File Prompt (Alert - Noisy - Quiet)
File Prompt (Alert - Noisy - Quiet)
file prompt
To specify the level of prompting, use the file prompt command in global configuration mode.
Syntax Description alert (Optional) Prompts only for destructive file operations. This is the
default.
noisy (Optional) Confirms all file operation parameters.
quiet (Optional) Seldom prompts for file operations.
Defaults alert
Usage Guidelines Use this command to change the amount of confirmation needed for different file operations.
This command affects only prompts for confirmation of operations. The router will always prompt for
missing information.
Examples The following example configures confirmation prompting for all file operations:
Router(config)# file prompt noisy
Defaults Image verification is not automatically applied to all images that are copied or reloaded onto a router.
Usage Guidelines Image verification is accomplished by verifying the compressed Cisco IOS image checksum.
Image verification allows users to automatically verify the integrity of all Cisco IOS images. Thus, users
can be sure that the image is protected from accidental corruption, which can occur at any time during
transit, starting from the moment the files are generated by Cisco until they reach the user.
The file verify auto command enables image verification globally; that is, all images that are to be
copied (via the copy command) or reloaded (via the reload command) are automatically verified.
Although both the copy and reload commands have a /verify keyword that enables image verification,
you must issue the keyword each time you want to copy or reload an image. The file verify auto
command enables image verification by default so you no longer have to specify image verification
multiple times.
If you have enabled image verification by default but prefer to disable verification for a specific image
copy or reload, the /noverify keyword along with either the copy or the reload command will override
the file verify auto command.
Examples The following example shows how to enable automatic image verification:
Router(config)# file verify auto
format
To format a Class A, Class B, or Class C flash memory file system, use the format command in
privileged EXEC or diagnostic mode.
format filesystem1:
Syntax Description spare (Optional) Reserves spare sectors as specified by the spare-number
argument when you format flash memory.
spare-number (Optional) Number of the spare sectors to reserve in formatted flash
memory. Valid values are from 0 to 16. The default value is 0.
filesystem1: Flash memory to format, followed by a colon.
Valid values for use with the Cisco 7600 series router are disk0:,
disk1:, bootflash:, slot0:, sup-slot0:, and sup-bootflash:; see the
“Usage Guidelines” section for additional information.
Valid values for use with the ASR 1000 Series Routers are
bootflash:, harddisk:, stby-harddisk:, obfl:, and usb[0-1];.
filesystem2: (Optional) File system containing the monlib file to use for
formatting the argument filesystem1 followed by a colon.
monlib-filename (Optional) Name of the ROM monitor library file (monlib file) to use
for formatting the filesystem1 argument. The default monlib file is the
one bundled with the system software.
Usage Guidelines Reserve a certain number of memory sectors as spares, so that if some sectors fail, most of the flash
memory card can still be used. Otherwise, you must reformat the flash card after some of the sectors fail.
Use this command to format Class A, B, or C flash memory file systems. The Cisco 7600 series router
supports only Class A and Class C flash file systems.
In some cases, you might need to insert a new Personal Computer Memory Card Industry Association
(PCMCIA) flash memory or flash PC card and load images or backup configuration files onto it. Before
you can use a new flash memory or flash PC card, you must format it.
Sectors in flash memory or flash PC cards can fail. Reserve certain flash memory or flash PC sectors as
“spares” by using the optional spare-number argument on the format command to specify 0 to 16 sectors
as spares. If you reserve a small number of spare sectors for emergencies, you can still use most of the
flash memory or flash PC card. If you specify 0 spare sectors and some sectors fail, you must reformat
the flash memory or flash PC card, thereby erasing all existing data.
The monlib file is the ROM monitor library. The ROM monitor uses this file to access files in the flash
file system. The Cisco IOS system software contains a monlib file. Use the show disk0: all command to
display monlib file details.
When this command is used with HSA and you do not specify the monlib-filename argument, the system
takes the ROM monitor library file from the slave image bundle. If you specify the monlib-filename
argument, the system assumes that the files reside on the slave devices.
In the command syntax, the filesystem1: argument specifies the device to format and the filesystem2:
argument specifies the optional device containing the monlib file used to format the filesystem1:
argument. The device determines which monlib file to use, as follows:
• If you omit the optional filesystem2: and monlib-filename arguments, the system formats the
filesystem1: argument using the monlib file already bundled with the system software.
• If you omit only the optional filesystem2: argument, the system formats the filesystem1: argument
using the monlib file from the device you specified with the cd command.
• If you omit only the optional monlib-filename argument, the system formats filesystem1: using the
filesystem2: monlib file.
• When you specify both arguments—filesystem2: and monlib-filename—the system formats the
filesystem1: argument using the monlib file from the specified device.
• You can specify the filesystem1: arguments’s own monlib file in this argument. If the system cannot
find a monlib file, it terminates its formatting.
Note Most platforms do not support booting from images stored on flash memory cards. You should reboot
your device only from integrated memory locations, such as NVRAM.
Examples The following example shows how to format a flash memory card that is inserted in slot 0:
Router# format slot0:
When the console returns to the privileged EXEC prompt, the new flash memory card is formatted and
ready for use.
This following example shows how to format a CompactFlash PC card that is inserted in slot 0:
Router# format disk0:
When the console returns to the EXEC prompt, the new CompactFlash PC card is formatted and
ready for use.
This follwing example shows how a format operation cleans up the disk and writes the monitor library
on the disk filesystem:
Router# format formatdisk:
fsck
To check a File Allocation Table (FAT)-based disk, a flash file system, or a Class C file system for
damage and to repair any problems, use the fsck command in privileged EXEC or diagnostic mode.
