Services (CFS) distribution over IPv4 for applications that want to use this feature, use the cfs ipv4 command in configuration mode. To disable this feature, use the no form of the command.

cfs ipv4 distribute

no cfs ipv4 distribute

Syntax Description

This command has no arguments or keywords.

Defaults

CFS distribution is enabled.

CFS over IP is disabled.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

All CFS over IP enabled switches with similar multicast addresses form one CFS over IP fabric. CFS protocol specific distributions, such as the keep-alive mechanism for detecting network topology changes, use the IP multicast address to send and receive information.

Observe the following guidelines when using this command:

If a switch is reachable over both IP and Fibre Channel, application data will be distributed over Fibre Channel.

You can select either an IPv4 or IPv6 distribution when CFS is enabled over IP.

Both IPv4 and IPv6 distribution cannot be enabled on the same switch.

A switch that has IPv4 distribution enabled cannot detect a switch that IPv6 distribution enabled. The switches behave as if they are in two different fabrics even though they are connected to each other.

Examples

The following example shows how to disable CFS IPv4 distribution:

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# no cfs ipv4 distribute
This will prevent CFS from distributing over IPv4 network.
Are you sure? (y/n)  [n] 

The following example shows how to reenable CFS IPv4 distribution.

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# cfs ipv4 distribute

Related Commands

Command
Description

cfs ipv4 mcast-address

Configures an IPv4 multicast address for Cisco Fabric Services (CFS) distribution over IPv4.

show cfs status

Displays whether CFS distribution is enabled or disabled.


cfs ipv4 mcast-address

To configure an IPv4 multicast address for Cisco Fabric Services (CFS) distribution over IPv4, use the cfs ipv4 mcast-address command in configuration mode. To disable this feature, use the no form of the command.

cfs ipv4 mcast-address ipv4-address

no cfs ipv4 mcast-address ipv4-address

Syntax Description

ipv4-address

Specifies an IPv4 multicast address for CFS distribution over IPv4. The range of valid IPv4 addresses is 239.255.0.0 through 239.255.255.255, and 239.192.0.0 through 239.251.251.251.


Defaults

Multicast address: 239.255.70.83.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

Before using this command, enable CFS distribution over IPv4 using the cfs ipv4 distribute command.

All CFS over IP enabled switches with similar multicast addresses form one CFS over IP fabric. CFS protocol specific distributions, such as the keep-alive mechanism for detecting network topology changes, use the IP multicast address to send and receive information.


Note CFS distributions for application data use directed unicast.


You can configure a value for a CFS over IP multicast address. The default IPv4 multicast address is 239.255.70.83.

Examples

The following example shows how to configure an IP multicast address for CFS over IPv4.

switch# config t
switch(config)# cfs ipv4 mcast-address 239.255.1.1
Distribution over this IP type will be affected
Change multicast address for CFS-IP ?
Are you sure? (y/n) [n] y

The following example shows how to revert to the default IPv4 multicast address for CFS distribution over IPv4. The default IPv4 multicast address for CFS is 239.255.70.83.

switch(config)# no cfs ipv4 mcast-address 10.1.10.100
Distribution over this IP type will be affected

Change multicast address for CFS-IP ?

Are you sure? (y/n) [n] y

Related Commands

Command
Description

cfs ipv4 distribute

Enables or disables Cisco Fabric Services (CFS) distribution over IPv4.

show cfs status

Displays whether CFS distribution is enabled or disabled.


cfs ipv6 distribute

To enable Cisco Fabric Services (CFS) distribution over IPv6 for applications that want to use this feature, use the cfs ipv6 distribute command in configuration mode. To disable this feature, use the no form of the command.

cfs ipv6 distribute

no cfs ipv6 distribute

Syntax Description

This command has no arguments or keywords.

Defaults

CFS distribution is enabled.

CFS over IP is disabled.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

All CFS over IP enabled switches with similar multicast addresses form one CFS over IP fabric. CFS protocol specific distributions, such as the keep-alive mechanism for detecting network topology changes, use the IP multicast address to send and receive information.

Observe the following guidelines when using this command:

If a switch is reachable over both IP and Fibre Channel, application data will be distributed over Fibre Channel.

You can select either an IPv4 or IPv6 distribution when CFS is enabled over IP.

Both IPv4 and IPv6 distribution cannot be enabled on the same switch.

A switch that has IPv4 distribution enabled cannot detect a switch that IPv6 distribution enabled. The switches behave as if they are in two different fabrics even though they are connected to each other.

Examples

The following example shows how to disable CFS IPv6 distribution:

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# no cfs ipv6 distribute
This will prevent CFS from distributing over IPv6 network.
Are you sure? (y/n)  [n] 

The following example shows how to reenable CFS IPv6 distribution.

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# cfs ipv6 distribute

Related Commands

Command
Description

cfs ipv6 mcast-address

Configures an IPv6 multicast address for Cisco Fabric Services (CFS) distribution over IPv6.

show cfs status

Displays whether CFS distribution is enabled or disabled.


cfs ipv6 mcast-address

To configure an IPv6 multicast address for Cisco Fabric Services (CFS) distribution over IPv6, use the cfs ipv6 mcast-address command in configuration mode. To disable this feature, use the no form of the command.

cfs ipv6 mcast-address ipv6-address

no cfs ipv6 mcast-address ipv6-address

Syntax Description

ipv6-address

Specifies an IPv6 multicast address or CFS distribution over IPv6. The IPv6 Admin scope range is [ff15::/16, ff18::/16].


Defaults

Multicast address: ff15::efff:4653.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

Before using this command, enable CFS distribution over IPv6 using the cfs ipv6 distribute command.

All CFS over IP enabled switches with similar multicast addresses form one CFS over IP fabric. CFS protocol specific distributions, such as the keep-alive mechanism for detecting network topology changes, use the IP multicast address to send and receive information.


Note CFS distributions for application data use directed unicast.


You can configure a CFS over IP multicast address value for IPv6. The default IPv6 multicast address is ff15::efff:4653. Examples of the IPv6 Admin scope range are ff15::0000:0000 to ff15::ffff:ffff and ff18::0000:0000 to ff18::ffff:ffff.

Examples

The following example shows how to configure an IP multicast address for CFS over IPv6.

switch# config t
switch(config)# cfs ipv6 mcast-address ff13::e244:4754
Distribution over this IP type will be affected
Change multicast address for CFS-IP ?
Are you sure? (y/n) [n] y

The following example shows how to revert to the default IPv6 multicast address for CFS distribution over IPv6. The default IPv6 multicast address for CFS is ff13:7743:4653.

switch(config)# no cfs ipv6 ff13::e244:4754
Distribution over this IP type will be affected
Change multicast address for CFS-IP ?
Are you sure? (y/n) [n] y

Related Commands

Command
Description

cfs ipv6 distribute

Enables or disables Cisco Fabric Services (CFS) distribution over IPv6.

show cfs status

Displays whether CFS distribution is enabled or disabled.


cfs region

To create a region that restricts the scope of application distribution to the selected switches, use the cfs region command in the configuration mode. To disable this feature, use the no form of this command.

cfs region region-id

no cfs region region-id

Syntax Description

region-id

Assigns an application to a region. A total of 200 regions are supported.


Defaults

None.

Configuration mode.

Command History

Release
Modification

3.2(1)

This command was introduced.


Usage Guidelines

An application can only be a part of one region on a given switch. By creating the region ID and assigning it to an application, the application distribution is restricted to switches with a similar region ID.

Cisco Fabric Services (CFS) regions provide the ability to create distribution islands within the application scope. Currently, the regions are supported only for physical scope applications. In the absence of any region configuration, the application will be a part of the default region. The default region is region ID 0. This command provides backward compatibility with the earlier release where regions were not supported. If applications are assigned to a region, the configuration check will prevent the downgrade. Fabric Manager supports CFS regions.

Examples

The following example shows how to create a region ID:

switch# config
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# cfs region 1

The following example shows how to assign an application to a region.

switch# cfs region 1
switch# config
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# cfs region 1
switch(config-cfs-region)# ntp

Note The applications assigned to a region have to be registered with CFS.



The following example shows how to remove an application assigned to a region.

switch# cfs region 1
switch# config
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# cfs region 1
switch(config-cfs-region)# no ntp

The following example shows how to remove all the applications from a region.

switch(config)# no cfs region 1
WARNING: All applications in the region wiil be  moved to default region.
Are you sure? (y/n)  [n] y

Related Commands

Command
Description

show cfs regions

Displays all configured applications with peers.


cfs static-peers

To enable static peers interface, use the cfs static-peers command. To disable this feature, use the no form of the command.

cfs static-peers

no cfs static-peers

Syntax Description

This command has no arguments or keywords.

Defaults

Enabled.

Command Modes

Configurationmode.

Command History

Release
Modification

3.4(1)

This command was introduced.


Usage Guidelines

This commandenables the static peers with status and all the peers in the physical fabric.


Note The no cfs static-peers displays a warning string, and changes the entire fabric from static to dynamic.


Examples

The following example shows how to enable static peers interface:

Switch(config)# cfs static-peers
Warning: This mode will stop dynamic discovery and relay only on these peers.
Do you want to continue?(y/n) [n] y
Switch(config-cfs-static)#ip address 1.2.3.4
Switch(config-cfs-static)#ip address 20.2.1.34
Switch(config-cfs-static)#exit
Switch(config)#

Related Commands

Command
Description

show cfs static peers

Displays configured static peers with status.


channel mode active

To enable channel mode on a PortChannel interface, use the channel mode active command. To disable this feature, use the no form of the command.

channel mode active

no channel mode

Syntax Description

This command has no other arguments or keywords.

Defaults

Enabled.

Command Modes

Interface configuration submode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

This command determines the protocol behavior for all the member ports in the channel group associated with the port channel interface.

Examples

The following example shows how to disable channel mode on a PortChannel interface.

switch# config terminal
switch(config)# interface port-channel 10
switch(config-if)# no channel mode active

Related Commands

Command
Description

show interface port-channel

Displays PortChannel interface information.


channel-group

To add a port to a PortChannel group, use the channel-group command. To remove a port, use the no form of the command.

channel-group {port-channel-number force | auto}

no channel-group {port-channel-number force | auto}

Syntax Description

port-channel-number

Specifies the PortChannel number. The range is 1 to 256.

force

Specifies using the force option to add a port.

auto

Enables auto creation of a PortChannel.


Defaults

None.

Command Modes

Interface configuration submode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to enable auto creation of a PortChannel.

switch# config terminal
switch(config)# interface fc3/9
switch(config-if)# channel-group auto

Related Commands

Command
Description

show interface port-channel

Displays PortChannel interface information.


cimserver

Use the cimserver command to configure the Common Information Models (CIM) parameters. Use the no form of this command to revert to factory defaults.

cimserver
{certificate {bootflash:filename | slot0:filename | volatile:filename} |
clearcertificate filename |
enable |
enablehttp |
enablehttps}

no cimserver
{certificate {bootflash:filename | slot0:filename | volatile:filename} |
clearcertificate filename
enable
enablehttp
enablehttps}

Syntax Description

certificate

Installs the Secure Socket Layer (SSL) certificate

bootflash:

Specifies the location for internal bootflash memory.

slot0:

Specifies the location for the CompactFlash memory or PCMCIA card.

volatile:

Specifies the location for the volatile file system.

filename

The name of the license file with a .pem extension.

clearcertificate

Clears a previously-installed SSL certificate.

enable

Enables and starts the CIM server.

enablehttp

Enables the HTTP (non-secure) protocol for the CIM server—(default).

enablehttps

Enables the HTTPS (secure) protocol for the CIM server.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

1.3(1)

This command was introduced.


Usage Guidelines

A CIM client is required to access the CIM server. The client can be any client that supports CIM.

Examples

The following example installs a Secure Socket Layer (SSL) certificate specified in the file named with a .pem extension.

switch# config terminal
switch(config)# cimserver certificateName bootflash:simserver.pem

The following example clears the specified SSL certificate.

switch(config)# cimserver clearCertificateName bootflash:simserver.pem

The following example enables HTTPS (secure protocol).

switch(config)# cimserver enablehttps

The following example disables HTTPS (default).

switch(config)# no cimserver enablehttps

The following example

switch(config)# cimserver enable

The following example disables the CIM server (default).

switch(config)# no cimserver enable

The following example enables HTTP and reverts to the switch default.

switch(config)# cimserver enablehttp 

The following example disables HTTP and reverts to the switch default.

switch(config)# no cimserver enablehttp 

Related Commands

Command
Description

show csimserver

Displays configured CIM settings and parameters.


cimserver clearcertificate

To clear the cimserver certificate, use the cimsever clearcertificate command in configuration mode.

cimserver clearcertificate

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.3(1a)

This command was introduced.


Usage Guidelines

You need not specify the certificate name.

Examples

The following example shows how to clear the cimserver certificate:

switch# config
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# cimserver clearcertificate

Related Commands

Command
Description

show cimserver certificate name

Displays cimserver certificate file name.


cimserver loglevel

To configure the cimserver loglevel filter, use the cimsever loglevel command in configuration mode.

cimserver loglevel filter value

Syntax Description

filter value

Specifies the cimserver log filter levels. The range is 1 to 5.

1

Sets the current value for the loglevel property to trace.

2

Sets the current value for the loglevel property to information.

