![]() |
Table Of Contents
show cts role-based access-list
Show Commands
This chapter describes the Cisco NX-OS TrustSec show commands.
show cts
To display the global Cisco TrustSec configuration, use the show cts command.
show cts
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec global configuration:
switch# show ctsCTS Global Configuration==============================CTS support : enabledCTS device identity : not configuredSGT : 0CTS caching support : disabledNumber of CTS interfaces inDOT1X mode : 0Manual mode : 1switch#Related Commands
show cts credentials
To display the Cisco TrustSec device credentials configuration, use the show cts credentials command.
show cts credentials
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec credentials configuration:
switch# show cts credentialsRelated Commands
show cts environment-data
To display the global Cisco TrustSec environment data, use the show cts environment-data command.
show cts environment-data
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
The Cisco NX-OS device downloads the Cisco TrustSec environment data from the ACS after you have configured the Cisco TrustSec credentials for the device and configured authentication, authorization, and accounting (AAA).
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec environment data:
switch# show cts environment-dataCTS Environment Data==============================Current State : CTS_ENV_DNLD_ST_INIT_STATELast Status : CTS_ENV_INCOMPLETELocal Device SGT : 0x0000Transport Type : CTS_ENV_TRANSPORT_DIRECTData loaded from cache : FALSEEnv Data Lifetime :Last Update Time : NeverServer List :AID: IP: Port:switch#Related Commands
show cts interface
To display the Cisco TrustSec information for interfaces, use the show cts interface command.
show cts interface {all | ethernet slot/port | vethernet veth-num}
Syntax Description
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
You must enable the Cisco Virtual Machine on the switch by using the feature-set virtualization command to see the vethernet keyword.
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec configuration for a specific interface:
switch# show cts interface ethernet 1/5CTS Information for Interface Ethernet1/5:CTS is enabled, mode: CTS_MODE_MANUALIFC state: UnknownAuthentication Status: CTS_AUTHC_INITPeer Identity:Peer is: Unknown in manual mode802.1X role: CTS_ROLE_UNKNOWNLast Re-Authentication:Authorization Status: CTS_AUTHZ_INITPEER SGT: 3Peer SGT assignment: Not TrustedSAP Status: CTS_SAP_INITConfigured pairwise ciphers:Replay protection:Replay protection mode:Selected cipher:Current receive SPI:Current transmit SPI:Propagate SGT: Enabledswitch#This example shows how to display the Cisco TrustSec configuration for all interfaces:
switch# show cts interface allRelated Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
feature-set virtualization
Enables the Cisco Virtual Machine features on the switch.
show cts pacs
To display the Cisco TrustSec protect access credentials (PACs) provisioned by EAP-FAST, use the show cts pacs command.
show cts pacs
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec global configuration:
switch# show cts pacsRelated Commands
show cts role-based access-list
To display the global Cisco TrustSec security group access control list (SGACL) configuration, use the show cts role-based access-list command.
show cts role-based access-list [list-name]
Syntax Description
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec SGACL configuration:
switch# show cts role-based access-listRelated Commands
show cts role-based counters
To display the configuration status of role-based access control list (RBACL) statistics and list the statistics for all RBACL policies, use the show cts role-based counters command.
show cts role-based counters
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
To use this command, you must enable the Cisco TrustSec feature using the feature cts command. You must also enable Cisco TrustSec counters using the cts role-based counters enable command.
This command does not require a license.
Examples
This example shows how to display the configuration status of RBACL statistics:
switch# show cts role-based countersRBACL policy counters enabledCounters last cleared: Neverrbacl:ACS_1101_15permit icmp log [0]permit tcp log [0]deny udp log [0]switch#Related Commands
show cts role-based enable
To display the Cisco TrustSec security group access control list (SGACL) enable status for VLANs, use the show cts role-based enable command.
show cts role-based enable
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec SGACL enforcement status:
switch# show cts role-based enablevlan:102switch#Related Commands
Command Descriptionfeature cts
Enables the Cisco TrustSec feature.
cts role-based enforcement
Enables role-based access control list (RBACL) enforcement on VLANs.
show cts role-based policy
To display the global Cisco TrustSec security group access control list (SGACL) policies, use the show cts role-based policy command.
show cts role-based policy
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec SGACL policies:
switch# show cts role-based policyRelated Commands
show cts role-based sgt-map
To display the global Cisco TrustSec Security Group Tag (SGT) mapping configuration, use the show cts role-based sgt-map command.
show cts role-based sgt-map
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec SGT mapping configuration:
switch# show cts role-based sgt-mapRelated Commands
show cts sxp
To display the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (SXP) configuration, use the show cts sxp command.
show cts sxp
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec SXP configuration:
switch# show cts sxpCTS SXP Configuration:SXP enabledSXP retry timeout:60SXP reconcile timeout:120switch#Related Commands
show cts sxp connection
To display the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (SXP) connections information, use the show cts sxp connection command.
show cts sxp connection
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec Security Group Tag (SGT) Exchange Protocol (SXP) connections information:
switch# show cts sxp connectionPEER_IP_ADDR VRF PEER_SXP_MODE SELF_SXP_MODE CONNECTION STATE192.0.2.1 default listener speaker initializingswitch#Related Commands
Command Descriptioncts sxp connection peer
Configures a SXP peer connection.
feature cts
Enables the Cisco TrustSec feature.
show running-config cts
To display the Cisco TrustSec configuration in the running configuration, use the show running-config cts command.
show running-config cts
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec configuration in the running configuration:
switch# show running-config cts!Command: show running-config cts!Time: Thu Jan 1 05:33:03 2009version 6.0(0)N1(1)feature ctscts role-based counters enablects sxp enablects sxp connection peer 192.0.2.1 password none mode listenerinterface Ethernet1/5cts manualpolicy static sgt 0x3switch#Related Commands
Command Descriptioncopy running-config startup-config
Copies the running configuration information to the startup configuration file.
feature cts
Enables the Cisco TrustSec feature.
show running-config dot1x
To display 802.1X configuration information in the running configuration, use the show running-config dot1x command.
show running-config dotx1 [all]
Syntax Description
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
You must enable the 802.1X feature by using the feature dot1x command before using this command.
This command does not require a license.
Examples
This example shows how to display the configured 802.1X information in the running configuration:
switch# show running-config dot1xRelated Commands
show startup-config cts
To display the Cisco TrustSec configuration information in the startup configuration, use the show startup-config cts command.
show startup-config cts
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
This command does not require a license.
Examples
This example shows how to display the Cisco TrustSec information in the startup configuration:
switch# show startup-config ctsRelated Commands
Command Descriptioncopy running-config startup-config
Copies the running configuration information to the startup configuration file.
show startup-config dot1x
To display 802.1X configuration information in the startup configuration, use the show startup-config dot1x command.
show startup-config dot1x
Syntax Description
This command has no arguments or keywords.
Command Default
None
Command Modes
Any command mode
Command History
Usage Guidelines
You must enable the 802.1X feature by using the feature dot1x command before using this command.
This command does not require a license.
Examples
This example shows how to display the 802.1X information in the startup configuration:
switch# show startup-config dot1xRelated Commands
Command Descriptioncopy running-config startup-config
Copies the running configuration information to the startup configuration file.