Supported Platforms Other than the Cisco 7600 Series and Cisco ASR1000 Series Routers
Syntax Description /nocrc (Optional) This keyword is available for Class C flash file systems only.
Omits cyclic redundancy checks (CRCs).
/automatic (Optional) This keyword is available for Advanced Technology Attachment
(ATA) FAT-based disks only. Specifies that the check and repair actions
should proceed automatically. This option can be used to skip the prompts
for each check and repair action.
Note This command also specifies the automatic mode for the Cisco 7600
series router; see the “Usage Guidelines” section for additional
information.
/all (Optional) Specifies that all partitions on the disk be checked for problems.
/force (Optional) Ensures forced termination of simultaneous file operations on the
same device.
filesystem: The file system prefix indicating the disk to be checked. The colon (:) is
required. Typically, the file system prefix will be disk0: or disk1:. In case of
dual processors, the file system on the redundant supervisor engine can also
be specified.
Command Default A FAT-based disk, flash file system, or Class C file system is not checked for damage and repaired. If
you do not enter the /automatic keyword, command-line interface (CLI) prompts for actions are issued.
For the Cisco 7600 series router, if you do not specify the disk0: keyword, the current file system is
checked.
This command is available in both privileged EXEC and diagnostic mode on the Cisco ASR1000 series
routers.
Usage Guidelines Supported Platforms Other than Cisco 7600 Series Router
This command performs all steps necessary to remove corrupted files and reclaim unused disk space.
Changes include checking for incorrect file sizes, cluster loops, and so on. The default form of this
command issues multiple prompts to confirm each of the changes. However, you can skip these prompts
by using the /automatic keyword when issuing the command.
When you use the /automatic keyword you are prompted to confirm that you want the automatic option.
Prompts for actions will be skipped, but all actions performed are displayed to the terminal (see the
example below).
This command works with ATA Personal Computer Memory Card Industry Association (PCMCIA)
cards formatted in Disk Operating System (DOS), or for Class C flash file systems.
Note Only one partition (the active partition) is checked in the ATA disk.
If you enter the disk0: or slavedisk0: keyword, the fsck utility checks the selected file system for
problems. If a problem is detected, a prompt is displayed asking if you want the problem fixed.
If you enter the /automatic keyword, you are prompted to confirm that you want the automatic mode.
In automatic mode, problems are fixed automatically and you are not prompted to confirm.
If you do not specify the /force keyword, any simultaneous file operations on the same device are not
terminated. Instead, an error message stating files are open for read or write access appears. If you
specify the /force keyword, the fsck utility terminates files that are open for read or write access and
continues to check for problems.
Table 32 lists the checks and actions that are performed by the fsck utility.
Checks Actions
Checks the boot sector and the partition table and reports No action.
the errors.
Validates the media with the signature in the last 2 bytes No action.
of the first sector (0x55 and 0xaa, respectively).
Checks the os_id to find whether this is a FAT-12 or No action.
FAT-16 file system (valid values include 0, 1, 4, and 6).
Checks the number of FAT’s field (correct values are 1 No action.
and 2).
Checks these values: No action.
• n_fat_sectors cannot be less than 1.
• n_root_entries cannot be less than 16.
• n_root_sectors cannot be less than 2.
• base_fat_sector, n_sectors_per_cluster, n_heads,
n_sectors_per_track is not 0.
Checks the files and FAT for these errors:
Checks the FAT for invalid cluster numbers. If the cluster is a part of a file chain, the cluster is changed to end
of file (EOF). If the cluster is not part of a file chain, it is added
to the free list and unused cluster chain. Table 33 lists valid
cluster numbers; numbers other than those listed in Table 33 are
invalid numbers.
Checks the file’s cluster chain for loops. If the loop is broken, the file is truncated at the cluster where the
looping occurred.
Checks the directories for nonzero size fields. If directories are found with nonzero size fields, the size is reset
to zero.
Checks for invalid start cluster file numbers. If the start cluster number of a file is invalid, the file is deleted.
Checks files for bad or free clusters. If the file contains bad or free clusters, the file is truncated at the
last good cluster; an example is the cluster that points to this
bad/free cluster.
Checks to see if the file’s cluster chain is longer than If the file’s cluster chain is longer than indicated by the size
indicated by the size fields. fields, the file size is recalculated and the directory entry is
updated.
Checks Actions
Checks to see if two or more files share the same cluster If two or more files are crosslinked, you are prompted to accept
(crosslinked). the repair, and one of the files is truncated.
Checks to see if the file’s cluster chain is shorter than is If the file’s cluster chain is shorter than is indicated by the size
indicated by the size fields. fields, the file size is recalculated and the directory entry is
updated.
Checks to see if there are any unused cluster chains. If unused cluster chains are found, new files are created and
linked to that file with the name fsck-start cluster.
Table 33 lists the valid cluster numbers. Numbers other than those listed in Table 33 are invalid numbers.
Examples Supported Platforms Other than the Cisco 7600 Series Router
The following example shows sample output from the fsck command in automatic mode:
Router# fsck /automatic disk1:
full-help
To get help for the full set of user-level commands, use the full-help command in line configuration
mode.
full-help
Defaults Disabled
Usage Guidelines The full-help command enables (or disables) an unprivileged user to see all of the help messages
available. It is used with the show ? command.
Examples In the following example, the show ? command is used first with full-help disabled. Then full-help is
enabled for the line, and the show ? command is used again to demonstrate the additional help output
that is displayed.
Router> show ?