3

Sets the current value for the loglevel property to warning.

4

Sets the current value for the loglevel property to severe.

5

Sets the current value for the loglevel property to fatal.


Defaults

None.

Command Modes

Configuration mode

Command History

Release
Modification

3.3(1a)

This command was introduced.


Usage Guidelines

None.

Examples

The following example displays the cimserver loglevel:

switch# config
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# cimserver loglevel 2
Current value for the property logLevel is set to "INFORMATION" in CIMServer.

Related Commands

Command
Description

show cimserver logs

Displays the cimserver logs.


class

To select a QoS policy map class for configuration, use the class command in QoS policy map configuration submode. To disable this feature, use the no form of the command.

class class-map-name

no class class-map-name

Syntax Description

class-map-name

Selects the QoS policy class map to configure.


Defaults

Disabled

Command Modes

QoS policy map configuration submode

Command History

Release
Modification

1.3(1)

This command was introduced.


Usage Guidelines

Before you can configure a QoS policy map class you must complete the following:

Enable the QoS data traffic feature using the qos enable command.

Configure a QoS class map using the qos class-map command.

Configure a QoS policy map using the qos policy-map command.

After you configure the QoS policy map class, you can configure the Differentiated Services Code Point (DSCP) and priority for frames matching this class map.

Examples

The following example shows how to select a QoS policy map class to configure:

switch# config terminal 
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# qos enable 
switch(config)# qos class-map class-map1
switch(config)# qos policy-map policyMap1
switch(config-pmap)# class class-map1
switch(config-pmap-c)#

Related Commands

Command
Description

qos enable

Enables the QoS data traffic feature on the switch.

qos class-map

Configures a QoS class map.

qos policy-map

Configures a QoS policy map.

dscp

Configures the DSCP in the QoS policy map class.

priority

Configures the priority in the QoS policy map class.

show qos

Displays the current QoS settings.


clear accounting log

To clear the accounting log, use the clear accounting log command.

clear accounting log

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example clears the accounting log:

switch# clear accounting session

Related Commands

Command
Description

show accounting log

Displays the accounting log contents.


clear arp-cache

To clear the ARP cache table entries, use the clear arp-cache command in EXEC mode.

clear arp-cache

Syntax Description

This command has no arguments or keywords.

Defaults

The ARP table is empty by default.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Examples

The following example shows how to clear the arp-cache table entries:

switch# clear arp-cache

Related Commands

Command
Description

show arp

Displays Address Resolution Protocol (ARP) entries.


clear callhome session

To clear Call Home Cisco Fabric Services (CFS) session configuration and locks, use the clear callhome session command.

clear callhome session

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear the Call Home session configuration and locks:

switch# clear callhome session

Related Commands

Command
Description

show callhome

Displays Call Home information.


clear cdp

Use the clear cdp command to delete global or interface-specific CDP configurations.

clear cdp {counters | table} [interface {gigabitethernet slot/port | mgmt 0}]

Syntax Description

counters

Enables CDP on globally or on a per-interfaces basis.

table

Specifies the EXEC command to be executed.

interface

Displays CDP parameters for an interface.

gigabitethernet

Specifies the Gigabit Ethernet interface.

slot/port

Specifies the slot number and port number separated by a slash (/).

mgmt 0

Specifies the Ethernet management interface.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

1.1(1)

This command was introduced.


Usage Guidelines

You can issue this command for a specified interface or for all interfaces (management and Gigabit Ethernet interfaces).

Examples

The following example clears CDP traffic counters for all interfaces:

switch# clear cdp counters
switch#

The following example clears CDP entries for the specified Gigabit Ethernet interface:

switch# clear cdp table interface gigabitethernet 4/1
switch#

Related Commands

Command
Description

cdp

Configures global or interface-specific CDP settings and parameters.

show cdp

Displays configured CDP settings and parameters.



clear cores

To clear all core dumps for the switch, use the clear cores command in EXEC mode.

clear cores

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

The system software keeps the last few cores per service and per slot and clears all other cores present on the active supervisor module.

Examples

The following example shows how to clear all core dumps for the switch:

switch# clear cores

Related Commands

Command
Description

show cores

Displays core dumps that have been made.


clear counters (EXEC mode)

To clear the interface counters, use the clear counters command in EXEC mode.

clear counters {all | interface {fc | mgmt | port-channel | sup-fc | vsan} number}

Syntax Description

all

Clears all interface counters.

interface

Clears interface counters for the specified interface.

type

Specifies the interface type. See the Keywords table in the "Usage Guidelines" section.

number

Specifies the number of the slot or interface being cleared.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

The following table lists the keywords and number ranges for the clear counters interface types:

Keyword
Interface Type
Number

fc

Fibre Channel

1- 2 or 1 - 9 (slot)

gigabitethernet

Gigabit Ethernet

1- 2 or 1 - 9 (slot)

mgmt

Management

0-0 (management interface)

port-channel

PortChannel

1-128 (PortChannel)

sup-fc

Inband

0-0 (Inband interface)

vsan

VSAN

1- 4093 (VSAN ID)


This command clears counter displayed in the show interface command output.

Examples

The following example shows how to clear counters for a VSAN interface.

switch# clear counters interface vsan 13

Related Commands

Command
Description
show interface

Displays interface information.


clear counters (SAN extension N port configuration mode)

To clear SAN extension tuner N port counters, use the clear counters command.

clear counters

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

SAN extension N port configuration submode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear SAN extension tuner N port counters.

switch# san-ext-tuner
switch(san-ext)# nWWN 10:00:00:00:00:00:00:00
switch(san-ext)# nport pwwn 12:00:00:00:00:00:00:56 vsan 13 interface gigabitethernet 
1/2
switch(san-ext-nport)# clear counters

Related Commands

Command
Description

show san-ext-tuner

Displays SAN extension tuner information.


clear crypto ike domain ipsec sa

To clear the IKE tunnels for IPsec, use the clear crypto ike domain ipsec sa command.

clear crypto ike domain ipsec sa [tunnel-id]

Syntax Description

tunnel-id

Specifies a tunnel ID. The range is 1 to 2147483647.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, the IKE protocol must be enabled using the crypto ike enable command.

If the tunnel ID is not specified, all IKE tunnels are cleared.

Examples

The following example shows how to clear all IKE tunnels.

switch# clear crypto ike domain ipsec sa

Related Commands

Command
Description

crypto ike domain ipsec

Configures IKE information.

crypto ike enable

Enables the IKE protocol.

show crypto ike domain ipsec

Displays IKE information for the IPsec domain.


clear crypto sa domain ipsec

To clear the security associations for IPsec, use the clear crypto sa domain ipsec command.

clear crypto sa domain ipsec interface gigabitethernet slot/port {inbound | outbound}
sa sa-index

Syntax Description

interface gigabitethernet slot/port

Specifies the Gigabit Ethernet interface.

inbound

Specifies clearing inbound associations.

outbound

Specifies clearing output associations.

sa sa-index

Specifies the security association index. The range is 1 to 2147483647.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To clear security associations, IPsec must be enabled using the crypto ipsec enable command.

Examples

The following example shows how to clear a security association for an interface.

switch# clear crypto sa domain ipsec interface gigabitethernet 1/2 inbound sa 1

Related Commands

Command
Description

show crypto sad domain ipsec

Displays IPsec security association database information.


clear debug-logfile

To delete the debug logfile, use the clear debug-logfile command in EXEC mode.

clear debug-logfile filename

Syntax Description

filename

The name (restricted to 80 characters) of the log file to be cleared. The maximum size of the log file is 1024 bytes.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Examples

The following example shows how to clear the debug logfile.

switch# clear debug-logfile debuglog

Related Commands

Command
Description

show debug logfilw

Displays the logfile contents.


clear device-alias

To clear device alias information, use the clear device-alias command.

clear device-alias {session | statistics}

Syntax Description

session

Clears session information.

statistics

Clears device alias statistics.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear the device alias session.

switch# clear device-alias session

Related Commands

Command
Description

show device-alias

Displays device alias database information.


clear dpvm

To clear Dynamic Port VSAN Membership (DPVM) information, use the clear dpvm command.

clear dpvm {auto-learn [pwwn pwwn-id] | session}

Syntax Description

auto-learn

Clears automatically learned (autolearn) DPVM entries.

pwwn pwwn-id

Specifies the pWWN ID. The format is hh:hh:hh:hh:hh:hh:hh:hh, where h is a hexadecimal number.

session

Clears the DPVM session and locks.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, DVPM must be enabled using the dpvm enable command.

Examples

The following example shows how to clear a single autolearned entry:

switch# clear dpvm auto-learn pwwn 21:00:00:20:37:9c:48:e5

The following example shows how to clear all autolearn entries.

switch# clear dpvm auto-learn

The following example shows how to clear a session:

switch# clear dpvm session

Related Commands

Command
Description

dpvm enable

Enables DPVM.

show dpvm

Displays DPVM database information.


clear fabric-binding statistics

To clear fabric binding statistics in a FICON enabled VSAN, use the clear fabric-binding statistics command in EXEC mode.

clear fabric-binding statistics vsan vsan-id

Syntax Description

vsan vsan-id

Specifies the FICON-enabled VSAN. The ID of the VSAN is from 1 to 4093.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.1(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example clears existing fabric binding statistics in VSAN 1:

switch# clear fabric-binding statistics vsan 1

Related Commands

Command
Description

show fabric-binding efmd statistics

Displays existing fabric binding statistics information.



clear fcanalyzer

To clear the entire list of configured hosts for remote capture, use the clear fcanalyzer command in EXEC mode.

clear fcanalyzer

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

This command clears only the list of configured hosts. Existing connections are not terminated.

Examples

The following example shows how to clear the entire list of configured hosts for remote capture:

switch# clear fcanalyzer 

Related Commands

Command
Description

show fcanalyzer

Displays the list of hosts configured for a remote capture.


clear fcflow stats

To clear Fibre Channel flow statistics, use the clear fcflow stats command in EXEC mode.

clear fcflow stats [aggregated] module module-number index flow-number

Syntax Description

aggregated

Clears the Fibre Channel flow aggregated statistics.

module

Clears the statistics for a specified module.

module-number

Specifies the module number.

index

Clears the Fibre Channel flow counters for a specified flow index.

flow-number

Specifies the flow index number.


Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.0(2)

This command was introduced.


Examples

The following example shows how to clear aggregated Fibre Channel flow statistics for flow index 1 of module 2.

switch(config)# # clear fcflow stats aggregated module 2 index 1

Related Commands

Command
Description

show fcflow

Displays the fcflow statistics.


clear fcns statistics

To clear the name server statistics, use the clear fcns statistics command in EXEC mode.

clear fcns statistics vsan vsan-id

Syntax Description

vsan vsan-id

FCS statistics are to be cleared for a specified VSAN ranging from 1 to 4093.


Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.0(3)

This command was introduced.


Examples

The following example shows how to clear the name server statistics:

switch# show fcns statistics

Name server statistics for vsan 1
===================================
registration requests received = 0
deregistration requests received = 0
queries received = 23
queries sent = 27
reject responses sent = 23
RSCNs received = 0
RSCNs sent = 0

switch# clear fcns statistics vsan 1

switch# show fcns statistics

Name server statistics for vsan 1
===================================
registration requests received = 0
deregistration requests received = 0
queries received = 0
queries sent = 0
reject responses sent = 0
RSCNs received = 0
RSCNs sent = 0
switch#

Related Commands

Command
Description

show fcns statistics

Displays the name server statistics.


clear fcs statistics

To clear the fabric configuration server statistics, use the clear fcs statistics command in EXEC mode.

clear fcs statistics vsan vsan-id

Syntax Description

vsan vsan-id

FCS statistics are to be cleared for a specified VSAN ranging from 1 to 4093.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Examples

The following example shows how to clear the fabric configuration server statistics for VSAN 10:

switch# clear fcs statistics vsan 10

Related Commands

Command
Description

show fcs statistics

Displays the fabric configuration server statistics information.


clear fctimer session

To clear fctimer Cisco Fabric Services (CFS) session configuration and locks, use the clear fctimer session command.

clear fctimer session

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear fctimer session:

switch# clear fctimer session

Related Commands

Command
Description

show fctimer

Displays fctimer information.


clear fc-redirect config vt

To delete a FC-Redirect configuration on a switch, use the clear fc-redirect config command.

clear fc-redirect config vt vt-pwwn [local-switch-only]

Syntax Description

vt vt-pwwn

Specify the VT pWWN for the configuration to be deleted.

local-switch-only

(Optional) The configuration is deleted locally only.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.2(1)

This command was introduced.


Usage Guidelines

This command is used as a last option if deleting the configuration through the application is not possible.

This command will delete any configuration (including active configurations) on FC-Redirect created by applications such as SME/DMM that may lead to data loss. When you enter this command, the host server communicates to the storage array directly by passing the individual Intelligent Service Applications causing data corruption. Use this command as a last option to clear any leftover configuration that cannot be deleted from the application (DMM/SME). Use this command while decommissioning the switch.

Examples

The following example clears the FC-Redirect configuration on the switch:

switch# clear fc-redirect config vt 2f:ea:00:05:30:00:71:64 
Deleting a configuration MAY result in DATA CORRUPTION.
Do you want to continue? (y/n) [n] y

Related Commands

Command
Description

show fc-redirect active-configs

Displays all active configurations on the switch.


clear fc-redirect decommission-switch

To remove all existing FC-Redirect configurations and disable any further FC-Redirect configurations on a switch, use the clear fc-redirect decommission-switch command.

clear fc-redirect decommission-switch

Syntax Description

This command has no arguments or keywords.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.2(1)

This command was introduced.


Usage Guidelines

This command is used after write erase. The command is also used to move a switch from a fabric with FC-Redirect configurations to another fabric. After using this command, disconnect the switch from the fabric and reboot the switch before using it in another fabric.

Examples

The following example shows how to decommission FC-Redirect on a switch:

switch# clear fc-redirect decommission-switch
This Command removes any FC-Redirect configuration and disables
FC-Redirect on this switch. Its usage is generally recommended in
the following cases:
   1) After 'write erase' 
   2) When removing the switch from the fabric.
If NOT for the above, Decommissioning a switch MAY result in
DATA CORRUPTION.
Do you want to continue? (Yes/No) [No] Yes
Please check the following before proceeding further:
   1) Hosts / targets connected locally are NOT involved in any
      FC-Redirect configuration.
   2) No application running on this switch created an FC-Redirect
      Configuration
   Please use the command 'show fc-redirect active-configs' to check
   these.
Do you want to continue? (Yes/No) [No] Yes
switch#


Related Commands=

Command
Description

show fc-redirect active-configs

Displays all active configurations on a switch.


clear ficon

Use the clear ficon command in EXEC mode to clear the FICON information for the specified VSAN.

clear ficon vsan vsan-id [allegiance | timestamp]

Syntax Description

vsan vsan-id

Specifies the FICON-enabled VSAN. The ID of the VSAN is from 1 to 4093.

allegiance

Clears FICON device allegiance.

timestamp

Clears FICON VSAN specific timestamp.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.3(1)

This command was introduced.


Usage Guidelines

The clear ficon vsan vsan-id allegiance command aborts the currently-executing session.

Examples

The following example clears the current device allegiance for VSAN 1:

switch# clear ficon vsan 1 allegiance

The following example clears the VSAN clock for VSAN 20.

switch# clear ficon vsan 20 timestamp

Related Commands

Command
Description

show ficon

Displays configured FICON details.


clear fspf counters

To clear the Fabric Shortest Path First statistics, use the clear fspf counters command in EXEC mode.

clear fspf counters vsan vsan-id [interface type]

Syntax Description

vsan

Indicates that the counters are to be cleared for a VSAN.

vsan-id

The ID of the VSAN is from 1 to 4093.

interface type

(Optional). The counters are to be cleared for an interface. The interface types are fc for Fibre Channel, and port-channel for PortChannel.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

If the interface is not specified, then all of the counters of a VSAN are cleared. If the interface is specified, then the counters of the specific interface are cleared.

Examples

The following example clears the FSPF t statistics on VSAN 1.

switch# clear fspf counters vsan 1

The following example clears FSPF statistics specific to the Fibre Channel interface in VSAN 1, Slot 9 Port 32.

switch#  clear fspf counters vsan 1 interface fc 9/32

Related Commands

Command
Description

show fspf

Displays global FSPF information for a specific VSAN.


clear install failure-reason

To remove the upgrade failure reason log created during in-service software upgrades (ISSUs) on the Cisco MDS 9124 Fabric Switch, use the clear install failure-reason command.


Caution If you remove the upgrade failure reason log, then you will not have any information to help you debug in the event of an ISSU failure.

clear install failure-reason

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.1(1)

This command was introduced.


Usage Guidelines

This command is supported only on the Cisco MDS 9124 Fabric Switch.

Examples

The following example removes all upgrade failure reason logs on a Cisco MDS 9124 Fabric 
Switch.
switch# clear install failure-reason

Related Commands

Command
Description

show install all status

Displays the status of an ISSU on a Cisco MDS 9124 Fabric Switch.

show install all failure-reason

Displays the reasons why an upgrade cannot proceed in the event of an ISSU failure.


clear ip access-list counters

To clear IP access list counters, use the clear ip access-list counters command in EXEC mode.

clear ip access-list counters list-name

Syntax Description

list-name

Specifies the IP access list name (maximum 64 characters).


Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.1(1)

This command was introduced.


Examples

The following example clears the counters for an IP access list.

switch# clear ip access-list counters adminlist

Related Commands

Command
Description

show ip access-list

Displays IP access list information.


clear ips arp

To clear ARP caches, use the clear ips arp command in EXEC mode.

clear ips arp {address ip-address| interface gigabitethernet module-number}

Syntax Description

address

Clears fcflow aggregated statistics.

ip-address

Enters the peer IP address.

interface gigabitethernet

Specifies the Gigabit Ethernet interface.

module-number

Specifies slot and port of the Gigabit Ethernet interface.


Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.1(1)

This command was introduced.


Examples

The ARP cache can be cleared in two ways: clearing just one entry or clearing all entries in the ARP cache.

The following example clears one ARP cache entry:

switch# clear ips arp address 10.2.2.2 interface gigabitethernet 8/7 
arp clear successful

The following example clears all ARP cache entries

switch# clear ips arp interface gigabitethernet 8/7
arp clear successful

clear ips stats

To clear IP storage statistics, use the clear ips stats command in EXEC mode.

clear ips stats {all [interface gigabitethernet slot/port] |
buffer interface gigabitethernet slot/port |
dma-bridge interface gigabitethernet slot/port |
icmp interface gigabitethernet slot/port |
ip interface gigabitethernet slot/port |
ipv6 traffic interface gigabitethernet slot/port |
mac interface gigabitethernet slot/port |
tcp interface gigabitethernet slot/port}

Syntax Description

all

Clears all IPS statistics.

interface gigabitethernet

Clears the Gigabit Ethernet interface.

slot/port

Specifies the slot and port numbers.

buffer

Clears IP storage buffer information.

dma-bridge

Clears direct memory access (DMA) statistics.

icmp

Clears ICMP statistics.

ip

Clears IP statistics.

ipv6

Clears IPv6 statistics.

mac

Clears Ethernet MAC statistics.

tcp

Clears TCP statistics.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Examples

The following example clears all IPS statistics on the specified interface.

switch# clear ips all interface gigabitethernet 8/7
switch#

clear ips stats fabric interface

To clear the statistics for a given iSCSI or FCIP interface on a Cisco MDS 9000 18/4-Port Multi Service Module IPS linecard, use the clear ips stats fabric interface command.

clear ips stats fabric interface [iscsi slot/port | fcip N]

Syntax Description

iscsi slot/port

(Optional) Clears Data Path Processor (DPP) fabric statistics for the iSCSI interface.

fcip N

(Optional) Clears DPP fabric statistics for the FCIP interface.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.2(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example clears the statistics for a given iSCSI or FCIP interface.

switch# clear ips stats fabric interface fcip ?
<1-255>  Fcip interface number
switch# clear ips stats fabric interface fcip 1
switch#
switch# clear ips stats fabric interface iscsi 1/1
switch#

Related Commands

Command
Description

show ips stats fabric interface

Displays the fabric-related statistics for the given iSCSI or FCIP interface on a Cisco MDS 9000 18/4-Port Multi Service Module IPS linecard.


clear ipv6 access-list

To clear IPv6 access control list statistics, use the clear ipv6 access-list command.

clear ipv6 access-list [list-name]

Syntax Description

access-list

Displays a summary of access control lists (ACLs).

list-name

Specifies the name of the ACL. The maximum size is 64.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.1(0)

This command was introduced.


Usage Guidelines

You can use the clear ipv6 access-list command to clear IPv6-ACL statistics.

Examples

The following example displays information about an IPv6-ACL.

switch# clear ipv6 access-list testlist
switch#

Related Commands

Command
Description

ipv6 access-list

Configures an IPv6-ACL.

show ipv6

Displays IPv6 configuration information.


clear ipv6 neighbors

To clear the IPv6 neighbor cache table, use the clear ipv6 neighbors command.

clear ipv6 neighbors

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.1(0)

This command was introduced.


Usage Guidelines

None.

Examples

The following example flushes the IPv6 neighbor cache table.

switch# clear ipv6 neighbors
switch#

Related Commands

Command
Description

ipv6 nd

Configures IPv6 neighbor discovery commands.

show ipv6 neighbors

Displays IPv6 neighbors configuration information.


clear islb session

To clear a pending iSLB configuration, use the clear islb session command.

clear islb session

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

You can use the clear islb session command to clear a pending iSLB configuration. This command can be executed from any switch by a user with admin privileges.

Examples

The following example clears a pending iSLB configuration.

switch# clear islb session

Related Commands

Command
Description

islb abort

Discards a pending iSLB configuration.

show islb cfs-session status

Displays iSLB session details.

show islb pending

Displays an iSLB pending configuration.

show islb pending-diff

Displays iSLB pending configuration differences.

show islb session

Displays iSLB session information.

show islb status

Displays iSLB CFS status.

show islb vrrp

Displays iSBL VRRP load balancing information.


clear ivr fcdomain database

To clear the IVR fcdomain database, use the clear ivr fcdomain database command in EXEC mode.

clear ivr fcdomain database

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.1(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example clears all IVR fcdomain database information.

switch# clear ivr fcdomain database

Related Commands

Command
Description

show ivr fcdomain database

Displays IVR fcdomain database entry information.


clear ivr service-group database

To clear an inter-VSAN routing (IVR) service group database, use the clear ivr service-group database command.

clear ivr service-group database

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example clears the ivr service-group database.

switch# clear ivr service-group database

Related Commands

Command
Description

show ivr service-group database

Displays an IVR service group database.



clear ivr zone database

To clear the Inter-VSAN Routing (IVR) zone database, use the clear ivr zone database command in EXEC mode.

clear ivr zone database

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.3(1)

This command was introduced.


Examples

The following example clears all configured IVZ information.

switch# clear ivr zone database 

clear license

To uninstall a license, use the clear license command in EXEC mode.

clear license filename

Syntax Description

filename

Specifies the license file to be uninstalled.


Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.3(2)

This command was introduced.


Examples

The following example clears a specific license.

switch# clear license Ficon.lic 
Clearing license Ficon.lic:
SERVER this_host ANY
VENDOR cisco
# An example fcports license
INCREMENT SAN_EXTN_OVER_IP cisco 1.000 permanent 1 HOSTID=VDH=ABCD \
        NOTICE=<LicFileID>san_extn2.lic</LicFileID><LicLineID>1</LicLineID> \
        SIGN=67CB2A8CCAC2
Do you want to continue? (y/n) y
Clearing license ..done
switch# 

Related Commands

Command
Description

show license

Displays license information.


clear line

To clear VTY sessions, use the clear line command in EXEC mode.

clear line vty-name

Syntax Description

vty-name

Specifies the VTY name (maximum 64 characters).


Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.2(1)

This command was introduced.


Examples

The following example clears one ARP cache entry:

switch# clear line Aux
arp clear successful

Related Commands

Command
Description

show line

Displays line information.


clear logging

To delete the syslog information, use the clear logging command in EXEC mode.

clear logging {logfile | nvram | onboard information [module slot] | session}

Syntax Description

logfile

Clears log file messages.

nvram

Clears NVRAM logs.

onboard information

Clears onboard failure logging (OBFL) information. The types of information include boot-uptime, cpu-hog, device-version, endtime, environmental-history, error-stats, exception-log, interrupt-stats, mem-leak, miscellaneous-error, module, obfl-history, obfl-log, register-log, stack-trace, starttime, status, and system-health.

module slot

Clears OBFL information for a specified module.

session

Clears a logging session.


Defaults

None.

Command Modes

EXEC.

Command History

Release
Modification

1.0(2)

This command was introduced.

3.0(1)

Added the onboard, module and session, options.


Examples

The following example shows how to clear the debug log file.

switch# clear logging logfile

The following example shows how to clear the onboard system health log file.

switch# clear logging onboard system-health
!!!WARNING! This will clear the selected logging buffer!!
Do you want to continue? (y/n)  [n]

Related Commands

Command
Description

show logging

Displays logging information.


clear ntp

To clear Network Time Protocol (NTP) information, use the clear ntp command in EXEC mode.

clear ntp {session | statistics {all-peers | io | local | memory}}

Syntax Description

session

Clears NTP CFS session configuration and locks.

statistics

Clears NTP statistics.

all-peers

Clears I/O statistics for all peers.

io

Clears I/O statistics for I/O devices.

local

Clears I/O statistics for local devices.

memory

Clears I/O statistics for memory.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None mode.

Examples

The following example shows how to clear NTP statistics for all peers.

switch# clear ntp statistics all-peers

The following example shows how to clear NTP statistics for I/O devices.

switch# clear ntp statistics io

The following example shows how to clear NTP statistics for local devices.

switch# clear ntp statistics local

The following example shows how to clear NTP statistics for memory.

switch# clear ntp statistics memory

Related Commands

Command
Description

show ntp

Displays the configured server and peer associations.


clear port-security

To clear the port security information on the switch, use the clear port-security command in EXEC mode.

clear port-security {database auto-learn {interface fc slot/port | port-channel port} | session | statistics} vsan vsan-id

Syntax Description

database

Clears the port security active configuration database.

session

Clears the port security CFS configuration session and locks.

statistics

Clears the port security counters.

auto-learn

Clears the auto-learnt entries for a specified interface or VSAN.

interface fc slot/port

Clears entries for a specified interface.

port-channel port

Clears entries for a specified PortChannel. The range is 1 to 128.

vsan vsan-id

Clears entries for a specified VSAN ID. The range is 1 to 4093.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.2(1)

This command was introduced.