Router> enable
Password:<letmein>
help
To display a brief description of the help system, use the help command in any command mode.
help
Usage Guidelines The help command provides a brief description of the context-sensitive help system, which functions as
follows:
• To list all commands available for a particular command mode, enter a question mark (?) at the
system prompt.
• To obtain a list of commands that begin with a particular character string, enter the abbreviated
command entry immediately followed by a question mark (?). This form of help is called word help,
because it lists only the keywords or arguments that begin with the abbreviation you entered.
• To list the keywords and arguments associated with a command, enter a question mark (?) in place
of a keyword or argument on the command line. This form of help is called command syntax help,
because it lists the keywords or arguments that apply based on the command, keywords, and
arguments you have already entered.
Examples In the following example, the help command is used to display a brief description of the help system:
Router# help
The following example shows how to use word help to display all the privileged EXEC commands that
begin with the letters “co.” The letters entered before the question mark are reprinted on the next
command line to allow the user to continue entering the command.
Router# co?
configure connect copy
Router# co
The following example shows how to use command syntax help to display the next argument of a
partially complete access-list command. One option is to add a wildcard mask. The <cr> symbol
indicates that the other option is to press Enter to execute the command without adding any more
keywords or arguments. The characters entered before the question mark are reprinted on the next
command line to allow the user to continue entering the command or to execute that command as it is.
Router(config)# access-list 99 deny 131.108.134.234 ?
A.B.C.D Mask of bits to ignore
<cr>
Router(config)# access-list 99 deny 131.108.134.234
hidekeys
To suppress the display of password information in configuration log files, use the hidekeys command
in configuration change logger configuration mode. To allow the display of password information in
configuration log files, use the no form of this command.
hidekeys
no hidekeys
Usage Guidelines Enabling the hidekeys command increases security by preventing password information from being
displayed in configuration log files.
Examples The following example shows how to prevent password information from being displayed in
configuration log files:
Router# configure terminal
!
Router(config)# archive
Router(config-archive)# log config
Router(config-archive-log-config)# hidekeys
Router(config-archive-log-config)# end
Command Description
logging size Specifies the maximum number of entries retained in the configuration
log.
notify syslog Enables the sending of notifications of configuration changes to a remote
syslog.
show archive log config Displays entries from the configuration log.
history
To enable the command history function, use the history command in line configuration mode. To
disable the command history function, use the no form of this command.
history
no history
Usage Guidelines The command history function provides a record of EXEC commands that you have entered. This
function is particularly useful for recalling long or complex commands or entries, including access lists.
To change the number of command lines that the system will record in its history buffer, use the
history size line configuration command.
The history command enables the history function with the last buffer size specified or, if there was not
a prior setting, with the default of ten lines. The no history command disables the history function.
The show history EXEC command will list the commands you have entered, but you can also use your
keyboard to display individual commands. Table 34 lists the keys you can use to recall commands from
the command history buffer.
Key(s) Functions
1
Ctrl-P or Up Arrow Recalls commands in the history buffer in a backward sequence,
beginning with the most recent command. Repeat the key
sequence to recall successively older commands.
Ctrl-N or Down Arrow1 Returns to more recent commands in the history buffer after
recalling commands with Ctrl-P or the Up Arrow. Repeat the key
sequence to recall successively more recent commands.
1. The arrow keys function only with ANSI-compatible terminals.
Examples In the following example, the command history function is disabled on line 4:
Router(config)# line 4
Router(config-line)# no history
history size
To change the command history buffer size for a particular line, use the history size command in line
configuration mode. To reset the command history buffer size to ten lines, use the no form of this
command.
no history size
Syntax Description number-of-lines Specifies the number of command lines that the system will record in its
history buffer. The range is from 0 to 256. The default is 10.
Usage Guidelines The history size command should be used in conjunction with the history and show history commands.
The history command enables or disables the command history function. The show history command
lists the commands you have entered in the current EXEC session. The number of commands that the
history buffer will show is set by the history size command.
Note The history size command only sets the size of the buffer; it does not reenable the history function. If
the no history command is used, the history command must be used to reenable this function.
Examples The following example displays line 4 configured with a history buffer size of 35 lines:
Router(config)# line 4
Router(config-line)# history size 35
hold-character
To define the local hold character used to pause output to the terminal screen, use the hold-character
command in line configuration mode. To restore the default, use the no form of this command.
hold-character ascii-number
no hold-character
Syntax Description ascii-number ASCII decimal representation of a character or control sequence (for
example, Ctrl-P).
Usage Guidelines The Break character is represented by zero; NULL cannot be represented. To continue the output, enter
any character after the hold character. To use the hold character in normal communications, precede it
with the escape character. See the “ASCII Character Set” appendix for a list of ASCII characters.
Examples The following example sets the hold character to Ctrl-S, which is ASCII decimal character 19:
Router(config)# line 8
Router(config-line)# hold-character 19
hostname
To specify or modify the host name for the network server, use the hostname command in global
configuration mode.
hostname name
Syntax Description name New host name for the network server.
Usage Guidelines The host name is used in prompts and default configuration filenames.
Do not expect case to be preserved. Uppercase and lowercase characters look the same to many internet
software applications. It may seem appropriate to capitalize a name the same way you might do in
English, but conventions dictate that computer names appear all lowercase. For more information, refer
to RFC 1178, Choosing a Name for Your Computer.
The name must also follow the rules for ARPANET host names. They must start with a letter, end with
a letter or digit, and have as interior characters only letters, digits, and hyphens. Names must be 63
characters or fewer. A host name of less than 10 characters is recommended. For more information, refer
to RFC 1035, Domain Names—Implementation and Specification.