2.0(x)

Added the session option.


Usage Guidelines

The active database is read-only and clear port-security database command can be used when resolving conflicts.

Examples

The following example clears all existing statistics from the port security database for a specified VSAN.

switch# clear port-security statistics vsan 1

The following example clears learnt entries in the active database for a specified interface within a VSAN.

switch# clear port-security database auto-learn interface fc1/1 vsan 1

The following example clears learnt entries in the active database up to for the entire VSAN.

switch# clear port-security database auto-learn vsan 1

Related Commands

Command
Description

show port-security

Displays the configured port security information.


clear processes log

To clear the log files on the switch, use the clear processes log command in EXEC mode.

clear processes log {all | pid pid-number}

Syntax Description

all

Deletes all of the log files.

pid

Deletes the log files of a specific process.

pid-number

Specifies the process ID, which must be from 0 to 2147483647.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following examples show how to clear all of the log files on the switch.

switch# clear processes log all

Related Commands

Command
Description

show processes

Displays the detailed running or log information of processes or high availability applications.


clear qos statistics

To clear the quality of services statistics counters, use the clear qos statistics command in EXEC mode.

clear qos statistics

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following examples shows how to clear the quality of service counters.

switch# clear qos statistics

Related Commands

Command
Description

show qos statistics

Displays the current QoS settings, along with a number of frames marked high priority.


clear radius session

To clear RADIUS Cisco Fabric Services (CFS) session configuration and locks, use the clear radius session command.

clear radius session

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear RADIUS session.

switch# clear radius session

Related Commands

Command
Description

show radius

Displays RADIUS CFS distribution status and other details.


clear rlir

To clear the Registered Link Incident Report (RLIR), use the clear rlir command in EXEC mode.

clear rlir {history | recent {interface fc slot/port | portnumber port-number} |
statistics vsan vsan-id}


Note On a Cisco Fabric Switch for HP c-Class BladeSystem and on a Cisco Fabric Switch for IBM BladeCenter, the syntax differs as follows:
interface bay port | ext port


Syntax Description

history

Clears RLIR link incident history.

recent

Clears recent link incidents.

interface fc slot/port

Clears entries for a specified interface.

bay port | ext port

Clears entries for a specified interface on a Cisco Fabric Switch for HP c-Class BladeSystem and on a Cisco Fabric Switch for IBM BladeCenter,

portnumber port-number

Displays the port number for the link incidents.

statistics

Clears RLIR statistics.

vsan vsan-id

Specifies the VSNA ID for which the RLIR statistics are to be cleared.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.3(1)

This command was introduced.

3.1(2)

Added the interface bay | ext option.


Usage Guidelines

None.

Examples

The following example clears all existing statistics for a specified VSAN.

switch# clear rlir statistics vsan 1

The following example clears the link incident history.

switch# clear rlir history 

The following example clears recent RLIR information for a specified interface.

switch# clear rlir recent interface fc 1/2

The following example clears recent RLIR information for a specified port number.

switch# clear rlir recent portnumber 16

Related Commands

Command
Description

show rscn

Displays RSCN information.


clear rmon alarms

To clear all the 32-bit remote monitoring (RMON) alarms from the running configuration, use the clear rmon alarms command.

clear rmon alarms

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.3(1a)

This command was introduced.


Usage Guidelines

You must save the changes to startup configuration to make them permanent.

Examples

The following example clears all 32-bit RMON alarms from the running configuration.

switch# clear rmon alarms
switch#

Related Commands

Command
Description

clear rmon hcalarms

Clears all the 64-bit RMON alarms.

clear rmon all-alarms

Clears all the 32-bit and 64-bit RMON alarms.

clear rmon log

Clears RMON log information.


clear rmon all-alarms

To clear all the 32-bit and 64-bit RMON alarms from the running configuration, use the clear rmon all-alarms command.

clear rmon all-alarms

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.3(1a)

This command was introduced.


Usage Guidelines

You must save the changes to startup configuration to make them permanent.

Examples

The following example clears all the 32-bit and 64-bit RMON alarms from the running configuration.

switch# clear rmon all-alarms
switch#

Related Commands

Command
Description

clear rmon alarms

Clears all the 32-bit RMON alarms.

clear rmon hcalarms

Clears all the 64-bit RMON alarms.

clear rmon log

Clears RMON log information.



clear rmon hcalarms

To clear all the 64-bit RMON alarms from the running configuration, use the clear rmon hcalarms command.

clear rmon hcalarms

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.3(1a)

This command was introduced.


Usage Guidelines

You must save the changes to startup configuration to make them permanent.

Examples

The following example clears all the 64-bit RMON alarms from the running configuration.

switch# clear rmon hcalarms
switch#

Related Commands

Command
Description

clear rmon alarms

Clears all the 32-bit RMON alarms.

clear rmon all-alarms

Clears all the 32-bit and 64-bit RMON alarms.

clear rmon log

Clears RMON log information.


clear rmon log

To clear all entries from RMON log on the switch, use the clear rmon log command.

clear rmon log

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.3(1a)

This command was introduced.


Usage Guidelines

None.

Examples

The following example clears all entries from RMON log on the switch.

switch# clear rmon log
switch#

Related Commands

Command
Description

clear rmon alarm

Clears all the 32-bit RMON alarms.

clear rmon hcalarms

Clears all the 64-bit RMON alarms.

clear rmon all-alarms

Clears all the 32-bit and 64-bit RMON alarms.


clear role session

To clear authentication role Cisco Fabric Services (CFS) session configuration and locks, use the clear role session command.

clear role session

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear authentication role CFS session.

switch# clear role session

Related Commands

Command
Description

show role

Displays role configuration information.


clear rscn session vsan

To clear a Registered State Change Notification (RSCN) session for a specified VSAN, use the clear rscn session vsan command.

clear rscn session vsan vsan-id

Syntax Description

vsan-id

Specifies a VSAN where the RSCN session should be cleared. The ID of the VSAN is from 1 to 4093.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example clears an RSCN session on VSAN 1.

switch# clear rscn session vsan 1

Related Commands

Command
Description

rscn

Configures an RSCN.

show rscn

Displays RSCN information.


clear rscn statistics

To clear the registered state change notification statistics for a specified VSAN, use the clear rscn statistics command in EXEC mode.

clear rscn statistics vsan vsan-id

Syntax Description

vsan

The RSCN statistics are to be cleared for a VSAN.

vsan-id

The ID for the VSAN for which you want to clear RSCN statistics.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear rcsn statistics for VSAN 1.

switch# clear rscn statistics 1

Related Commands

Command
Description

show rscn

Displays RSCN information.


clear santap module

To clear SANTap information, use the clear santap module command.

clear santap module slot-number {avt avt-pwwn [lun avt-lun] |
itl target-pwwn host-pwwn |
session session-id}

Syntax Description

slot-number

Specifies the Storage Services Module (SSM) module number. The range is 1 through 13.

avt avt-pwwn

Removes the appliance virtual target (AVT) pWWN. The format is hh:hh:hh:hh:hh:hh:hh:hh.

lun avt-lun

Removes the appliance virtual target (AVT) LUN. The format is 0xhhhh[:hhhh[:hhhh[:hhhh]]].

itl target-pwwn host-pwwn

Removes the SANTap Initiator Target LUN (ITL) triplet. The format of the target-pwwn and the host-pwwn is hh:hh:hh:hh:hh:hh:hh:hh.

session session-id

Removes a session. The range for session ID is 0 through 2147483647


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to remove a SANTap session.

switch# clear santap module 13 session 2020

Related Commands

Command
Description

santap module

Configures the mapping between the Storage Services Module (SSM) and the VSAN where the appliance is configured.

show santap module

Displays the configuration and statistics of the SANTap feature.


clear ssm-nvram santap module

To clear the SANTap configuration for a specific slot stored on the supervisor flash, use the clear ssm-nvram santap module command in the configuration mode.

clear ssm-nvram santap module slot

Syntax Description

slot

Displays SANTap configuration for a module in the specified slot.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.2(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear the SANTap configuration for a slot 2.

switch# clear ssm-nvram santap module 2

Related Commandss

Command
Description

ssm enable feature

Enables the SANTap feature on the SSM.


clear scheduler logfile

To clear the command scheduler logfile, use the clear scheduler logfile command.

clear scheduler logfile

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear the command scheduler logfile.

switch# clear scheduler logfile

Related Commands

Command
Description

show scheduler

Displays command scheduler information.


clear screen

To clear the terminal screen, use the clear screen command in EXEC mode.

clear screen

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear the terminal screen.

switch# clear screen

clear scsi-flow statistics

To clear the SCSI flow statistics counters, use the clear scsi-flow statistics command.

clear scsi-flow statistics flow-id flow-id

Syntax Description

flow-id flow-id

Configures the SCSI flow identification number.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear the SCSI flow statistics counters for SCSI flow ID 3.

switch# clear scsi-flow statistics flow-id 3

Related Commands

Command
Description

scsi-flow flow-id

Configures the SCSI flow services.

show scsi-flow

Displays SCSI flow configuration and status.


clear sdv

To clear specified SAN device virtualization parameters, use the clear sdv command in EXEC mode.

clear sdv {database vsan vsan-id | session vsan vsan-id | statistics vsan vsan-id}

Syntax Description

database

Clears the SDV database.

vsan vsan-id

Specifies the number of the VSAN. The range is 1 to 4093.

session

Clears the SDV session.

statistics

Clears the SDV statistics.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.1(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear SDV statistics.

switch# clear sdv statistics vsan 2

Related Commands

Command
Description

sdv enable

Enables or disables SAN device virtualization.

show sdv statistics

Displays SAN device virtualization statistics.


clear snmp hostconfig

To clear all SNMP hosts from the running configuration, use the clear snmp hostconfig command.

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.3(1a)

This command was introduced.


Usage Guidelines

You must save the changes to startup configuration to make them permanent.

Examples

The following example clears the SNMP host list.

switch# clear snmp hostconfig
switch#

Related Commands

Command
Description

show snmp host

Displays the SNMP status and setting information.


clear ssh hosts

To clear trusted SSH hosts, use the clear ssh hosts command in EXEC mode.

clear ssh hosts

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.2(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear reset-reason information from NVRAM and volatile storage.

switch# clear ssh hosts

Related Commands

Command
Description

show ssh hosts

Displays SSH host information.


clear system reset-reason

To clear the reset-reason information stored in NVRAM and volatile persistent storage, use the clear system reset-reason command in EXEC mode.

clear system reset-reason

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.3(2a)

This command was introduced.


Usage Guidelines

Use this command as listed below:

In a Cisco MDS 9500 Series switch, this command clears the reset-reason information stored in NVRAM and volatile persistent storage in the active and standby supervisor modules.

In a Cisco MDS 9200 Series switch, this command clears the reset-reason information stored in NVRAM and volatile persistent storage in the active supervisor module.

Examples

The following example shows how to clear trusted SSH hosts.

switch# clear system reset-reason

Related Commands

Command
Description

show system reset-reason

Displays system reset-reason information.


clear tacacs+ session

To clear TACACS+ Cisco Fabric Services (CFS) session configuration and locks, use the clear tacacs+ session command.

clear tacacs+ session

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, TACACS+ must be enabled using the tacacs+ enable command.

Examples

The following example shows how to clear the TACACS+ session.

switch# clear tacacs+ session

Related Commands

Command
Description

show tacacs+

Displays TACACS+ CFS distribution status and other details.

tacacs+ enable

Enables TACACS+.


clear tlport alpa-cache

To clear the entire contents of the alpa-cache, use the clear tlport alpa-cache command in EXEC mode.

clear tlport alpa-cache

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.3(5)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to clear a TL port ALPA cache.

switch# clear tlport alpa-cache

Related Commands

Command
Description

show tlport alpa-cache

Displays TL port alpa-cache information.


clear user

To clear trusted SSH hosts, use the clear user command in EXEC mode.

clear user username

Syntax Description

username

Specifies the user name to clear.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.2(1)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to log out a specified user.

switch# clear user vsam

Related Commands

Command
Description

show users

Displays user information.


clear vrrp

To clear all the software counters for the specified virtual router, use the clear vrrp command in EXEC mode.

clear vrrp {statistics [ipv4 | ipv6] vr number interface {gigabitethernet slot/port | mgmt 0 | port-channel portchannel-id | vsan vsan-id}}

Syntax Description

statistics

Clears global VRRP statistics.

ipv4

Clears IPv4 virtual router statistics.

ipv6

Clears IPv6 virtual router statistics.

vr number

Clears specific virtual router statistics and specifies a VR number from 1 to 255.

interface

Clears an interface.

gigabitethernet slot/port

Clears a specified Gigabit Ethernet interface.

mgmt 0

Specifies the management interface.

port-channel port-channel-number

Clears a specified PortChannel interface.The ID of the PortChannel interface is from 1 to 128.

vsan vsan-id

Clears a specified VSAN. The ID of the VSAN is from 1 to 4093.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.

3.0(1)

Added the ipv4 and ipv6 arguments.


Usage Guidelines

None.