On most systems, a field of 30 characters is used for the host name and the prompt in the CLI. Note that
the length of your host name may cause longer configuration mode prompts to be truncated. For
example, the full prompt for service profile configuration mode is:
(config-service-profile)#
However, if you are using the host-name of "Router", you will only see the following prompt (on most
systems):
Router(config-service-profil)#
If the hostname is longer, you will see even less of the prompt:
Basement-rtr2(config-service)#
Keep this behavior in mind when assigning a name to your system (using the hostname global
configuration command). If you expect that users will be relying on mode prompts as a CLI navigation
aid, you should assign host names of no more than nine characters.
hw-module reset
To reset a module by turning the power off and then on, use the hw-module reset command in privileged
EXEC mode.
Syntax Description module num Applies the command to a specific module; see the “Usage Guidelines” section for
valid values.
Usage Guidelines The num argument designates the module number. Valid values depend on the chassis that is used. For
example, if you have a 13-slot chassis, valid values for the module number are from 1 to 13.
hw-module shutdown
To shut down the module, use the hw-module shutdown command in privileged EXEC mode.
Syntax Description module num Applies the command to a specific module; see the “Usage Guidelines” section for
valid values.
Usage Guidelines This command is supported on the SSL Services Module and the NAM.
If you enter the hw-module shutdown command to shut down the module, you will have to enter the no
power enable module command and the power enable module command to restart (power down and
then power up) the module.
Examples This example shows how to shut down and restart the module:
Router# hw-module module 3 shutdown
Router# no power enable module 3
Router# power enable module 3
insecure
To configure a line as insecure, use the insecure command in line configuration mode. To disable this
function, use the no form of this command.
insecure
no insecure
Defaults Disabled
Usage Guidelines Use this command to identify a modem line as insecure for DEC local area transport (LAT)
classification.
international
If you are using Telnet to access a Cisco IOS platform and you want to display 8-bit and multibyte
international characters (for example, Kanji) and print the Escape character as a single character instead
of as the caret and bracket symbols (^[), use the international command in line configuration mode. To
display characters in 7-bit format, use the no form of this command.
international
no international
Defaults Disabled
Usage Guidelines If you are configuring a Cisco IOS platform using the Cisco web browser user interface (UI), this
function is enabled automatically when you enable the Cisco web browser UI using the ip http server
global configuration command.
Examples The following example enables a Cisco IOS platform to display 8-bit and multibyte characters and print
the Escape character as a single character instead of as the caret and bracket symbols (^[) when you are
using Telnet to access the platform:
line vty 4
international
ip bootp server
To enable the Bootstrap Protocol (BOOTP) service on your routing device, use the ip bootp server
command in global configuration mode. To disable BOOTP services, use the no form of the command.
ip bootp server
no ip bootp server
Defaults Enabled
Usage Guidelines By default, the BOOTP service is enabled. When disabled, the no ip bootp server command will appear
in the configuration file.
The integrated Dynamic Host Configuration Protocol (DHCP) server was introduced in Cisco IOS
Release 12.0(1)T. Because DHCP is based on BOOTP, both of these services share the “well-known”
UDP server port of 67 (per RFC 951, RFC 1534, and RFC 2131; the client port is 68). To disable DHCP
services (DHCP relay and DHCP server), use the no service dhcp command. To disable BOOTP services
(in releases 12.2(8)T and later), but leave DHCP services enabled, use the ip dhcp bootp ignore
command.
If both the BOOTP server and DHCP server are disabled, “ICMP port unreachable” messages will be
sent in response to incoming requests on port 67, and the original incoming packet will be discarded. If
DHCP is enabled, using the no ip bootp server command by itself will not stop the router from listening
on UDP port 67.
Note As with all minor services, the async line BOOTP service should be disabled on your system if you do
not have a need for it in your network.
Any network device that has User Data Protocol (UDP), TCP, BOOTP, DHCP, or Finger services should
be protected by a firewall or have the services disabled to protect against Denial of Service attacks.
Examples In the following example, BOOTP and DHCP services are disabled on the router:
Router(config)# no ip bootp server
Router(config)# no service dhcp
ip finger
To configure a system to accept Finger protocol requests (defined in RFC 742), use the ip finger
command in global configuration mode. To disable this service, use the no form of this command.
ip finger [rfc-compliant]
no ip finger
Syntax Description rfc-compliant (Optional) Configures the system to wait for “Return” or “/W” input when
processing Finger requests. This keyword should not be used for those
systems.
Defaults Disabled
Usage Guidelines The Finger service allows remote users to view the output equivalent to the show users [wide]
command.
When ip finger is configured, the router will respond to a telnet a.b.c.d finger command from a remote
host by immediately displaying the output of the show users command and then closing the connection.
When the ip finger rfc-compliant command is configured, the router will wait for input before
displaying anything (as required by RFC 1288). The remote user can then enter the Return key to display
the output of the show users EXEC command, or enter /W to display the output of the show users wide
EXEC command. After this information is displayed, the connection is closed.
Note As with all minor services, the Finger service should be disabled on your system if you do not have
a need for it in your network.
Any network device that has UDP, TCP, BOOTP, or Finger services should be protected by a firewall
or have the services disabled to protect against Denial of Service attacks.
Because of the potential for hung lines, the rfc-compliant form of this command should not be
configured for devices with more than 20 simultaneous users.
ip ftp passive
To configure the router to use only passive FTP connections, use the ip ftp passive command in global
configuration mode. To allow all types of FTP connections, use the no form of this command.
ip ftp passive
no ip ftp passive
Examples In the following example, the router is configured to use only passive FTP connections:
Router(config)# ip ftp passive
ip ftp password
To specify the password to be used for File Transfer Protocol (FTP) connections, use the ip ftp password
command in global configuration mode. To return the password to its default, use the no form of this
command.
no ip ftp password
Syntax Description type (Optional) Type of encryption to use on the password. A value
of 0 disables encryption. A value of 7 indicates proprietary encryption.
password Password to use for FTP connections.
Defaults The router forms a password [email protected]. The variable username is the username
associated with the current session, routername is the configured host name, and domain is the domain
of the router.
Examples The following example configures the router to use the username “red” and the password “blue” for FTP
connections:
Router(config)# ip ftp username red
Router(config)# ip ftp password blue
ip ftp source-interface
To specify the source IP address for File Transfer Protocol (FTP) connections, use the
ip ftp source-interface command in global configuration mode. To use the address of the interface
where the connection is made, use the no form of this command.
no ip ftp source-interface
Syntax Description interface-type The interface type and number to use to obtain the source address for
interface-number FTP connections.
Command Default The FTP source address is the IP address of the interface that the FTP packets use to leave the router.
Usage Guidelines Use this command to set the same source address for all FTP connections.
In Cisco IOS 12.3(6) and later releases, FTP is VRF-aware, which means that FTP transfer is supported
across an interface within a VRF instance. To specify a VRF as a source for FTP connections, the VRF
must be associated with the same interface that you configure with the ip ftp source-interface
command. In this configuration, FTP looks for the destination IP address for file transfer in the specified
VRF table. If the specified source interface is not up, Cisco IOS software selects the address of the
interface closest to the destination as the source address.
Examples The following example shows how to configure the router to use the IP address associated with Ethernet
interface 0 as the source address on all FTP packets, regardless of which interface is actually used to
send the packet:
Router> enable
Router# configure terminal
Router(config)# ip ftp source-interface ethernet 0
The following example shows how to configure the router to use the VRF table named vpn1 to look for
the destination IP address for the transfer of FTP packets:
ip ftp username
To configure the username for File Transfer Protocol (FTP) connections, use the ip ftp username
command in global configuration mode. To configure the router to attempt anonymous FTP, use the no
form of this command.
no ip ftp username
Usage Guidelines The remote username must be associated with an account on the destination server.
Examples In the following example, the router is configured to use the username “red” and the password “blue”
for FTP connections:
Router(config)# ip ftp username red
Router(config)# ip ftp password blue
ip rarp-server
To enable the router to act as a Reverse Address Resolution Protocol (RARP) server, use the
ip rarp-server command in interface configuration mode. To restore the interface to the default of no
RARP server support, use the no form of this command.
ip rarp-server ip-address
no ip rarp-server ip-address
Syntax Description ip-address IP address that is to be provided in the source protocol address field of the RARP
response packet. Normally, this is set to whatever address you configure as the
primary address for the interface.
Defaults Disabled
Usage Guidelines This feature makes diskless booting of clients possible between network subnets where the client and
server are on separate subnets.
RARP server support is configurable on a per-interface basis, so that the router does not interfere with
RARP traffic on subnets that need no RARP assistance.
The Cisco IOS software answers incoming RARP requests only if both of the following two conditions
are met:
• The ip rarp-server command has been configured for the interface on which the request was
received.
• A static entry is found in the IP ARP table that maps the MAC address contained in the RARP
request to an IP address.
Use the show ip arp EXEC command to display the contents of the IP ARP cache.
Sun Microsystems, Inc. makes use of RARP and UDP-based network services to facilitate
network-based booting of SunOS on it’s workstations. By bridging RARP packets and using both the ip
helper-address interface configuration command and the ip forward-protocol global configuration
command, the Cisco IOS software should be able to perform the necessary packet switching to enable
booting of Sun workstations across subnets. Unfortunately, some Sun workstations assume that the
sender of the RARP response, in this case the router, is the host that the client can contact to TFTP load
the bootstrap image. This causes the workstations to fail to boot.
By using the ip rarp-server command, the Cisco IOS software can be configured to answer these RARP
requests, and the client machine should be able to reach its server by having its TFTP requests forwarded
through the router that acts as the RARP server.
In the case of RARP responses to Sun workstations attempting to diskless boot, the IP address specified
in the ip rarp-server interface configuration command should be the IP address of the TFTP server. In
addition to configuring RARP service, the Cisco IOS software must be configured to forward
UDP-based Sun portmapper requests to completely support diskless booting of Sun workstations. This
can be accomplished using configuration commands of the following form:
ip forward-protocol udp 111
interface interface name
ip helper-address target-address
Examples The following partial example configures a router to act as a RARP server. The router is configured to
use the primary address of the specified interface in its RARP responses.
arp 172.30.2.5 0800.2002.ff5b arpa
interface ethernet 0
ip address 172.30.3.100 255.255.255.0
ip rarp-server 172.30.3.100
In the following example, a router is configured to act as a RARP server, with TFTP and portmapper
requests forwarded to the Sun server:
! Allow the router to forward broadcast portmapper requests
ip forward-protocol udp 111
! Provide the router with the IP address of the diskless sun
arp 172.30.2.5 0800.2002.ff5b arpa
interface ethernet 0
! Configure the router to act as a RARP server, using the Sun Server's IP
! address in the RARP response packet.
ip rarp-server 172.30.3.100
! Portmapper broadcasts from this interface are sent to the Sun Server.
ip helper-address 172.30.3.100
ip rcmd domain-lookup
To reenable the basic Domain Name Service (DNS) security check for rcp and rsh, use the ip rcmd
domain-lookup command in global configuration mode. To disable the basic DNS security check for
remote copy protocol (rcp) and remote shell protoco (rsh), use the no form of this command.
ip rcmd domain-lookup
no ip rcmd domain-lookup
Defaults Enabled
Usage Guidelines The abbreviation RCMD (remote command) is used to indicate both rsh and rcp.