Examples

The following example shows how to clear all the software counters for virtual router 7 on VSAN 2.

switch# clear vrrp vr 7 interface vsan2 

Related Commands

Command
Description

show vrrp

Displays VRRP configuration information.

vrrp

Enables VRRP.


clear zone

To clear all configured information in the zone server for a specified VSAN, use the clear zone command in EXEC mode.

clear zone {database | lock | statistics {lun-zoning | read-only-zoning}} vsan vsan-id

Syntax Description

database

Clears zone server database information.

lock

Clears a zone server database lock.

statistics

Clears zone server statistics.

lun-zoning

Clears LUN-zoning related statistics.

read-only-zoning

Clears read-only zoning related statistics.

vsan

Clears zone information for a VSAN.

vsan-id

The ID of the VSAN is from 1 to 4093.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.

3.0(1)

Added the lock option.


Usage Guidelines

After issuing a clear zone database command, you need to explicitly issue the copy running-config startup-config to ensure that the running configuration is used when you next start the switch.

When you issue the clear zone lock command from a remote switch, only the lock on that remote switch is cleared. When you issue the clear zone lock command from the switch where the lock originated, all locks in the VSAN are cleared.


Note The recommended method to clear a session lock on a switch where the lock originated is by issuing the no zone commit vsan command.


Examples

The following examples shows how to clear all configured information in the zone server for VSAN 1.

switch# clear zone database vsan 1

Related Commands

Command
Description

show zone

Displays zone information for any configured interface.


cli alias name

To define a command alias name, use the cli alias name command in configuration submode. To remove the user-defined command alias, use the no form of the command.

cli alias name command definition

no cli alias name command

Syntax Description

command

Specifies an alias command name. The maximum size is 30 characters.

definition

Specifies the alias command definition. The maximum size is 80 characters.


Defaults

alias command.

Command Modes

Configuration submode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

Follow these guidelines when defining a command alias:

Command aliases are global for all user sessions.

Command aliases persist across reboots.

Commands being aliased must be typed in full without abbreviation.

Command alias translation always takes precedence over any keyword in any configuration mode or submode.

Command alias support is only available on the supervisor module, not the switching modules.

Command alias configuration takes effect for other user sessions immediately.

You cannot override the default command alias alias, which is an alias for show cli alias.

Nesting of command aliases is permitted to a maximum depth of 1. One command alias can refer to another command alias that refers to a valid command, not to another command alias.

A command alias always replaces the first command keyword on the command line.

You can define command aliases in either EXEC mode or configuration submode.

Examples

The following example shows how to define command aliases in configuration submode.

switch# config t
switch(config)# cli alias name gigint interface gigabitethernet
switch(config)# cli alias name shintbr show interface brief
switch(config)# cli alias name shfcintup "shintbr| include up | include fc"

You can display the command aliases defined on the switch using the alias default command alias.

The following example shows how to display the command aliases defined on the switch.

switch# alias
CLI alias commands
==================
alias :show cli alias
gigint :interface gigabitethernet
shintbr :show interface brief
shfcintup :shintbr | include up | include fc

Related Commands

Command
Description

alias

Displays the default alias command for show cli alias.

show cli alias

Displays all configured aliases.


cli var name (EXEC)

To define a CLI session variable that persists only for the duration of a CLI session, use the cli var name command in either EXEC mode or configuration submode.

cli var name name value

To remove a user-defined session CLI variable, use the no form of the command as follows:

cli no var name name

Syntax Description

name

Specifies a variable name. The maximum size is 31 characters.

value

Specifies a variable value. The maximum size is 80.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

CLI session variables can be used as follows:

Entered directly on the command line.

Passed to the child script and initiated using the run-script command. The variables defined in the parent shell are available for use in the child run-script command process.

Passed as command-line arguments to the run-script command.

Referenced using the syntax $(variable).

CLI variables have the following limitation:

You cannot reference a variable through another variable using nested references.

Examples

The following example creates a user-defined CLI variable for a session.

switch# cli var name testinterface 3/4

The following example removes a user-defined CLI variable for a session.

switch# cli no var name testinterface 3/4


Related Commands

Command
Description

cli no var name

Removes a user-defined session CLI variable.

show cli variables

Displays all CLI variables (persistent, session and system).


cli var name (configuration)

To define a CLI variable that persists across CLI sessions and switch reloads, use the cli var name command in configuration submode. To remove the user-defined persistent CLI variable, use the no form of the command.

cli var name name value

no cli var name name

Syntax Description

name

Specifies a variable name. The maximum size is 31 characters.

value

Specifies a variable value. The maximum size is 80.


Defaults

None.

Command Modes

Configuration submode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

CLI variables can be used as follows:

Entered directly on the command line.

Passed to the child script and initiated using the run-script command. The variables defined in the parent shell are available for use in the child run-script command process.

Passed as command-line arguments to the run-script command.

Referenced using the syntax $(variable).

CLI variables have the following limitations:

You cannot reference a variable through another variable using nested references.

Examples

The following example creates a persistent user-defined CLI variable.

switch# config t
switch(config)# cli var name mgmtport mgmt 0

Related Commands

Command
Description

show cli variables

Displays all CLI variables (persistent, session and system).


clock

To configure the time zone or daylight savings time, use the clock command in configuration mode. To disable the daylight saving time adjustment, use the no form of the command.

clock {summer-time summer-time-name start-week start-day start-month start-time end-week end-day end-month end-time offset-minutes | timezone timezone-name hours-offset minute-offset}

no clock {summer-time summer-time-name start-week start-day start-month start-time end-week end-day end-month end-time offset-minutes | timezone timezone-name hours-offset minute-offset}

Syntax Description

summer-time

Specifies the name of the time zone in summer.

summer-time-name

Specifies the name of the daylight savings time zone, ranging from 1 to 8 characters.

start-week
end-week

Specifies the starting week and ending week, ranging from 1 (week 1) to 5 (week 5).

start-day
end-day

Specifies the starting day and ending day, ranging from 1 to 8 characters (Sunday to Saturday).

start-month
end-month

Specifies the starting month and ending month, ranging from 1 to 8 characters (January to December).

start-time
end-time

Specifies the starting time and ending time, ranging from 00:00 to 23:59.

offset-minutes

Specifies the daylight savings time offset, ranging from 1 to 1440 minutes.

timezone

Specifies the name of the time zone.

timezone-name

Specifies the name of the time zone, ranging from 1 to 8 characters.

hours-offset

Specifies the offset time in hours, ranging from 0 to 23. Include a dash before the number; for example, -23.

minutes-offset

Specifies the offset time in minutes, ranging from 0 to 59. Include a dash before the number; for example, -59.


Defaults

Coordinated Universal Time (UTC) is the same as Greenwich Mean Time (GMT).

Command Modes

Configuration mode.

Command History

Release
Modification

1.0(2)

This command was introduced.

3.1(1)

Added a new set of arguments for timezone.


Usage Guidelines

The appropriate daylight savings time zone name should be specified. If it is not, the default name is used.

Specify the hours-offset argument with a dash before the number; for example, -23. Specify the minutes-offset argument with a dash before the number; for example, -59.

Examples

The following example shows how to set Pacific Daylight Time starting on Sunday in the second week of March at 2:00 A.M. and ending on Sunday in the first week of November at 2:00 A.M.

switch# config t
switch# clock summer-time PDT 2 sunday march 02:00 1 sunday november 02:00 60

The following example shows how to set the time zone to Pacific Standard Time.

switch# config t
switch(config)# clock timezone PST 0 0

Related Commands

Command
Description

clock set

Changes the time on the switch.

show clock

Displays the current date and time.

show run

Displays changes made to the time zone configuration along with other configuration information.


clock set

To change the system time on a Cisco MDS 9000 Family switch, use the clock set command in EXEC mode.

clock set HH:MM:SS DD Month YYYY

Syntax Description

HH

The two-digit time in hours in military format (15 for 3 p.m.).

MM

The two-digit time in minutes (58).

SS

The two-digit time in seconds(15).

DD

The two-digit date (12).

Month

The month in words (August).

YYYY

The four-digit year (2002).


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

Generally, if the system is synchronized by a valid outside timing mechanism, such as an NTP clock source, or if you have a switch with calendar capability, you do not need to set the system clock. Use this command if no other time sources are available. The time specified in this command is relative to the configured time zone.

The clock set command changes are saved across system resets.

Examples

The following example displays the clock set command:

switch# clock set 15:58:15 12 August 2002
Mon Aug 12 15:58:00 PDT 2002

cloud discover

To initiate manual, on-demand cloud discovery, use the cloud discover command.

cloud discover [interface {gigabitethernet slot/port | port-channel port-channel-number}]

Syntax Description

interface

Specifies an interface for cloud discovery.

gigabitethernet slot/port

Specifies a Gigabit Ethernet interface.

port-channel port-channel-number

Specifies a PortChannel interface. The range for the PortChannel number is 1 to 256.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

This command is not supported on the Cisco MDS 9124 switch, the Cisco Fabric Switch for HP c-Class BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.

Examples

The following example initiates manual, on-demand cloud discovery.

switch# cloud discover

The following example initiates manual, on-demand cloud discovery on Gigabit Ethernet interface 2/2.

switch# cloud discover interface gigabitethernet 2/2

Related Commands

Command
Description

cloud discovery

Configures cloud discovery.

cloud-discovery enable

Enables discovery of cloud memberships.

show cloud discovery

Displays discovery information about the cloud.

show cloud membership

Displays information about members of the cloud.


cloud discovery

To configure cloud discovery, use the cloud discovery command in configuration mode. To remove the configuration, use the no form of the command.

cloud discovery {auto | fabric distribute | message icmp}

no cloud discovery {auto | fabric distribute | message icmp)

Syntax Description

auto

Enables auto fabric discovery.

fabric distribute

Enables cloud discovery fabric distribution.

message icmp

Configures Internet Control Message Protocol (ICMP) as the method for sending a discovery message.


Defaults

Auto.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

The iSNS server distributes cloud and membership information across all of the switches using CFS. Therefore, the cloud view is the same on all of the switches in the fabric.


Note If auto discovery is disabled, interface changes result in new members becoming part of an undiscovered cloud. No new clouds are formed.



Note This command is not supported on the Cisco MDS 9124 switch.


Examples

The following example enables auto cloud discovery.

switch# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# cloud disovery auto

The following example enables auto cloud discovery fabric distribution.

switch(config)# cloud disovery fabric distribute

The following example disables auto cloud discovery fabric distribution.

switch(config)# no cloud disovery fabric distribute

Related Commands

Command
Description

cloud discover

Initiates manual, on-demand cloud discovery.

cloud-discovery enable

Enables discovery of cloud memberships.

show cloud discovery

Displays cloud discovery information.

show cloud membership

Displays information about members of the cloud.


cloud-discovery enable

To enable discovery of cloud memberships, use the cloud-discovery command in configuration mode. To disable discovery of cloud memberships, use the no form of the command.

cloud-discovery enable

no cloud-discovery enable

Syntax Description

This command has no arguments or keywords.

Defaults

Disabled.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

This command is not supported on the Cisco MDS 9124 switch.

Examples

The following example enables discovery of cloud memberships.

switch# config terminal
Enter configuration commands, one per line. End with CNTL/Z.
switch(config)# cloud-discovery enable

The following example disables discovery of cloud memberships.

switch(config)# no cloud-discovery enable

Related Commands

Command
Description

cloud discover

Initiates manual, on-demand cloud discovery.

cloud discovery

Configures cloud discovery.

show cloud

Displays cloud discovery and membership information.


cluster

To configure a cluster feature, use the cluster command.

cluster enable

Syntax Description

enable

Enables or disables a cluster.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.2(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example enables the Cisco SME clustering:

switch# config terminal
switch(config)# cluster enable
switch(config)#

Command
Description

show sme cluster

Displays information about the Cisco SME cluster


code-page

Use the code-page command to configure the EBCDIC format. To disable the configuration or to revert to factory defaults, use the no form of the command.

code-page brazil | france | international-5 | italy | japan | spain-latinamerica | uk | us-canada

Syntax Description

code-page

Configures code page on a FICON-enabled VSAN

brazil

Configures the brazil EBCDIC format.

france

Configures the france EBCDIC format.

international-5

Configures the international-5 EBCDIC format.

italy

Configures the italy EBCDIC format.

japan

Configures the japan EBCDIC format.

spain-latinamerica

Configures the spain-latinamerica EBCDIC format.

uk

Configures the uk EBCDIC format.

us-canada

Configures the us-canada EBCDIC format.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

1.3(1)

This command was introduced.


Usage Guidelines

This is an optional configuration. If you are not sure of the EBCDIC format to be used, we recommend retaining the us-canada (default) option.

Examples

The following example configures the italy EBCDIC format.

switch(config)# ficon vsan 2
switch(config-ficon)# code-page italy

The following example reverts to the factory default of using the us-canada EBCDIC format.

switch(config-ficon)# no code-page

Related Commands

Command
Description

show ficon

Displays configured FICON details.

ficon vsan vsan-id

Enables FICON on the specified VSAN.


Release
Modification

1.3(1)

This command was introduced.


commit

To apply the pending configuration pertaining to the Call Home configuration session in progress, use the commit command in Call Home configuration submode.

commit

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

Call Home configuration submode.