DNS lookup for RCMD is enabled by default (provided general DNS services are enabled on the system
using the ip domain-lookup command).
The no ip rcmd domain-lookup command is used to disable the DNS lookup for RCMD. The ip rcmd
domain-lookup command is used to reenable the DNS lookup for RCMD.
DNS lookup for RCMD is performed as a basic security check. This check is performed using a host
authentication process. When enabled, the system records the address of the requesting client. That
address is mapped to a host name using DNS. Then a DNS request is made for the IP address for that
host name. The IP address received is then checked against the original requesting address. If the address
does not match with any of the addresses received from DNS, the RCMD request will not be serviced.
This reverse lookup is intended to help protect against spoofing. However, please note that the process
only confirms that the IP address is a valid “routable” address; it is still possible for a hacker to spoof
the valid IP address of a known host.
The DNS lookup is done after the TCP handshake but before the router (which is acting as a rsh/rcp
server) sends any data to the remote client.
The no ip rcmd domain-lookup will turn off DNS lookups for rsh and rcp only. The no ip
domain-lookup command takes precedence over the ip rcmd domain-lookup command. This means
that if the no ip domain-lookup command is in the current configuration, DNS will be bypassed for rcp
and rsh even if the ip rcmd domain-lookup command is enabled.
Examples In the following example, the DNS security check is disabled for RCMD (rsh/rcp):
Router(config)# no ip rcmd domain-lookup
ip rcmd rcp-enable
To configure the Cisco IOS software to allow remote users to copy files to and from the router using
remote copy protocol (rcp), use the ip rcmd rcp-enable command in global configuration mode. To
disable rcp on the device, use the no form of this command.
ip rcmd rcp-enable
no ip rcmd rcp-enable
Defaults To ensure security, the router is not enabled for rcp by default.
Usage Guidelines To allow a remote user to execute rcp commands on the router, you must also create an entry for the
remote user in the local authentication database using the ip rcmd remote-host command.
The no ip rcmd rcp-enable command does not prohibit a local user from using rcp to copy system
images and configuration files to and from the router.
To protect against unauthorized users copying the system image or configuration files, the router is not
enabled for rcp by default.
Examples In the following example, the rcp service is enabled on the system, the IP address assigned to the
Loopback0 interface is used as the source address for outbound rcp and rsh packets, and access is granted
to the user “netadmin3”on the remote host 172.16.101.101:
Router(config)# ip rcmd rcp-enable
Router(config)# ip rcmd source-interface Loopback0
Router(config)# ip rcmd remote-host router1 172.16.101.101 netadmin3
ip rcmd remote-host
To create an entry for the remote user in a local authentication database so that remote users can execute
commands on the router using remote shell protocol (rsh) or remote copy protocol (rcp), use the ip rcmd
remote-host command in global configuration mode. To remove an entry for a remote user from the
local authentication database, use the no form of this command.
Syntax Description local-username Name of the user on the local router. You can specify the router name
as the username. This name needs to be communicated to the network
administrator or to the user on the remote system. To be allowed to
remotely execute commands on the router, the remote user must
specify this value correctly.
ip-address IP address of the remote host from which the local router will accept
remotely executed commands. Either the IP address or the host name
is required.
host-name Name of the remote host from which the local router will accept
remotely executed commands. Either the host name or the IP address
is required.
remote-username Name of the user on the remote host from which the router will accept
remotely executed commands.
enable [level] (Optional) Enables the remote user to execute privileged EXEC
commands using rsh or to copy files to the router using rcp. The range
is from 1 to 15. The default is 15. For information on the enable level,
refer to the privilege level global configuration command in the
Release 12.2 Cisco IOS Security Command Reference.
Usage Guidelines A TCP connection to a router is established using an IP address. Using the host name is valid only when
you are initiating an rcp or rsh command from a local router. The host name is converted to an IP address
using DNS or host-name aliasing.
To allow a remote user to execute rcp or rsh commands on a local router, you must create an entry for
the remote user in the local authentication database. You must also enable the router to act as an rsh or
rcp server.
To enable the router to act as an rsh server, issue the ip rcmd rsh-enable command. To enable the router
to act as an rcp server, issue the ip rcmd rcp-enable command.The router cannot act as a server for
either of these protocols unless you explicitly enable the capacity.
A local authentication database, which is similar to a UNIX .rhosts file, is used to enforce security on
the router through access control. Each entry that you configure in the authentication database identifies
the local user, the remote host, and the remote user. To permit a remote user of rsh to execute commands
in privileged EXEC mode or to permit a remote user of rcp to copy files to the router, specify the enable
keyword and level. For information on the enable level, refer to the privilege level global configuration
command in the Release 12.2 Cisco IOS Security Command Reference.
An entry that you configure in the authentication database differs from an entry in a UNIX .rhosts file
in the following aspect. Because the .rhosts file on a UNIX system resides in the home directory of a
local user account, an entry in a UNIX .rhosts file need not include the local username; the local
username is determined from the user account. To provide equivalent support on a router, specify the
local username along with the remote host and remote username in each authentication database entry
that you configure.
For a remote user to be able to execute commands on the router in its capacity as a server, the local
username, host address or name, and remote username sent with the remote client request must match
values configured in an entry in the local authentication file.
A remote client host should be registered with DNS. The Cisco IOS software uses DNS to authenticate
the remote host’s name and address. Because DNS can return several valid IP addresses for a host name,
the Cisco IOS software checks the address of the requesting client against all of the IP addresses for the
named host returned by DNS. If the address sent by the requester is considered invalid, that is, it does
not match any address listed with DNS for the host name, then the software will reject the
remote-command execution request.
Note that if no DNS servers are configured for the router, then that device cannot authenticate the host
in this manner. In this case, the Cisco IOS software sends a broadcast request to attempt to gain access
to DNS services on another server. If DNS services are not available, you must use the no ip
domain-lookup command to disable the attempt to gain access to a DNS server by sending a broadcast
request.
If DNS services are not available and, therefore, you bypass the DNS security check, the software will
accept the request to remotely execute a command only if all three values sent with the request match
exactly the values configured for an entry in the local authentication file.
Examples The following example allows the remote user named netadmin3 on a remote host with the IP address
172.16.101.101 to execute commands on router1 using the rsh or rcp protocol. User netadmin3 is
allowed to execute commands in privileged EXEC mode.
Router(config)# ip rcmd remote-host router1 172.16.101.101 netadmin3 enable
Command Description
ip domain-lookup Enables the IP DNS-based host name-to-address translation.
ip rcmd rsh-enable Configures the router to allow remote users to execute commands on it using
the rsh protocol.
ip rcmd remote-username
To configure the remote username to be used when requesting a remote copy using remote copy protocol
(rcp), use the ip rcmd remote-username command in global configuration mode. To remove from the
configuration the remote username, use the no form of this command.
Syntax Description username Name of the remote user on the server. This name is used for rcp copy
requests. All files and images to be copied are searched for or written
relative to the directory of the remote user’s account, if the server has
a directory structure, for example, as do UNIX systems.
Defaults If you do not issue this command, the Cisco IOS software sends the remote username associated with
the current tty process, if that name is valid, for rcp copy commands. For example, if the user is
connected to the router through Telnet and the user was authenticated through the username command,
then the software sends that username as the remote username.
Note The remote username must be associated with an account on the destination server.
If the username for the current tty process is not valid, the Cisco IOS software sends the host name as
the remote username. For rcp boot commands, the Cisco IOS software sends the access server host name
by default.
Note For Cisco, tty lines are commonly used for access services. The concept of tty originated with UNIX.
For UNIX systems, each physical device is represented in the file system. Terminals are called tty
devices (tty stands for teletype, the original UNIX terminal).
Usage Guidelines The rcp protocol requires that a client send the remote username on an rcp request to the server. Use this
command to specify the remote username to be sent to the server for an rcp copy request. If the server
has a directory structure, as do UNIX systems, all files and images to be copied are searched for or
written relative to the directory of the remote user’s account.
Note Cisco IOS Release 10.3 added the ip keyword to rcmd commands. If you are upgrading from
Release 10.2 to Release 10.3 or a later release, this keyword is automatically added to any rcmd
commands you have in your Release 10.2 configuration files.
ip rcmd rsh-enable
To configure the router to allow remote users to execute commands on it using remote shell protocol
(rsh), use the ip rcmd rsh-enable command in global configuration mode. To disable a router that is
enabled for rsh, use the no form of this command.
ip rcmd rsh-enable
no ip rcmd rsh-enable
Defaults To ensure security, the router is not enabled for rsh by default.
Usage Guidelines rsh, used as a client process, gives users the ability to remotely get router information (such as status)
without the need to connect into the router and then disconnect. This is valuable when looking at many
statistics on many different routers.
Use this command to enable the router to receive rsh requests from remote users. In addition to issuing
this command, you must create an entry for the remote user in the local authentication database to allow
a remote user to execute rsh commands on the router.
The no ip rcmd rsh-enable command does not prohibit a local user of the router from executing a
command on other routers and UNIX hosts on the network using rsh. The no form of this command only
disables remote access to rsh on the router.
ip rcmd source-interface
To force remote copy protocol (rcp) or remote shell protocol (rsh) to use the IP address of a specified
interface for all outgoing rcp/rsh communication packets, use the ip rcmd source-interface command
in global configuration mode. To disable a previously configured ip rcmd source-interface command,
use the no form of this command.
Syntax Description interface-id The name and number used to identify the interface. For example,
Loopback2.
Defaults The address of the interface closest to the destination is used as the source interface for rcp/rsh
communications.
Usage Guidelines If this command is not used, or if the interface specified in this command is not available (not up), the
Cisco IOS software uses the address of the interface closest to the destination as the source address.
Use this command to force the system to tag all outgoing rcp/rsh packets with the IP address associated
with the specified interface. This address is used as the source address as long as the interface is in the
up state.
This command is especially useful in cases where the router has many interfaces, and you want to ensure
that all rcp and/or rsh packets from this router have the same source IP address. A consistent address is
preferred so that the other end of the connection (the rcp/rsh server or client) can maintain a single
session. The other benefit of a consistent address is that an access list can be configured on the remote
device.
The specified interface must have an IP address associated with it. If the specified interface does not have
an IP address or is in a down state, then rcp/rsh reverts to the default. To avoid this, add an IP address to
the subinterface or bring the interface to the up state.