Command History

Release
Modification

2.0(1b)

This command was introduced.


Usage Guidelines

CFS distribution must be enabled before you can commit the Call Home configuration.

Examples

The following example shows how to commit the Call Home configuration commands.

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# callhome
switch(config-callhome)# commit

Related Commands

Command
Description

callhome

Configures the Call Home function.

callhome test

Sends a dummy test message to the configured destination(s).

show callhome

Displays configured Call Home information.


contract-id

To configure the service contract ID of the customer with the Call Home function, use the contract-id command in Call Home configuration submode. To disable this feature, use the no form of the command.

contract-id customer-id

no contract-id customer-id

Syntax Description

contract-id

(Optional) Configures the service contract ID of the customer. Allows up to 64 characters for the contract number.


Defaults

None.

Command Modes

Call Home configuration submode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to configure the contract ID in the Call Home configuration.

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# callhome
switch(config-callhome)# contract-id Customer1234 

Related Commands

Command
Description

callhome

Configures the Call Home function.

callhome test

Sends a dummy test message to the configured destination(s).

show callhome

Displays configured Call Home information.


configure terminal

To enter the configuration mode, use the configure terminal command in EXEC mode.

configure terminal

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example enters the configuration mode:

switch# configure terminal
switch(config)# 

The following example enters the configuration mode using an abbreviated format of the command:

switch# config terminal
switch(config)# 



copy

To save a backup of the system software, use the copy command in EXEC mode.

copy source-URL destination-URL

Syntax Description

source-URL

The location URL or alias of the source file or directory to be copied.

destination-URL

The destination URL or alias of the copied file or directory.


The following table lists the aliases for source and destination URLs.

running-config

Specifies the configuration currently running on the switch. The system:running-config keyword represents the current running configuration file.

startup-config

Specifies the configuration used during initialization (startup). You can copy the startup configuration from NVRAM. The nvram:startup-config keyword represents the configuration file used during initialization.

bootflash:

Specifies the location for internal bootflash memory.

log:

Specifies the location for the log file system.

slot0:

Specifies the location for the CompactFlash memory or PCMCIA card.

volatile:

Specifies the location for the volatile file system.

system:

Specifies the location for system memory, which includes the running configuration.

fabric

Specifies a fabric wide startup configuration update using Cisco Fabric Services (CFS) where all the remote switches in the fabric copy their running configuration (source) file into their startup configuration (destination) file. The syntax for this command is copy running-config startup-config fabric.

tftp:

Specifies the location for a Trivial File Transfer Protocol (TFTP) network server. The syntax for this alias is tftp:[[//location]/directory]/filename.

ftp:

Specifies the location for a File Transfer Protocol (FTP) network server. The syntax for this alias is ftp:[[//location]/directory]/filename.

scp:

Specifies the location for a secure copy (scp) network server. The syntax for this alias is scp:[[//location]/directory]/filename.

sftp:

Specifies the location for a Secure Trivial File Transfer Protocol (SFTP) network server. The syntax for this alias is sftp:[[//location]/directory]/filename.

log:

Specifies the location for log files stored in the same directory.

debug:

Specifies the location for the debug files stored in the debug partition

nvram:

Specifies the switch NVRAM.

core:

Specifies the location of the cores from any switching or supervisor module to an external flash (slot 0) or a TFTP server.

filename

The name of the Flash file.

sup-1
sup-2

The number of the supervisor module, where sup-1 is the slot 5 supervisor (active) and sup-2 is the slot 6 supervisor (standby).


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.3(4)

Command modified.

2.1(1a)

Added the fabric keyword and functionality.


Usage Guidelines

This command makes the running and the backup copy of the software identical.

A file can only be copied from an active supervisor to a standby supervisor, not from standby to active.

This command does not allow 127.x.x.x IP addresses.

The copy function will not be completed if the required space is not available in the directory. First change to the required directory (for example, cd bootflash:) and verify the available space (for example, dir bootflash:).

The entire copying process may take several minutes.

Do not copy a file from an external source directly to the standby supervisor. You must copy from the external source to the active supervisor, and then copy the saved file to the standby supervisor.

You can save cores (from the active supervisor module, the standby supervisor module, or any switching module) to an external flash (slot 0) or to a TFTP server in one of two ways:

On demand—to copy a single file based on the provided process ID.

Periodically—to copy core files periodically as configured by the user.

You copy the logfile to a different location using the copy log:messages command.

The debug partition contains debugging files created by the software for troubleshooting purposes.

The running-config startup-config fabric parameters allow you to use CFS to force every switch in the Fibre Channel fabric to copy their running configuration (source) to their startup configuration (destination).


Note If any remote switch fails to complete the copy running-config startup-config fabric process, the initiator switch also does not complete saving its startup-configuration. This means, both the remote switch and the initiator switch have failed to save their startup-configuration (the old startup-configuration reverts back). All the other switches in the network would have succeeded.


Examples

The following example saves your configuration to the startup configuration.

switch# copy system:running-config nvram:startup-config 

The following example copies the file called samplefile from the slot0 directory to the mystorage directory.

switch# copy slot0:samplefile slot0:mystorage/samplefile

The following example copies a file from the current directory level.

switch# copy samplefile mystorage/samplefile

If the current directory is slot0:mydir, this command copies slot0:mydir/samplefile to slot0:mydir/mystorage/samplefile.

The following example downloads a configuration file from an external CompactFlash to the running configuration.

switch copy slot0:dns-config.cfg system:running-config

The following example saves a running configuration file to an external CompactFlash.

switch# copy system:running-config slot0:dns-config.cfg

The following example saves a startup configuration file to an external CompactFlash.

switch# copy system:startup-config slot0:dns-config.cfg

The following example uses CFS to cause all switches in the fabric to copy their running configuration (source) file to their startup configuration (destination) file.

switch# copy running-config startup-config fabric
[########################################] 100%
switch# 


Note If any remote switch fails to complete the copy running-config startup-config fabric process, the initiator switch also does not complete saving its startup-configuration. This means, both the remote switch and the initiator switch have failed to save their startup-configuration (the old startup-configuration reverts back). All the other switches in the network would have succeeded.


The following example creates a backup copy of the binary configuration.

switch# copy nvram:startup-config nvram:snapshot-config

The following example copies an image in bootflash on the active supervisor to the bootflash on the standby supervisor.

switch# copy bootflash:myimage bootflash://sup-2/myimage

The following example creates a running configuration copy in bootflash.

switch# copy system:running-config bootflash:my-config

The following examples creates a startup configuration copy in bootflash.

switch# copy nvram:startup-config bootflash:my-config

Related Commands

Command
Description

cd

Changes the default directory or file system.

dir

Displays a list of files on a file system.

reload

Reloads the operating system.

show version

Displays the version of the running configuration file.


copy licenses

To save a backup of the installed license files, use the copy licenses command in EXEC mode.

copy licenses source-URL destination-URL

Syntax Description

source-URL

The location URL or alias of the source file or directory to be copied.

destination-URL

The destination URL or alias of the copied file or directory.


The following table lists the aliases for source and destination URLs.

bootflash:

Specifies the location for internal bootflash memory.

slot0:

Specifies the location for the CompactFlash memory or PCMCIA card.

volatile:

Specifies the location for the volatile file system.

filename

Specifies the name of the license file with a.tar extension.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

1.3(4)

This command was introduced.


Usage Guidelines

The copy function will not be completed if the required space is not available in the directory. First change to the required directory (for example, cd bootflash:) and verify the available space (for example, dir bootflash:).

We recommend backing-up your license files immediately after installing them and just before issuing a write erase command.

Examples

The following example saves a file called Enterprise.tar to the bootflash: directory.

switch# copy licenses bootflash:/Enterprise.tar
Backing up license done

Related Commands

Command
Description

cd

Changes the default directory or file system.

dir

Displays a list of files on a file system.

install license

Installs a license file.


copy ssm-nvram standby-sup

To copy the contents of the Storage Services Module (SSM) NVRAM to the standby Supervisor 2 module when migrating from a Supervisor 1 to Supervisor 2 module, use the copy ssm-nvram standby-sup command in EXEC mode.

copy ssm-nvram standby-sup

Syntax Description

This command has no arguments or keywords.

Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

This command should only be used for migrating from a Supervisor 1 to a Supervisor 2 module. When both modules in the switch are the same, you should not use this command; use the copy command instead.

Examples

The following example copies the contents of the SSM NVRAM to the standby Supervisor 2 module.

switch# copy ssm-nvram standby-sup

Related Commands

Command
Description

copy

Saves a backup of the system software.


counter

To configure an indivisual counter to override the default configuration, use the counter command. To reset the value of the counter to default value, use the no form of the command.

counter{link-loss|sync-loss|invalid-crc|invalid-words|protocol-error|rx-performance|tx-perfor mance|state-change} poll-interval <interval> {absolute|delta} rising-threshold <rising threshold> event <event id> falling-threshold <low threshold> event <event id>

Syntax Description

link loss

Configures link loss counter.

sync-loss

Configures sync loss counter.

invalid-crc

Configures invalid CRC counter.

invalid-words

Configures invalid words counter.

protocol-errors

Configures protocol error counter.

rx-performance

Counfigures RX performance counter.

tx-performance

Configures TX performance counter.

state-change

Configures state-change counter.

poll-interval

Configures poll interval for counter.

interval

Displays poll interval in seconds.

absolute/delta

Displays the threshold type.

rising-threshold

Configures the upper threshold value.

rising-threshold

Sets numerical upper threshold limit.

event

Configures high threshold event.

event-id

Displays event ID from event configuration.

falling-threshold

Configures the lower threshold value.

low-threshold

Sets numerical low threshold limit.


Defaults

None.

Command Modes

Configuration submode.

Command History

Release
Modification

3.4(1)

This command was introduced.


Usage Guidelines

This command shows each threshold per interfaceand the threshold values inherited from the policies.


Note The falling threshold and the event need not be configured and are optional. The no counter command will reset the value of the counter to the default value.


The following example shows all the changes made using the port-type and counter commands by using the show port-monitor [name] and the show running config command:

switch(config-port-monitor)# do show port-monitor cisco
Policy Name : cisco Status : Active
Port type : All Ports
Counter Threshold Interval Rising Threshold Falling Threshold Stat
------- --------- -------- ---------------- ------------------ ----
Link Loss Delta 60 5 1 Active
Sync Loss Delta 60 5 1 Active
Protocol Error Delta 60 1 0 Active
Signal Loss Delta 60 5 1 Active
Invalid Words Delta 60 1 0 Active
Invalid CRC's Delta 60 5 1 Active
RX Performance Delta 60 2147483648 524288000 Active
TX Performance Absolute 120 1800 1 1700 3 Active
State Change Delta 60 1 4 0 1 4 Active
------- --------- -------- ---------------- ------------------ ----
switch(config-port-monitor)#

Related Commandss

Command
Description

Show port-monitor

Shows port monitor policies.


crypto ca authenticate

To associate and authenticate a certificate of the certificate authority (CA) and configure its CA certificate (or certificate chain), use the crypto ca authenticate command in configuration mode. The CA certificate or certificate chain is assumed to already be available in Privacy Enhanced Mail (PEM) (base-64) encoded format.

crypto ca authenticate trustpoint-label

Syntax Description

trustpoint-label

Specifies the name of the trust point. The maximum size is 64 characters.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

This command authenticates the CA to the switch by obtaining the self-signed certificate of the CA that contains the public key of the CA. Because the CA signs its own certificate, you should manually authenticate the public key of the CA by contacting the CA administrator when you execute this command.

This command is required when you initially configure certificate authority support for the switch. Before you attempt CA authentication, first create the trust point using the crypto ca trustpoint command. The CA certificate fingerprint (the MD5 or SHA hash of the certificate) is generally published by the CA. When authenticating the CA, the certificate fingerprint is displayed. The administrator needs to compare it with the one published by the CA and accept the CA certificate only if it matches.

If the CA being authenticated is a subordinate CA (meaning that is is not self-signed), then it is certified by another CA which in turn my be certified by yet another CA and so on until there is a self-signed CA. In this case, the subordinate CA in question is said to have a CA certificate chain certifying it. The entire chain must be input during CA authentication. The maximum length that the CA certificate chain supports is ten.

The trust point CA is the certificate authority configured on the switch as the trusted CA. Any peer certificate obtained will be accepted if it is signed by a locally trusted CA or its subordinates.


Note The trust point configuration (created by the crypto ca trustpoint command) is persistent only if saved explicitly using the copy running-config startup-config command. The certificates and CRL associated to a trust point are automatically made persistent if the trust point in question was already saved in the startup configuration. Conversely, if the trust point was not saved in the startup configuration, the certificates and CRL associated to it are not made persistent automatically because they do not exist without the corresponding trust point after the switch reboots.

To ensure the that the configured certificates, CRLs and key pairs are made persistent, always save the running configuration to the startup configuration


Examples

The following example authenticates a CA certificate called admin-ca.

switch# config terminal
switch(config)# crypto ca authenticate myCA
input (cut & paste) CA certificate (chain) in PEM format;
end the input with a line containing only END OF INPUT :
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
 END OF INPUT
Fingerprint(s): MD5 Fingerprint=65:84:9A:27:D5:71:03:33:9C:12:23:92:38:6F:78:12
Do you accept this certificate? [yes/no]:y

Related Commands

Command
Description

crypto ca trustpoint

Configures the trust point.

show crypto ca certificates

Displays configured trust point certificates.

show crypto ca trustpoints

Displays trust point configurations.


crypto ca crl request

To configure a new certificate revocation list (CRL) downloaded from the certificate authority (CA), use the crypto ca crl request command in configuration mode.

crypto ca crl request trustpoint-label source-file

Syntax Description

trustpoint-label

Specifies the name of the trust point. The maximum size is 64 characters.

source-file

Specifies the location of the CRL in the form bootflash:filename. The maximum size is 512.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

Cisco MDS SAN-OS allows you to pre-download CRLs for the trust points and cache the CRLs in the cert store using the crypto ca crl request command. During the verification of a peer certificate by IPsec/IKE or SSH, the issuer CA's CRL will be consulted only if it had already been configured locally, and revocation checking is configured to use CRL. Otherwise, CRL checking is not done and a certificate is considered to be not revoked if no other revocation checking methods are configured. This mode of CRL checking is called CRL optional.

The other modes of revocation checking are called CRL best-effort and CRL mandatory. In these modes, if the CRL is not found locally, there is an attempt to fetch it automatically from the CA. These modes are not supported in MDS SAN-OS release 3.0(1).

The CRL file specified should contain the latest CRL in either Privacy Enhanced Mail (PEM) format or Distinguished Encoding Rules (DER) format.


Note The trust point configuration (created by the crypto ca trustpoint command) is persistent only if saved explicitly using the copy running-config startup-config command. The certificates and CRL associated to a trust point are automatically made persistent if the trust point in question was already saved in the startup configuration. Conversely, if the trust point was not saved in the startup configuration, the certificates and CRL associated to it are not made persistent automatically because they do not exist without the corresponding trust point after the switch reboots.

To ensure the that the configured certificates, CRLs and key pairs are made persistent, always save the running configuration to the startup configuration.


Examples

The following example configures a CRL for the trust point or replaces the current CRL.

switch# config t
switch(config)# crypto ca crl request admin-ca bootflash:admin-ca.crl

Related Commands

Command
Description

revocation-check

Configures trust point revocation check methods.

show crypto ca crl

Displays configured certificate revocation lists (CRL).



crypto ca enroll

To request a certificate for the switch's RSA key pair created for this trust point CA, use the crypto ca enroll command in configuration mode.

crypto ca enroll trustpoint-label

Syntax Description

trustpoint-label

Specifies the name of the trust point. The maximum size is 64 characters.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

An MDS switch can enroll with the trust point CA to get an identity in the form of a certificate. You can enroll your switch with multiple trust points, thereby getting a separate identity certificate from each.

When enrolling with a trust point, you must specify an RSA key pair to be certified. This key pair must be generated and associated to the trust point before generating the enrollment request. The association between the trust point, key pair, and identity certificate is valid until it is explicitly removed by deleting the identity certificate first, followed by disassociating the key pair, and deleting the CA certificates (in any order), and finally deleting the trust point itself, in that order only.

Use the crypto ca enroll command to generate a request to obtain an identity certificate from each of your trust points corresponding to authenticated CAs. The certificate signing request (CSR) generated is per Public-Key Cryptography Standards (PKCS) #10 standard, and is displayed in PEM format. Cut and paste it and submit it to the corresponding CA through e-mail or the CA website. The CA administrator issues the certificate and makes it available to you either through the website or by sending it in e-mail. You need to import the obtained identity certificate to the corresponding trust point using the crypto ca import trustpoint-label certificate command.

The challenge password is not saved with the configuration. This password is required in the event that your certificate needs to be revoked, so you must remember this password.

Examples

The following example generates a certificate request for an authenticated CA.

switch# config t
switch(config)# crypto ca enroll myCA
 Create the certificate request ..
 Create a challenge password. You will need to verbally provide this
  password to the CA Administrator in order to revoke your certificate.
  For security reasons your password will not be saved in the configuration.
  Please make a note of it.
  Password:nbv123
 The subject name in the certificate will be: Vegas-1.cisco.com
 Include the switch serial number in the subject name? [yes/no]:no
 Include an IP address in the subject name [yes/no]:yes
ip address:172.22.31.162
 The certificate request will be displayed...
-----BEGIN CERTIFICATE REQUEST-----
MIIBqzCCARQCAQAwHDEaMBgGA1UEAxMRVmVnYXMtMS5jaXNjby5jb20wgZ8wDQYJ
KoZIhvcNAQEBBQADgY0AMIGJAoGBAL8Y1UAJ2NC7jUJ1DVaSMqNIgJ2kt8rl4lKY
0JC6ManNy4qxk8VeMXZSiLJ4JgTzKWdxbLDkTTysnjuCXGvjb+wj0hEhv/y51T9y
P2NJJ8ornqShrvFZgC7ysN/PyMwKcgzhbVpj+rargZvHtGJ91XTq4WoVkSCzXv8S
VqyH0vEvAgMBAAGgTzAVBgkqhkiG9w0BCQcxCBMGbmJ2MTIzMDYGCSqGSIb3DQEJ
DjEpMCcwJQYDVR0RAQH/BBswGYIRVmVnYXMtMS5jaXNjby5jb22HBKwWH6IwDQYJ
KoZIhvcNAQEEBQADgYEAkT60KER6Qo8nj0sDXZVHSfJZh6K6JtDz3Gkd99GlFWgt
PftrNcWUE/pw6HayfQl2T3ecgNwel2d15133YBF2bktExiI6Ul88nTOjglXMjja8
8a23bNDpNsM8rklwA6hWkrVL8NUZEFJxqbjfngPNTZacJCUS6ZqKCMetbKytUx0=
-----END CERTIFICATE REQUEST-----

Related Commands% The 'show crypto ca certificate' command will also show the fingerprint.

Command
Description

crypto ca import trustpoint-label certificate

Imports the identity certificate obtained fromthe CA to the trust point.

crypto key generate rsa

Generates an RSA key pair.

rsakeypair

Configures and associates the RSA key pair details to a trust point.

show crypto key mypubkey rsa

Displays all RSA public key configurations.


crypto ca export

To export the RSA key pair and the associated certificates (identity and CA) of a trust point within a Public-Key Cryptography Standards (PKCS) #12 format file to a specified location, use the crypto ca export command in configuration mode.

crypto ca export trustpoint-label pkcs12 destination-file-url pkcs12-password

Syntax Description

trustpoint-label

Specifies the name of the trust point. The maximum size is 64 characters.

pkcs12 destination-file-url

Specifies a destination file in bootflash:filename format. The maximum size is 512 characters.

pkcs12-password

Specifies the password to be used to protect the RSA private key inthe exported file. The maximum size is 64 characters.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

You can export the identity certificate along with the associated RSA key pair and CA certificate (or certificate chain) to a PKCS #12 format file for backup purposes. You can later import the certificate and RSA key pair to recover from a system crash on your switch.

Examples

The following example shows how to export a certificate and key pair in PKCS #12 format.

switch# config terminal
switch(config)# crypto ca export admin-ca pkcs12 bootflash:adminid.p12 nbv123

Related Commands

Command
Description

crypto ca import trustpoint-label certificate

Imports the identity certificate obtained from the CA to the trust point.

crypto ca import trustpoint-label pkcs12

Imports the identity certificate and associated RSA key pair and CA certificate (chain) to a trust point.

crypto key generate rsa

Generates an RSA key pair.

rsakeypair

Configures and associates the RSA key pair details to a trust point.

show crypto key mypubkey rsa

Displays any RSA public key configurations.


crypto ca import

To import the identity certificate alone in PEM format or the identity certificate and associated RSA key pair and CA certificate (or certificate chain) in Public-Key Cryptography Standards (PKCS) #12 form, use the crypto ca import command in configuration mode.

crypto ca import trustpoint-label {certificate | pkcs12 source-file-url pkcs12-password}

Syntax Description

trustpoint-label

Specifies the name of the trust point. The maximum size is 64 characters.

pkcs12 source-file-url

Specifies a source file in bootflash:filename format. The maximum size is 512 characters.

pkcs12-password

Specifies the password that was used to protect the RSA private key in the imported PKCS#12 file. The maximum size is 64 characters.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

The first form of the command, crypto ca import trustpoint-label certificate, is used to import (by cut and paste means) the identity certificate obtained from the CA, corresponding to the enrollment request generated earlier in the trust point and submitted to the CA. The administrator is prompted to cut and paste the certificate.

The second form of the command, crypto ca import trustpoint-label pkcs12 source-file-url pkcs12-password, is used to import the complete identity information (that is, the identity certficate and associated RSA key pair and CA certificate or certficate chain) into an empty trust point. This command is useful for restoring the configuration after a system goes down.


Note The trust point configuration (created by the crypto ca trustpoint command) is persistent only if saved explicitly using the copy running-config startup-config command. The certificates and CRL associated to a trust point are automatically made persistent if the trust point in question was already saved in the startup configuration. Conversely, if the trust point was not saved in the startup configuration, the certificates and CRL associated to it are not made persistent automatically because they do not exist without the corresponding trust point after the switch reboots.

To ensure the that the configured certificates, CRLs and key pairs are made persistent, always save the running configuration to the startup configuration


Examples

The following example installs an identity certificate obtained from a CA corresponding to an enrollment request made and submitted earlier.

switch# config t
switch(config)# crypto ca import myCA certificate
input (cut & paste) certificate in PEM format:
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----

The following example shows how to import a certificate and key pair in a Public-Key Cryptography Standards (PKCS) #12 format file.

switch# config t
witch(config)# crypto ca import admin-ca pkcs12 bootflash:adminid.p12 nbv123

Related Commands

Command
Description

crypto ca export trustpoint-label pkcs12

Exports the RSA key pair and associated certificates of a trust point.

crypto ca enroll

Generates a certificate signing request for a trust point.

crypto key generate rsa

Generates the RSA key pair.

rsakeypair

Configures trust point RSA key pair details.

show crypto ca certificates

Displays the identity and CA certificate details.

show crypto key mypubkey rsa

Displays any RSA public key configurations.


crypto ca test verify

To verify a certificate file, use the crypto ca test verify command in configuration mode.

crypto ca test verify certificate-file

Syntax Description

certificate-file

Specifies the certificate filename in the form bootflash:filename. The maximum size is 512 characters.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

The crypto ca test verify command is only a test command. It verifies the specified certificate in PEM format by using the trusted CAs configured and by consulting the CRL or OCSP if needed, as per the revocation checking configuration.

Examples

The following example shows how to verify a certificate file. Verify status code 0 means the verification is successful.

switch(config)# crypto ca test verify bootflash:id1.pem
verify status oode:0
verify error msg:

Related Commands

Command
Description

show crypto ca certificates

Displays configured trust point certificates.


crypto ca trustpoint

To create a trust point certificate authority (CA) that the switch should trust, and enter trust point configuration submode (config-trustpoint), use the crypto ca trustpoint command in configuration mode. To remove the trust point, use the no form of the command.

crypto ca trustpoint trustpoint-label

no crypto ca trustpoint trustpoint-label

Syntax Description

trustpoint-label

Specifies the name of the trust point. The maximum size is 64 characters.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

Trust points have the following characteristics:

A trust point corresponds to a single CA, which an MDS switch trusts for peer certificate verification for any application.

A CA must be explicitly associated to a trust point using the CA authentication process using the crypto ca authenticate command.

An MDS switch can have many trust points and all applications on the switch can trust a peer certificate issued by any of the trust point CAs.

A trust point is not restricted to a specific application.

The MDS switch can optionally enroll with a trust point CA to get an indemnity certificate for itself.

You do not need to designate one or more trust points to an application. Any application should be able to use any certificate issued by any trust point as long as the certificate purpose satisfies application requirement.

You do not need more than one identity certificate from a trust point or more than one key pair to be associated to a trust point. A CA certifies a given identity (name) only once and does not issue multiple certificates with the same subject name. If you need more than one identity certificate for a CA, define another trust point for the same CA, associate another key pair to it, and have it certified, provided CA allows multiple certificates with same subject name.


Note Before using the no crypto ca trustpoint command to remove the trust point, first delete the identity certificate and CA certificate (or certificate chain) and then disassociated the RSA key pair from the trust point. The switch enforces this behavior to prevent the accidental removal of the trust point along with the certificates.


Examples

The following example declares a trust point CA that the switch should trust and enters trust point configuration submode.

switch# config terminal 
switch(config)# crypto ca trustpoint admin-ca
switch(config-trustpoint)# 


The following example removes the trust point CA.

switch# config terminal 

switch(config)# no crypto ca trustpoint admin-ca

Related Commands

Command
Description

crypto ca authenticate

Authenticates the certificate of the certificate authority.

crypto ca enroll

Generates a certificate signing request for a trust point.

show crypto ca certificates

Displays the identity and CA certificate details.

show crypto ca trustpoints

Displays trust point configurations.


crypto global domain ipsec security-association lifetime

To configure global parameters for IPsec, use the crypto global domain ipsec security-association lifetime command. To revert to the default, use the no form of the command.

crypto global domain ipsec security-association lifetime {gigabytes number | kilobytes number |
megabytes number | seconds number}

no crypto global domain ipsec security-association lifetime {gigabytes | kilobytes | megabytes | seconds}

Syntax Description

gigabytes number

Specifies a volume-based key duration in gigabytes. The range is 1 to 4095.

kilobytes number

Specifies a volume-based key duration in kilobytes. The range is 2560 to 2147483647.

megabytes number

Specifies a volume-based key duration in megabytes. The range is 3 to 4193280.

seconds number

Specifies a time-based key duration in seconds. The range is 120 to 86400.