Examples In the following example, Loopback interface 0 is assigned an IP address of 220.144.159.200, and the
ip rcmd source-interface command is used to specify that the source IP address for all rcp/rsh packets
will be the IP address assigned to the Loopback0 interface:
interface Loopback0
ip telnet source-interface
To specify the IP address of an interface as the source address for Telnet connections, use the ip telnet
source-interface command in global configuration mode. To reset the source address to the default for
each connection, use the no form of this command.
no ip telnet source-interface
Syntax Description interface The interface whose address is to be used as the source for Telnet connections.
Defaults The address of the closest interface to the destination is the source address.
Usage Guidelines Use this command to set the IP address of an interface as the source for all Telnet connections.
If the specified interface is not up, the Cisco IOS software selects the address of the interface closest to
the destination as the source address.
Examples The following example forces the IP address for Ethernet interface 1 as the source address for Telnet
connections:
Router(config)# ip telnet source-interface Ethernet1
ip tftp boot-interface
To use an interface for TFTP booting, use the ip tftp boot-interface command in global configuration
mode. To disable this configuration, use the no form of this command.
no ip tftp boot-interface
Syntax Description type The type of the interface to be used. You can choose from a list of interfaces.
number The related interface number. Each interface has a related range of numbers.
For example, the Virtual Multipoint Interface has a range of interface
numbers from 1 to 2147483647.
Examples The following example shows how to ensure that an interface is used for TFTP booting:
Router> enable
Router# configure terminal
Router(config)# ip tftp boot-interface
ip tftp min-timeout
To specify the minimum timeout period for retransmission of data using TFTP, use the ip tftp
min-timeout command in global configuration mode. To disable, use the no form of this command.
no ip tftp min-timeout
Syntax Description seconds Specifies the timeout value, in seconds. The range is from 4 to 20.
Command Default The default minimum timeout period for retransmission of data is 4 seconds.
Examples The following example shows how to specify the minimum timeout period for retransmission of data as
5 seconds:
Router> enable
Router# configure terminal
Router(config)# ip tftp min-timeout 5
ip tftp source-interface
To specify the IP address of an interface as the source address for TFTP connections, use the ip tftp
source-interface command in global configuration mode. To return to the default, use the no form of
this command.
no ip tftp source-interface
Syntax Description interface-type The interface type and number whose address is to be used as the source for
interface-number TFTP connections.
Command Default The address of the closest interface to the destination is selected as the source address.
Usage Guidelines Use this command to set the IP address of an interface as the source for all TFTP connections.
If the specified interface is not up, the Cisco IOS software selects the address of the interface closest to
the destination as the source address.
In Cisco IOS 12.3(6) and later releases, TFTP is VRF-aware, which means that TFTP transfer is
supported across an interface within a Virtual Private Network (VPN) routing and forwarding (VRF)
instance. To specify a VRF as a source for TFTP connections, the VRF must be associated with the same
interface that you configure with the ip tftp source-interface command. In this configuration, TFTP
looks for the destination IP address for file transfer in the specified VRF table.
Examples The following example shows how to configure the router to use the IP address associated with loopback
interface 0 as the source address for TFTP connections:
configure terminal
!
ip tftp source-interface loopback0
The following example shows how to configure the router to use the VRF table named vpn1 to look for
the destination IP address for TFTP connections:
configure terminal
!
ip tftp source-interface ethernet 1/0
!
ip vrf vpn1
rd 100:1
route-target both 100:1
!
interface ethernet 1/0
ip vrf forwarding vpn1
end
In this example, file transfer using TFTP is accomplished across an interface within a VRF (VRF vpn1)
link.
Syntax Description group-address (Optional) Directs the router to use a specified multicast IP address for
group-address communication with the WCCP service group. See the “Usage Guidelines”
section for additional information.
redirect-list (Optional) Directs the router to use an access list to control traffic that is
access-list redirected to this service group. See the “Usage Guidelines” section for
additional information.
group-list (Optional) Directs the router to use an access list to determine which cache
access-list engines are allowed to participate in the service group. See the “Usage
Guidelines” section for additional information.
password (Optional) Specifies a string that directs the router to apply MD5 authentication
password to messages received from the service group specified by the service name given.
See the “Usage Guidelines” section for additional information.
Defaults Disabled
Usage Guidelines This command is supported on software releases later than cache engine software Release ACNS 4.2.1.
The group-address group-address option requires a multicast address that is used by the router to
determine which cache engine should receive redirected messages. This option instructs the router to use
the specified multicast IP address to coalesce the “I See You” responses for the “Here I Am” messages
that it has received on this group address. In addition, the response is sent to the group address. The
default is for no group-address to be configured, so that all “Here I Am” messages are responded to
with a unicast reply.
The redirect-list access-list option instructs the router to use an access list to control the traffic that is
redirected to the cache engines of the service group that is specified by the service-name given. The
access-list argument specifies either a number from 1 to 99 to represent a standard or extended
access-list number, or a name to represent a named standard or extended access list. The access list itself
specifies the traffic that is permitted to be redirected. The default is for no redirect-list to be configured
(all traffic is redirected).
The group-list access-list option instructs the router to use an access list to control the cache engines
that are allowed to participate in the specified service group. The access-list argument specifies either a
number from 1 to 99 to represent a standard access-list number, or a name to represent a named standard
access list. The access list specifies which cache engines are permitted to participate in the service group.
The default is for no group-list to be configured, so that all cache engines may participate in the service
group.
The password can be up to seven characters. When you designate a password, the messages that are not
accepted by the authentication are discarded. The password name is combined with the HMAC MD5
value to create security for the connection between the router and the cache engine.
Examples This example shows how to enable the hardware acceleration for WCCP version 1:
Router(config)# ip wccp web-cache accelerated