Defaults

450 gigabytes and 3600 seconds

Command Modes

Configuration mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, IPsec must be enabled using the crypto ipsec enable command.

The global security association lifetime value can be overridden for individual IPsec crypto maps using the set command in IPsec crypto map configuration submode.

Examples

The following example shows how to configure the system default before the IPsec.

switch# config terminal
switch(config)# crypto global domain ipsec security-association lifetime gigabytes 500

Related Commands

Command
Description

crypto ipsec enable

Enables IPsec.

set (IPsec crypto map configuration submode)

Configures IPsec crypto map entry parameters.

show crypto global domain ipsec

Displays the global attributes for IPsec.


crypto ike domain ipsec

To enter IKE configuration submode, use the crypto ike domain ipsec command.

crypto ike domain ipsec

Syntax Description

This command has no other arguments or keywords.

Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To configure IKE protocol attributes, IKE must be enabled using the crypto ike enable command.


Note This command is not supported on the Cisco MDS 9124 switch, the Cisco Fabric Switch for HP c-Class BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.


Examples

The following example shows how enter IKE configuration mode.

switch# config terminal
switch(config)# crypto ike domain ipsec
switch(config-ike-ipsec)# 

Related Commands

Command
Description

crypto ike enable

Enables the IKE protocol.

show crypto ike domain ipsec

Displays IKE information for the IPsec domain.


crypto ike domain ipsec rekey sa

To rekey an IKE crypto security association (SA) in the IPsec domain, use the crypto ike domain ipsec rekey sa command.

crypto ike domain ipsec rekey sa sa-index

Syntax Description

sa-index

Specifies the SA index. The range is 1 to 2147483647.


Defaults

None.

Command Modes

EXEC mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, IKE must be enabled using the crypto ike enable command.


Note This command is not supported on the Cisco MDS 9124 switch.


Examples

The following example rekeys an IKE crypto SA.

switch# crypto ike domain ipsec rekey sa 100

Related Commands

Command
Description

crypto ike enable

Enables the IKE protocol.

show crypto ike domain ipsec

Displays IKE information for the IPsec domain.


crypto ike enable

To enable IKE, use the crypto ike enable command. To disable IKE, use the no form of the command.

crypto ike enable

no crypto ike enable

Syntax Description

This command has no other arguments or keywords.

Defaults

Disabled.

Command Modes

Configuration mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

The IKE protocol cannot be disabled unless IPsec is disabled.

The configuration and verification commands for the IKE protocol are only available when the IKE protocol is enabled on the switch. When you disable this feature, all related configurations are automatically discarded.


Note This command is not supported on the Cisco MDS 9124 switch.


Examples

The following example shows how to enable the IKE protocol.

switch# config terminal
switch(config)# crypto ike enable

Related Commands

Command
Description

clear crypto ike domain ipsec sa

Clears IKE protocol information clear IKE SAs.

crypto ipsec enable

Enables IPsec.

show crypto ike domain ipsec

Displays IKE information for the IPsec domain.


crypto ipsec enable

To enable IPsec, use the crypto ipsec enable command. To disable IPsec, use the no form of the command.

crypto ipsec enable

no crypto ipsec enable

Syntax Description

This command has no other arguments or keywords.

Defaults

Disabled.

Command Modes

Configuration mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To enable the IPsec, the IKE protocol must be enabled using the crypto ike enable command.

The configuration and verification commands for IPsec are only available when IPsec is enabled on the switch. When you disable this feature, all related configurations are automatically discarded.


Note This command is not supported on the Cisco MDS 9124 switch, the Cisco Fabric Switch for HP c-Class BladeSystem, and the Cisco Fabric Switch for IBM BladeCenter.


Examples

The following example shows how to enable IPsec.

switch# config terminal
switch(config)# crypto ipsec enable

Related Commands

Command
Description

show crypto global domain ipsec

Displays IPsec crypto global information.

show crypto map domain ipsec

Displays IPsec crypto map information.

show crypto transform-set domain ipsec

Displays IPsec crypto transform set information.


crypto key generate rsa

To generate an RSA key pair, use the crypto key generate rsa command in configuration mode.

crypto key generate rsa [label key-pair-label] [exportable] [modulus key-pair-size]

Syntax Description

label key-pair-label

Specifies the name of the key pair. The maximum size is 64 characters.

exportable

Configures the key pair to be exportable.

modulus key-pair-size

Specifies the size of the key pair. The size ranges from 512 to 2048.


Defaults

By default, the key is not exportable.
The default label is switch FQDN.
The default modulus is 512.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

You can generate one or more RSA key pairs and associate each RSA key pair with a distinct trust point CA, where the MDS switch enrolls to obtain identity certificates. The MDS switch needs only one identity per CA, which consists of one key pair and one identity certificate.

Cisco MDS SAN-OS allows you to generate RSA key pairs with a configurable key size (or modulus). The default key size is 512. Valid modulus values are 512, 768, 1024, 1536, and 2048.

You can also configure an RSA key pair label. The default key pair label is FQDN.

Examples

The following example shows how to configure an RSA key pair called newkeypair.

switch# config terminal
switch(config)# crypto key generate rsa label newkeypair

The following example shows how to configure an RSA key pair called testkey, of size 768, that is exportable.

switch# config terminal
switch(config)# crypto key generate rsa label testkey exportable modulus 768

The following example shows how to generate an exportable RSA key with the switch name as the default label and 512 as the default modulus.

switch# config terminal
switch(config)# crypto key generate rsa exportable

Related Commands

Command
Description

crypto key zeroize rsa

Deletes RSA key pair configurations.

rsakeypair

Configures trust point RSA key pair details.

show crypto key mypubkey rsa

Displays information about configured RSA key pairs.


crypto key zeroize rsa

To delete an RSA key pair from the switch, use the crypto key zeroize rsa command in configuration mode.

crypto key zeroize rsa key-pair-label

Syntax Description

key-pair-label

Specifies the RSA key pair to delete. The maximum size is 64 characters.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

3.0(1)

This command was introduced.


Usage Guidelines

If you believe the RSA key pair on your switch was compromised in some way and should no longer be used, you should delete it.

After you delete the RSA key pair on the switch, ask the CA administrator to revoke your switch's certificates at the CA. You must supply the challenge password you created when you originally requested the switch's certificates.

Before deleting a key pair, you should delete the identity certificates corresponding to it in various trust points if the identity certificates exist, and then disassociate the key pair from those trust points. The purpose of this is to prevent accidental deletion of a key pair for which there exists an identity certificate in a trust point.


Note The trust point configuration, certificates, and key pair configurations are made persistent only after saving to the startup configuration. To be consistent with this configuration behavior, the delete behavior is also the same. That is, the deletions are made persistent only after saving to the startup configuration.

Use the copy running-config startup-config command to make the certificate and key pair deletions persistent.


Examples

The following example shows how to delete an RSA key pair called testkey.

switch# config terminal
switch(config)# crypto key zeroize rsa testkey




Related Commands

Command
Description

crypto key generate rsa

Configures an RSA key pair.

rsakeypair

Configures trust point RSA key pair details.

show crypto key mypubkey rsa

Displays information about configured RSA key pairs.


crypto map domain ipsec (configuration mode)

To specify an IPsec crypto map and enter IPsec crypto map configuration mode, use the crypto map domain ipsec command. To delete an IPsec crypto map or a specific entry in an IPsec crypto map, use the no form of the command.

crypto map domain ipsec map-name seq-number

no crypto map domain ipsec map-name [seq-number]

Syntax Description

map-name

Specifies the map name. Maximum length is 63 characters.

seq-number

Specifies the sequence number for the map entry. The range is 1 to 65535.


Defaults

None.

Command Modes

Configuration mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, IPsec must be enabled using the crypto ipsec enable command.

The sequence number determines the order in which IPsec crypto map entries are applied.

Examples

The following example specifies entry 1 for IPsec crypto map IPsecMap and enters IPsec crypto map configuration mode.

switch# config terminal
switch(config)# crypto map domain ipsec IPsecMap 1
switch(config-crypto-map-ip)#

The following example deletes an IPsec crypto map entry.

switch# config terminal
switch(config)# no crypto map domain ipsec IPsecMap 1

The following example deletes the entire IPsec crypto map.

switch# config terminal
switch(config)# no crypto map domain ipsec IPsecMap

Related Commands

Command
Description

crypto ipsec enable

Enables IPsec.

crypto transform-set domain ipsec

Configures the transform set for an IPsec crypto map.

set (IPsec crypto map configuration submode)

Configures IPsec crypto map entry parameters.

show crypto map domain ipsec

Displays IPsec crypto map information.


crypto map domain ipsec (interface configuration submode)

To configure an IPsec crypto map on a Gigabit Ethernet interface, use the crypto map domain ipsec command in interface configuration submode. To remove the IPsec crypto map, use the no form of the command.

crypto map domain ipsec map-name

no crypto map domain ipsec

Syntax Description

map-name

Specifies the map name. Maximum length is 63 characters.


Defaults

None.

Command Modes

Interface configuration submode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, IPsec must be enabled using the crypto ipsec enable command.

The sequence number determines the order in which crypto maps are applied.

Examples

The following example shows how to specify an IPsec crypto map for a Gigabit Ethernet interface.

switch# config terminal
switch(config)# interface gigabitethernet 1/2
switch(config-if)# crypto map domain ipsec IPsecMap

Related Commands

Command
Description

crypto ipsec enable

Enables IPsec.

show crypto map domain ipsec

Displays IPsec crypto map information.

show interface

Displays interface information.


crypto transform-set domain ipsec

To create and configure IPsec transform sets, use the crypto transform-set domain ipsec command. To delete an IPsec transform set, use the no form of the command.

crypto transform-set domain ipsec set-name {esp-3des | esp-des} [esp-aes-xcbc-mac | esp-md5-hmac | esp-sha1-hmac]

crypto transform-set domain ipsec set-name esp-aes {128 | 256} [ctr {esp-aes-xcbc-mac | esp-md5-hmac | esp-sha1-hmac} | esp-aes-xcbc-mac | esp-md5-hmac | esp-sha1-hmac]

crypto transform-set domain ipsec set-name [{esp-3des | esp-des} [esp-aes-xcbc-mac | esp-md5-hmac | esp-sha1-hmac]]

crypto transform-set domain ipsec set-name esp-aes [{128 | 256} [ctr {esp-aes-xcbc-mac | esp-md5-hmac | esp-sha1-hmac} | esp-aes-xcbc-mac | esp-md5-hmac | esp-sha1-hmac]]

Syntax Description

set-name

Specifies the transform set name. Maximum length is 63 characters.

esp-3des

Specifies ESP transform using the 3DES cipher (128 bits).

esp-des

Specifies ESP transform using the DES cipher (56 bits).

esp-aes-xcbc-mac

Specifies ESP transform using AES-XCBC-MAC authentication.

esp-md5-hmac

Specifies ESP transform using MD5-HMAC authentication.

esp-sha1-hmac

Specifies ESP transform using SHA1-HMAC authentication

esp-aes

Specifies ESP transform using the AES cipher (128 or 256 bits).

128

Specifies ESP transform using AES 128-bit cipher.

256

Specifies ESP transform using AES 256-bit cipher.

ctr

Specifies AES in counter mode.


Defaults

None.

The default mode of AES is CBC (Cyber Block Chaining).

Command Modes

Configuration mode.

Command History

Release
Modification

2.0(x)

This command was introduced.


Usage Guidelines

To use this command, IPsec must be enabled using the crypto ipsec enable command.

You can use this command to modify existing IPsec transform sets. If you change a transform set definition, the change is only applied to crypto map entries that reference the transform set. The change is not applied to existing security associations, but used in subsequent negotiations to establish new security associations. If you want the new settings to take effect sooner, you can clear all or part of the security association database using the clear crypto sa domain ipsec command.

Examples

The following example shows how to configure an IPsec transform set.

switch# config terminal
switch(config)# crypto transform-set domain ipsec Set1 esp-aes 128

Related Commands

Command
Description

clear crypto sa domain ipsec

Clears security associations.

crypto ipsec enable

Enables IPsec.

show crypto transform-set domain ipsec

Displays IPsec crypto transform set information.


customer-id

To configure the customer ID with the Call Home function, use the customer-id command in Call Home configuration submode. To disable this feature, use the no form of the command.

customer-id customer-id

no customer customer-id

Syntax Description

customer-id

(Optional) Specifies the customer ID. The maximum length is 64 alphanumeric characters in free format.


Defaults

None.

Command Modes

Call Home configuration submode.

Command History

Release
Modification

1.0(2)

This command was introduced.


Usage Guidelines

None.

Examples

The following example shows how to configure the customer ID in the Call Home configuration submode.

switch# config terminal
Enter configuration commands, one per line.  End with CNTL/Z.
switch(config)# callhome
switch(config-callhome)# customer-id Customer1234 

Related Commands

Command
Description

callhome

Configures the Call Home function.

callhome test

Sends a dummy test message to the configured destination(s).

show callhome

Displays configured Call Home information.